• slidebg1
    Secure Your Medical Devices' Data
    Data Encryption, Multi-Factor Authentication, and PKI
    All through an easy to use API
  • slidebg1
    Streamlines Regulatory Processes

    Apply Security Patches Asynchronously

    Update just the security libraries needing to be patched, easing your regulatory burden.

MedCrypt Ensures Your Device Meets Customers' Security Expectations.

Use our APIs to encrypt data at rest, encrypt network communications, and implement multi-factor user authentication. Our Hospital-based PKI makes it easy to manage all of the keys needed for your users to access your devices.

How It Works

Easy API

Call MedCrypt's APIs within your Device's software for common security functions, like encrypting data at rest, encrypting data in transit, and multi-factor authentication.

Local PKI

Your device communicates with the locally installed MedCrypt node, which manages users' public keys, manages user permissions, and validates data signatures.

Safety In Numbers

The MedCrypt node communicates with other nodes within the MedCrypt network, allowing us to monitor for anomalous activity.

Why You Should Use MedCrypt

Native Languages

Libraries and APIs in common medical device software languages, like C, C#, and Java.

Easy Encryption

Be confident that data on your device is encrypted, both at rest and in transit.

Deploy Anywhere

The MedCrypt client can be deployed on-prem, or in the cloud.

Centralized Transaction Monitoring

Centralized transaction monitoring helps identify anomalous activity.

No Unauthorized Access

Our easy-to-implement multifactor authentication library prevents unauthorized device access via phishing and spearphishing attacks.

Financial-Grade Technologies

Ensure that your medical devices are using the same encryption and security technologies relied upon by financial institutions.

Remote Monitoring

Receive regular reports about your devices' behavior in the field.

Easy to Integrate

Secure your device in a few lines of code, and spend more time focusing on your core competency.

Streamlined Regulatory Process

Our security libraries allow you to patch security vulnerabilities, without triggering FDA resubmissions.

Leadership

Mike Kijewski

Mike is passionate about new advances in the intersection of internet technology and healthcare. Prior to starting MedCrypt, he was the founder of Gamma Basics, a radiation oncology focused software startup. Gamma Basics was acquired by Varian Medical Systems in 2013.

Mike holds an MBA from the Wharton School, and a Master of Medical Physics from the University of Pennsylvania.

Service image

Brett Hemenway

Brett's research focuses on coding theory and cryptography, using mathematical tools to create secure and robust information systems. Brett has new developed cryptosystems that are provable secure against chosen ciphertext attacks and selective opening attacks. In addition to developing new algorithmic tools, Brett's research focuses on transitioning algorithms into practice. One such example is Secure Multiparty Computation (MPC), a cryptographic tool that allows a group of stakeholders to jointly compute a function of their private data, without revealing their private data to each other or any outside party.

Brett is Research Assistant Professor in the department of Computer and Information Science at the University of Pennsylvania. Brett holds a PhD in Mathematics from the University of California, Los Angeles, and a BS in Mathematics from Brown University.

Service image

Eric Pancoast

Eric was a co-founder of Gamma Basics, a radiation oncology focused software startup that was acquired by Varian Medical Systems in 2013. At Mimeya Technology, Eric served as the Lead Architect and Software Engineer building Cloud-based Big Data SaaS applications.

Eric holds a BS in Computer Science from Drexel University.

Service image

Learn how we can prevent 95% of medical device security vulnerabilities.

Email us to learn how we can help you and your customers be confident that your medical devices are using the most secure technologies possible.