Our Values are what ground us

Meet our Leaders

James Kamke


CEO

Nabil Wasily


CTO

Vinay Gokhale


VP, Business Development

Advisory Board

Healthcare & Consumer Medical Devices

Your patients lives are on the line. And so is your reputation. We'll help you improve the quality of their future, while safeguarding yours.

Sorry, we couldn't find any posts. Please try a different search.

Connected Car

Your customers expect increasing in-car connectivity and features. What they don't expect is the increasing cyber threat. Find out how we help you manage both.

Sorry, we couldn't find any posts. Please try a different search.

Cold Chain Management and Asset Tracking

You need end-to-end control and verification across the product journey. And we're making that simpler, more affordable, and more secure than ever Find out how.

Sorry, we couldn't find any posts. Please try a different search.

Products

Comprehensive. Scalable. Backed by FDA-cleared, patent-protected technology.

Introducing AppAuth™ and SecureConnectivity™, the first software solutions in a suite of products that meet the approvals of FDA cyber security stacks. Now you can eliminate vulnerabilities in communication between the Phone and Thing, as well as the Phone and Cloud.

When Communication becomes compromised, so does your brand

You assume apps and communication transport mechanisms like Bluetooth, NFC, LTE, Ethernet, and others are secure. But are they? While their basic security mechanisms mitigate some breaches, other threats – like holes in one-size-fits-all authentication and eavesdropping – are far less contained. Here’s how to lock down both app and channel, and uphold the safety promises you make.

Product Overview

4 Key Products enabling Trust, Security & Interoperability Solutions

SeamlessConnect™

Connect “Things” to the Internet in a seamless and transparent fashion. Authorized devices connect automatically to intermediate hardware gateways or Smartphone Apps within communication range.

AppAuth™

Authenticate customers and their devices, protect your app from malware attacks, and validate system commands and components via remote attestation. You’ll ensure that all system elements can be trusted at all times.

SecureConnectivity™

Protects the privacy and integrity of customer’s information by creating a secure tunnel at the application layer. This secure tunnel protects data without relying on the underlying security, or lack thereof, of the transport mechanism being used.
(i.e. Bluetooth, NFC, LTE, Ethernet, etc.)

RecordAuth™

Using Blockchain technology, RecordAuth™ ensures the authenticity of data entered into the system by various sensors or entities within a supply chain or financial ecosystem.

SeamlessConnect™

Connect “Things” to the Internet in a seamless and transparent fashion. Authorized devices connect automatically to intermediate hardware gateways or Smartphone Apps within communication range.

AppAuth™

Authenticate customers and their devices, protect your app from malware attacks, and validate system commands and components via remote attestation. You’ll ensure that all system elements can be trusted at all times.

Product Overview

4 Key Products enabling Trust, Security & Interoperability Solutions

SecureConnectivity™

Protects the privacy and integrity of customer’s information by creating a secure tunnel at the application layer. This secure tunnel protects data without relying on the underlying security, or lack thereof, of the transport mechanism being used.
(i.e. Bluetooth, NFC, LTE, Ethernet, etc.)

RecordAuth™

Using Blockchain technology, RecordAuth™ ensures the authenticity of data entered into the system by various sensors or entities within a supply chain or financial ecosystem.

Security

We take you from "vulnerable" to "impenetrable".

Thirdwayv solves the IoT security challenge at every point of vulnerability. We start by establishing our "nucleus of trust" with the factory hardware security module (HSM). Then we ensure trusted provisioning, plus secure communications and networking across all devices – including nodes, endpoints, apps, gateways, and even the cloud infrastructure.

If we can safeguard a surgical implant, we can safeguard anything

Imagine a device that performs a "mission critical" function. On the one hand, it's durable and complex. On the other, it's a delicate assemblage of form, function, connectivity, and security. Perhaps none more important than the latter.

Our cybersecurity software stack for IoT applications provides immunity against a variety of attacks. It's the definitive answer to securing safety-critical applications – from surgical implants, to drug delivery pumps and beyond.

Component 10 – 1-min

We include all necessary components for communications and control between smartphones and the cloud, and to and from IoT devices. Other key elements include.

Smartphone operating system security that extends across the app and platform.

IoT device security and key management.

Over-the-air upgrades for IoT devices.

