Designed to meet the FDA cybersecurity guidance
Granular event data creates a record of device behavior, used in real-time or in the future.
Receive alerts if your devices appear to be under attack , allowing you to intervene before patients are impacted.
Records of device behavior allow you to determine if a vulnerability has (or has not) been exploited in your device.
Security event metadata includes no PHI, and devices can report event data without needing inbound access from the internet.
Call MedCrypt’s APIs within your device’s software for common security functions and cryptographically signing all instructions sent to your device with unique key pairs.
MedCrypt-enabled devices can send event data (not PHI) to our monitoring service, allowing us to detect when a device is under attack.
MedCrypt knows which software libraries have been included in your device, and can monitor these libraries for known cybersecurity vulnerabilities long after it has been released.