Cryptography engineering is hard

Failure to properly encrypt data is one of the leading causes of medical device cybersecurity vulnerability disclosures and recalls. Guardian makes it easy to encrypt, decrypt, sign, and verify using trusted algorithms through a simple API.

SEE THE DOCS
import guardian

message = "Message of important data"

# Library is configured to encrypt and/or sign data
# over the channel
guardian.DataChannel.DataForChannel(message)
                      
import guardian
status = guardian.utilites.get_init_files_from_names(
                                  "TrustStore.mcts",
                                  "PrivateIdentity.mcpi",
                                  "CertifiedProfile.mcp",
                                  "", &init_files)
status = guardian.Initialize(
              init_files, "my_unique_hardware_identifier",
              guardian.GuardianInitializeOptions)

                      

Key Management, simplified

Guardian can use keys signed by Overwatch, our key management system, or keys signed by another PKI tool. Devices and their keys are tracked within Overwatch, simplifying Postmarket management and incident response. We've built this system with the unique needs of medical devices in mind (like intermittent connectivity, and the need to maintain clinical functionality at all costs).

REQUEST A DEMO

Key Features

  • Platform Support

    Designed to work in embedded MCUs (like the STM32), all the way up to Intel-based servers

  • Configurable

    Choose the encryption algorithms and parameters most appropriate for your use case and design constraints

  • Postmarket

    Integration with our Overwatch, Canary, and Heimdall solutions makes it easy to manage devices in the field

  • Verified

    We follow medical device quality systems, and provide our internal testing documentation,to support your quality system and regulatory filing making V&V easy

  • SECURE DATA &
    COMMANDS

    Call MedCrypt’s APIs within your device’s software for common security functions and cryptographically signing all instructions sent to your device with unique key pairs.

  • MONITOR
    BEHAVIOR

    MedCrypt-enabled devices can send event data (not PHI) to our monitoring service, allowing us to detect when a device is under attack.

  • MONITOR
    SBOM VULNERABILITY

    MedCrypt knows which software libraries have been included in your device, and can monitor these libraries for known cybersecurity vulnerabilities long after it has been released.