• slidebg2
    (10/18/18) Security Is A Requirement

    FDA Releases Premarket Cybersecurity Guidance

    New FDA guidance is challenging to satisfy without security tools designed specifically for medical devices.
  • slidebg2
    Medical Device Security as a Service

    Secure Medical Devices Use MedCrypt

    Best of Breed security technologies and rapid vulnerability patches, designed specifically for Connected Medical Devices
  • slidebg1
    Data Security Used To Be An Afterthought
    Patients Now Know Devices Are Hackable
    Are your device's security features helping or hurting it in the market?
  • slidebg3
    Vulnerabilities Are Expensive

    When Vulnerabilities Are Not Addressed, You Lose Money

    Even if they're not exploited, the discovery of security vulnerabilities can cause the loss of market share, market cap, and regulatory status.

MedCrypt Ensures Your Device Exceeds Customers' and Regulators' Security Expectations.

Use our APIs to encrypt data sent to and from your devices. Cryptographically sign all commands sent to the device, and ensure instructions are coming from a trusted source. Assign unique keys to every actor in your system. Monitor what your devices are doing remotely, in real-time. Learn from threat data shared by other MedCrypt users.

How It Works

Easy API

Call MedCrypt's APIs within your device's software for common security functions, like encrypting data at rest and in transit, and cryptographically signing all instructions sent to your device with unique key pairs.

Signature Verification

Cryptographic signatures allow you to verify the integrity of clinical data on the device, or in distant Health IT systems, ensuring no one has modified a patient's data.

Safety In Numbers

MedCrypt-enabled devices communicate with our centralized Event Monitoring Service, allowing us to look for anomalous behavior in real-time.

Why You Should Use MedCrypt

Medical Devices Only

Security tools built for PCs are largely inappropriate for medical devices. Our tools are designed specifically for medical devices' unique usage and regulatory requirements.

Easy to Integrate

Implement MedCrypt with a few lines of code, and spend more time focusing on developing your device's features.

Regulator Friendly

MedCrypt has been designed specifically to address the FDA's Pre- and Post-market cybersecurity guidance.

Centralized Transaction Monitoring

We watch what your devices are doing in real-time, helping spot suspicious behavior (as mandated by the FDA).

Scales With Hardware

Our MedCrypt client libraries can be configured for a wide range of hardware platforms, from full-sized servers running Linux or Windows, to embedded microcontrollers.

Financial-Grade Technologies

Ensure that your medical devices are using the same encryption and security technologies relied upon by financial institutions.

Be a market leader

The most respected healthcare providers see security as a product differentiator. Be confident you're offering your patients and clinicians the most secure product possible.

Native Languages

MedCrypt libraries and APIs are available in common medical device software languages, like C, C#, and Java.

Patch Vulnerabilities Quickly

Our security libraries allow you to patch security vulnerabilities, without triggering FDA resubmissions.


Mike Kijewski

Mike is passionate about new advances in the intersection of internet technology and healthcare. Prior to starting MedCrypt, he was the founder of Gamma Basics, a radiation oncology focused software startup. Gamma Basics was acquired by Varian Medical Systems in 2013.

Mike holds an MBA from the Wharton School, and a Master of Medical Physics from the University of Pennsylvania.


Brett Hemenway

Brett's research focuses on coding theory and cryptography, using mathematical tools to create secure and robust information systems. Brett has new developed cryptosystems that are provable secure against chosen ciphertext attacks and selective opening attacks. In addition to developing new algorithmic tools, Brett's research focuses on transitioning algorithms into practice. One such example is Secure Multiparty Computation (MPC), a cryptographic tool that allows a group of stakeholders to jointly compute a function of their private data, without revealing their private data to each other or any outside party.

Brett is Research Assistant Professor in the department of Computer and Information Science at the University of Pennsylvania. Brett holds a PhD in Mathematics from the University of California, Los Angeles, and a BS in Mathematics from Brown University.


Eric Pancoast

Eric was a co-founder of Gamma Basics, a radiation oncology focused software startup that was acquired by Varian Medical Systems in 2013. At Mimeya Technology, Eric served as the Lead Architect and Software Engineer building Cloud-based Big Data SaaS applications.

Eric holds a BS in Computer Science from Drexel University.


Learn how we can prevent 95% of medical device security vulnerabilities.

Email us to learn how we can help you and your customers be confident that your medical devices are using the most secure technologies possible.