Detect incidents
as they happen

Canary captures data describing medical device behavior in near real-time, and alerts you if your device is behaving abnormally. This allows you to respond to incidents proactively, instead of waiting for a call from a customer or regulator.

CANARY BROCHURE

Forensically determine if
a vulnerability has been exploited

Every software stack can be affected by vulnerabilities from time to time. Canary allows you to assess the behavior of affected devices, to determine if a vulnerability is being exploited by an attacker.

Get a demo

Designed to meet FDA Guidance

  • Forensically-sound
    evidence capture

    Granular event data creates a record of device behavior, used in real-time or in the future.

  • Intrusion
    Detection

    Receive alerts if your devices appear to be under attack , allowing you to intervene before patients are impacted.

  • Improved Incident
    Response

    Records of device behavior allow you to determine if a vulnerability has (or has not) been exploited in your device.

  • No PHI
    Collection

    Security event metadata includes no PHI, and devices can report event data without needing inbound access from the internet.

  • SECURE DATA &
    COMMANDS

    Call MedCrypt’s APIs within your device’s software for common security functions and cryptographically signing all instructions sent to your device with unique key pairs.

  • MONITOR
    BEHAVIOR

    MedCrypt-enabled devices can send event data (not PHI) to our monitoring service, allowing us to detect when a device is under attack.

  • MONITOR
    SBOM VULNERABILITY

    MedCrypt knows which software libraries have been included in your device, and can monitor these libraries for known cybersecurity vulnerabilities long after it has been released.