as they happen
Canary captures data describing medical device behavior in near real-time, and alerts you if your device is behaving abnormally. This allows you to respond to incidents proactively, instead of waiting for a call from a customer or regulator.CANARY BROCHURE
Forensically determine if
a vulnerability has been exploited
Every software stack can be affected by vulnerabilities from time to time. Canary allows you to assess the behavior of affected devices, to determine if a vulnerability is being exploited by an attacker.Get a demo
Designed to meet FDA Guidance
Granular event data creates a record of device behavior, used in real-time or in the future.
Receive alerts if your devices appear to be under attack , allowing you to intervene before patients are impacted.
Records of device behavior allow you to determine if a vulnerability has (or has not) been exploited in your device.
Security event metadata includes no PHI, and devices can report event data without needing inbound access from the internet.
Call MedCrypt’s APIs within your device’s software for common security functions and cryptographically signing all instructions sent to your device with unique key pairs.
MedCrypt-enabled devices can send event data (not PHI) to our monitoring service, allowing us to detect when a device is under attack.
MedCrypt knows which software libraries have been included in your device, and can monitor these libraries for known cybersecurity vulnerabilities long after it has been released.