Connected. Protected.

Thirdwayv helps your enterprise realize the full potential of loT connectivity. All while neutralizing security threats that can ruin the customer experience — and your reputation.

Why Thirdwayv?

Because when lives are on the line, we deliver.

Thirdwayv enables some of the world's most demanding and safety-critical loT services. Services where a patient's very well-being hinges upon our "getting it right". Time and again we've proven we can. And we bring those same assurances to other applications and markets that need secure and reliable operation.

Here is how we do it 

thisishowwedoit1

End-to-end loT security, from the hardware up

We look at trusted IoT connectivity from an end-to-end, security-by-design perspective – and from the hardware up. In fact, our deep expertise at the semiconductor and component level is one of the things that sets us apart: unlike others, we can ensure trust from the core of the semiconductor chip and related components, to the cloud, across the entire solutions lifecycle.

You might even think of us as the "nucleus of trust" for your entire service or application. That's because we deliver the technologies that allow all the devices, connections, and applications to "trust" each other before any IoT transaction occurs. All to safeguard you – and your customers – against breaches, tampering, and fraud.

thisishowwedoit2

Connecting and securing millions of devices

We deploy applications ranging from consumer medical devices, to connected hospital and home healthcare, to asset tracking, to the connected car. That's a lot of territory covered, both in terms of geography and functionality. Proven. Trusted. Effective. These applications help enterprises like yours raise the bar on patient care and quality of life – and elevate the overall customer experience. Like we did for them, we can help you use IoT connectivity to deliver on your all brand promises. If not far exceed them.

thisishowwedoit3

FDA clearances received... enabling partners to meet FDA guidelines

When you're on the forefront of technology, there are few standards and best practices already in place. But we're changing that. Our products enable partners to meet FDA cybersecurity guidelines - just by integrating with our Software Development Kits. That means we're creating new standards for applications and providing hardware roots of trust for connected medical devices, thus shortening the time it takes for you to bring those applications to market.

thisishowwedoit44

Easy deployments that close the gap between investment and revenue

Our software-as a service business model delivers the fastest path to loT application deployment. And that translates into the fastest returns on your technology investment.

Additionally, we can help you scale across multiple applications and quickly incorporate new capabilities. It's done by leveraging proven technology and security assurances that we've already implemented across the healthcare sector. Because if we can get it right in the most highly regulated and safety-critical environment, we can easily adapt what's in-place to yours.

Finally, as semiconductor experts, we can help as needed with cost-reducing hardware, rapid prototyping and even industrial design – all while keeping security and connectivity features at the highest levels.

Company

We're invested in technology. And also in you.

We've built our business on trust. Not only when it comes to loT connectivity and security, but also when it comes to relationships. Because who you can trust is as important as anything else. Perhaps even more so.

Our Mission is simple

We live in exciting times, filled with never-before-seen opportunity. But inextricably linked with the technological potential are threats that can be even greater in scope. Threats that can destroy the very thing that's central to any brand – its reputation.

Our mission at Thirdwayv is straightforward: we want to help take the anxiety out of the IoT.

We want to help your enterprise move safely beyond place-to-place and person-to-person communications to a new wave of thing-to-thing networks. A THIRDWAYV, if you will. One without worries. One where we've secured every element of the system and all of the devices connected to it. Our goal is an IoT you can trust, for safety-critical applications and services that depend on it.

Our Values are what ground us

Connection

Yes, we're in the business of peer-to-peer connectivity. But we believe we're enabling something far greater – meaningful human connection. That's because we believe in the power of the IoT to improve how the world monitors and manages disease. All while automating processes and creating better, more personalized user experiences. The result is an increased quality of life for millions. And a deeper connection between you and your customers.

Integrity

We believe 100% in the integrity of our solutions. That's because we believe 100% in the integrity of our people. We've assembled a team of hardware and software engineers who believe whole-heartedly in what they do. They're deep thinkers. They like to challenge convention. And they're experts in all aspects of IoT security, efficiency, and reliability. We settle for nothing less here. Because we know your enterprise can't afford to, either.

Collaboration

Our clients are the heroes of our story. They're equal parts dreamers and doers, all invested in exceeding the brand promises they make to customers. They challenge us every day. And we help them further push the envelope. We're grateful to partner with some of the world's leading brands. Together, we pioneer ground-breaking solutions that change lives and power a better, brighter, smarter world. It's our privilege to collaborate with each of them.

Meet our Leaders

James Kamke


CEO

Nabil Wasily


CTO

Vinay Gokhale


VP, Business Development

Andrew Lentvorski


VP, Engineering

Case Studies

We're tested and trusted by global brands. Now, what can we do for you?

