MedCrypt Ensures Your Device Exceeds Customers' and Regulators' Security Expectations.

Use our APIs to encrypt data sent to and from your devices. Cryptographically sign all commands sent to the device, and ensure instructions are coming from a trusted source. Assign unique keys to every actor in your system. Monitor what your devices are doing remotely, in real-time. Learn from threat data shared by other MedCrypt users.

How It Works

Easy API

Call MedCrypt's APIs within your device's software for common security functions, like encrypting data at rest and in transit, and cryptographically signing all instructions sent to your device with unique key pairs.

Local PKI

Your device communicates with the locally installed MedCrypt Node, which manages users' public keys, manages user permissions, and validates data signatures.

Safety In Numbers

The MedCrypt Node communicates with our centralized Transaction Monitoring Service, allowing us to look for anomalous behavior in real-time.

Why You Should Use MedCrypt

Medical Devices Only

Security tools built for PCs are largely inappropriate for medical devices. Our tools are designed specifically for medical devices' unique usage and regulatory requirements.

Easy to Integrate

Implement MedCrypt with a few lines of code, and spend more time focusing on developing your device's features.

Regulator Friendly

MedCrypt has been designed to help meet current and future regulatory requirements.

Centralized Transaction Monitoring

We watch what your devices are doing in real-time, helping spot suspicious behavior (as recommended by the FDA).

Scales With Hardware

Our MedCrypt client libraries can be configured for a wide range of hardware platforms, from full-sized servers running Linux or Windows, to embedded microcontrollers.

Financial-Grade Technologies

Ensure that your medical devices are using the same encryption and security technologies relied upon by financial institutions.

Be a market leader

The most respected healthcare providers see security as a product differentiator. Be confident you're offering your patients and clinicians the most secure product possible.

Native Languages

MedCrypt libraries and APIs are available in common medical device software languages, like C, C#, and Java.

Patch Vulnerabilities Quickly

Our security libraries allow you to patch security vulnerabilities, without triggering FDA resubmissions.


Mike Kijewski

Mike is passionate about new advances in the intersection of internet technology and healthcare. Prior to starting MedCrypt, he was the founder of Gamma Basics, a radiation oncology focused software startup. Gamma Basics was acquired by Varian Medical Systems in 2013.

Mike holds an MBA from the Wharton School, and a Master of Medical Physics from the University of Pennsylvania.

Service image

Brett Hemenway

Brett's research focuses on coding theory and cryptography, using mathematical tools to create secure and robust information systems. Brett has new developed cryptosystems that are provable secure against chosen ciphertext attacks and selective opening attacks. In addition to developing new algorithmic tools, Brett's research focuses on transitioning algorithms into practice. One such example is Secure Multiparty Computation (MPC), a cryptographic tool that allows a group of stakeholders to jointly compute a function of their private data, without revealing their private data to each other or any outside party.

Brett is Research Assistant Professor in the department of Computer and Information Science at the University of Pennsylvania. Brett holds a PhD in Mathematics from the University of California, Los Angeles, and a BS in Mathematics from Brown University.

Service image

Eric Pancoast

Eric was a co-founder of Gamma Basics, a radiation oncology focused software startup that was acquired by Varian Medical Systems in 2013. At Mimeya Technology, Eric served as the Lead Architect and Software Engineer building Cloud-based Big Data SaaS applications.

Eric holds a BS in Computer Science from Drexel University.

Service image

Learn how we can prevent 95% of medical device security vulnerabilities.

Email us to learn how we can help you and your customers be confident that your medical devices are using the most secure technologies possible.