Thirdwayv delivers important new loT capabilities across all broadly-adopted wireless protocols. They're deployed by industry-leading customers in some of the highest-value applications — from medical devices to track and trace solutions for surgical implants. When you require the utmost in safety and reliability, Thirdwayv leads the charge.

Healthcare & Consumer Medical Devices

Your patients lives are on the line. And so is your reputation. We'll help you improve the quality of their future, while safeguarding yours.

Sorry, we couldn't find any posts. Please try a different search.

Connected Car

Your customers expect increasing in-car connectivity and features. What they don't expect is the increasing cyber threat. Find out how we help you manage both.

Sorry, we couldn't find any posts. Please try a different search.

Cold Chain Management and Asset Tracking

You need end-to-end control and verification across the product journey. And we're making that simpler, more affordable, and more secure than ever Find out how.

Sorry, we couldn't find any posts. Please try a different search.

Products

Comprehensive. Scalable. Backed by FDA-cleared, patent-protected technology.

Introducing AppAuth™ and SecureConnectivity™, the first software solutions in a suite of products that meet the approvals of FDA cyber security stacks. Now you can eliminate vulnerabilities in communication between the Phone and Thing, as well as the Phone and Cloud.

When Communication becomes compromised, so does your brand

You assume apps and communication transport mechanisms like Bluetooth, NFC, LTE, Ethernet, and others are secure. But are they? While their basic security mechanisms mitigate some breaches, other threats – like holes in one-size-fits-all authentication and eavesdropping – are far less contained. Here’s how to lock down both app and channel, and uphold the safety promises you make.

Product Overview

4 Key Products enabling Trust, Security & Interoperability Solutions

SeamlessConnect™

Connect “Things” to the Internet in a seamless and transparent fashion. Authorized devices connect automatically to intermediate hardware gateways or Smartphone Apps within communication range.

AppAuth™

Authenticate customers and their devices, protect your app from malware attacks, and validate system commands and components via remote attestation. You’ll ensure that all system elements can be trusted at all times.

SecureConnectivity™

Protects the privacy and integrity of customer’s information by creating a secure tunnel at the application layer. This secure tunnel protects data without relying on the underlying security, or lack thereof, of the transport mechanism being used.
(i.e. Bluetooth, NFC, LTE, Ethernet, etc.)

RecordAuth™

Using Blockchain technology, RecordAuth™ ensures the authenticity of data entered into the system by various sensors or entities within a supply chain or financial ecosystem.

SeamlessConnect™

Connect “Things” to the Internet in a seamless and transparent fashion. Authorized devices connect automatically to intermediate hardware gateways or Smartphone Apps within communication range.

AppAuth™

Authenticate customers and their devices, protect your app from malware attacks, and validate system commands and components via remote attestation. You’ll ensure that all system elements can be trusted at all times.

Product Overview

4 Key Products enabling Trust, Security & Interoperability Solutions

SecureConnectivity™

Protects the privacy and integrity of customer’s information by creating a secure tunnel at the application layer. This secure tunnel protects data without relying on the underlying security, or lack thereof, of the transport mechanism being used.
(i.e. Bluetooth, NFC, LTE, Ethernet, etc.)

RecordAuth™

Using Blockchain technology, RecordAuth™ ensures the authenticity of data entered into the system by various sensors or entities within a supply chain or financial ecosystem.

Security

We take you from "vulnerable" to "impenetrable".

Thirdwayv solves the IoT security challenge at every point of vulnerability. We start by establishing our "nucleus of trust" with the factory hardware security module (HSM). Then we ensure trusted provisioning, plus secure communications and networking across all devices – including nodes, endpoints, apps, gateways, and even the cloud infrastructure.

If we can safeguard a surgical implant, we can safeguard anything

Imagine a device that performs a "mission critical" function. On the one hand, it's durable and complex. On the other, it's a delicate assemblage of form, function, connectivity, and security. Perhaps none more important than the latter.

Our cybersecurity software stack for IoT applications provides immunity against a variety of attacks. It's the definitive answer to securing safety-critical applications – from surgical implants, to drug delivery pumps and beyond.

Component 10 – 1-min

We include all necessary components for communications and control between smartphones and the cloud, and to and from IoT devices. Other key elements include.

Smartphone operating system security that extends across the app and platform.

IoT device security and key management.

Over-the-air upgrades for IoT devices.

The key elements of IoT protection – and how we address them

01

The Chain of Trust

Thirdwayv adds trust and reliability to secure, peer-to-peer connectivity. Unlike others, we begin with the hardware, which serves as the nucleus of trust and security. And which informs the rest of the chain.

 

know more

02

Trust at the LOT Edge

We protect all devices, nodes and other endpoints from unauthorized control, usage, and data access.

 

know more

03

Cloud Protection

Thirdwayv takes a security by design approach to protecting cloud operations, with a distributed root of trust that ensures no single point of system failure.

 

know more

Newsroom/Blog

We take you from "vulnerable" to "impenetrable".

Thirdwayv solves the IoT security challenge at every point of vulnerability. We start by establishing our "nucleus of trust" with the factory hardware security module (HSM). Then we ensure trusted provisioning, plus secure communications and networking across all devices – including nodes, endpoints, apps, gateways, and even the cloud infrastructure.

Protecting hospitals from supply-chain counterfeits and other security threats

Sep 10, 2021

Chief security officers and other stakeholders protecting the integrity of healthcare organization supply chains face growing challenges. Thirdwayv’s Vinay Gokhale, VP of Business Development, shares in this article in Security Magazine how smarter, connected supply chains carrying a flow of smarter, connected devices may simplify management and improve efficiency, but they also bring security risks…

know more

Multi-Layered Security is Best Antidote Against Internet of Medical Things (IoMT) Cyberattacks

Apr 30, 2021

The chronic security ills of connected medical devices have now become a progressive, systemic disease during the pandemic as practitioners grow increasingly reliant on remote patient monitoring, telemedicine and other long-distance IoMT-based care models. Threats abound inside the hospital, too, including those related to legacy wired Ethernet medical systems ranging from anesthesia machines and MRIs…

know more

How to Protect Hospitals from Consignment Counterfeits and Other Threats in Today’s Internet of Medical Things

Feb 18, 2021

Internet of Medical Things (IoMT) technology is central to healthcare delivery in applications ranging from connected implantable devices to streamlining the supply chain. Device security in these and other applications is often neglected, which is particularly dangerous as the industry moves to an Internet of Things (IoT) device command-and-control model. Using commercial smartphones with built-in…

know more

Internet of Medical Things: Combatting Connected Health Security Threats

Dec 28, 2020

The healthcare industry increasingly relies on IoT networks to securely connect a growing variety of medical devices and equipment. These connected devices are transforming processes and the continuum of care in applications ranging from a hospital’s consignment inventory management to remotely controlling insulin pumps, heart-rate monitors, and other implantable devices using smartphones…

know more

New Products and Services: November 2020 Medical Design Briefs

Nov 16, 2020

Thirdwayv, Irvine, CA, has added a new solution to its family of connectivity and security-by-design building blocks for deploying mission-critical commercial and enterprise Internet of Things (IoT) applications. The SeamlessConnect solution ensures that IoT devices can continuously send and receive data from the cloud. Designed to improve connectivity of an IoT system, it can be…

know more

Making Connected Health Safe and Secure Under Smartphone Control

Oct 5, 2020

The security of insulin pumps, heart-rate monitors and other medical devices that are connected in Internet of Things (IoT) Systems is often simply assumed to exist. An equally dangerous mistake is to believe adequate security is prohibitively expensive to add, especially as a growing percentage of connected health systems move under smartphone control. Solution providers…

know more

Protecting Patients and Their Data from Cyberattacks Aimed at Their Connected Health Devices

Aug 1, 2020

The security of connected health technology is often assumed to exist when it does not, or considered to be prohibitively expensive or complex, or, worst of all, relegated to an afterthought. This is dangerous thinking, especially as the industry increasingly moves to a smartphone-based command-and-control model for these safety-critical applications…

know more

Are designers taking IoT security seriously enough?

Jul 31, 2020

Vinay Gokhale, vice president business development, Thirdwayv, believes the security of connected health-care devices is, in too many instances, not considered carefully enough. What’s worse, he said, is some solution providers believe that security simply cannot be implemented cost-effectively. Mitigating security threats in connected health-care devices can be achieved through a multi-layered, security-by-design approach that minimizes cost…

know more

Solving the security challenge in connected health-care devices

Jul 13, 2020

Connecting insulin pumps, heart-rate monitors, and other medical devices in the IoT has transformed patient care. But the security of these solutions is, in too many instances, not considered carefully enough. Worse, some solution providers believe that security simply cannot be implemented cost-effectively. This becomes particularly dangerous thinking as the industry moves to a command-and-control…

know more

How to protect connected medical devices from cyberattack

Jun 25, 2020

No one doubts that connecting medical devices in the Internet of Things (IoT) has delivered many benefits that have dramatically improved patient care. These devices, from insulin pumps to heart-rate monitors, have become critical elements in the continuum of care. But their benefits risk becoming liabilities if the security of these connected medical devices is…

know more

Let's Talk

The future of your enterprise is only a few keystrokes away

Ready to start a conversation? We are too. Simply complete the fields below and let's start talking about the shape of what's to come. We'll help you take full advantage of what's happening in our industry. All while guiding and safeguarding your enterprise every step of the way.