The key elements of IoT protection – and how we address them

01

The Chain of Trust

Thirdwayv adds trust and reliability to secure, peer-to-peer connectivity. Unlike others, we begin with the hardware, which serves as the nucleus of trust and security. And which informs the rest of the chain.

 

know more

02

Trust at the LOT Edge

We protect all devices, nodes and other endpoints from unauthorized control, usage, and data access.

 

know more

03

Cloud Protection

Thirdwayv takes a security by design approach to protecting cloud operations, with a distributed root of trust that ensures no single point of system failure.

 

know more

Newsroom/Blog

We take you from "vulnerable" to "impenetrable".

ThirdWayv solves the IoT security challenge at every point of vulnerability. We start by establishing our "nucleus of trust" with the factory hardware security module (HSM). Then we ensure trusted provisioning, plus secure communications and networking across all devices – including nodes, endpoints, apps, gateways, and even the cloud infrastructure.

Thirdwayv to Participate in First Industry Event Focused on New IEEE Standard for Connecting and Protecting Digital Diabetes Devices

Sep 12, 2022

Company Advisory Board Members Will Join Other Experts at the Event to Discuss How the Industry is Now “Securing the IoT Ecosystem for Medical Devices” Irvine, Calif., Sept. 12, 2022 – Thirdwayv, a leading provider of end-to-end connectivity and security solutions for IoT applications, today announced it will participate in the first event to celebrate…

know more

Reimagining remote patient monitoring

Aug 3, 2022

Telemedicine, or telehealth, enables health-care providers to deliver care via technology and, in many cases, virtually via a telehealth software app that is accessible on a smartphone, tablet, or desktop. But it is much more than that now with wellness trackers that can be integrated into a patient’s health-care records and remote patient monitoring (RPM)…

know more

CuePath’s Home Care Agency Partners Deliver Medication Adherence Solution that Incorporates Thirdwayv Technology

Jul 7, 2022

Launches its Innovator Program to Fuel Partner Revenue Growth and Reduce the Risk of Client Hospitalizations VANCOUVER, BC, and IRVINE, Calif., July 7, 2022 /Businesswire/ – CuePath Innovation and Thirdwayv today announced that CuePath has begun volume production of its home-healthcare solution for remote monitoring of patient medication adherence that features Thirdway’s built-in protections against today’s cybersecurity…

know more

Smart Solutions To Improve Patient Compliance

Jun 27, 2022

Numerous studies have explored the challenge of helping patients adhere to their medication regimens. One promising solution is “smart” medication blister packs with embedded sensors that enable caregivers to remotely monitor if—and when—doses are removed. But they can only be used if they are cyber-hardened against today’s dangerous and ever-evolving cybersecurity risks.

know more

Protecting Industry 4.0 assets in the IoT

May 24, 2022

IoT technology is central to Industry 4.0 in applications ranging from indoor asset location awareness and consignment inventory management to retail item tracking and full, 360˚ track-and-trace processes. Hardware-based, or device, security in these and other applications is often neglected. This is particularly dangerous as the industry seeks to control processes using commercial smartphones, which…

know more

Thirdwayv Advisory Board Members Participate in AAMI Roundtable Webinar Event on Connected Digital Healthcare

Mar 14, 2022

Dr. David Klonoff and Aimon Abdel-Malek, PhD, Discuss What Diabetes Management Can Teach about the Digital Future Irvine, Calif., March 14, 2022 – Thirdwayv, a leading provider of end-to-end connectivity and security solutions for IoT applications, today announced that two of its Advisory Board members, Dr. Aiman Abdel-Malek and Dr. David Klonoff, will participate in…

know more

The Hidden Crisis Within Today’s Healthcare Crisis

Mar 14, 2022

The Healthcare Crisis of today – or, perhaps more accurately, over the past two years — has been never-ending waves of COVID-19 variants.  With “Alpha” starting in 2019 to the current “Omicron” & “BA.2” mutations, our hospital systems have been stretched to the breaking point.  This crisis has forced administrators to deal with huge patient…

know more

Thirdwayv Applauds Insulet’s FDA Clearance for the World’s First Tubeless Automated Insulin System with Smartphone Control

Feb 5, 2022

Congratulations to Insulet and all the kids who will sleep better now after the company  announced FDA clearance of its Omnipod® 5 Automated Insulin Delivery System for people with type 1 diabetes aged 6 years and older. It is the first and only tubeless automated insulin delivery (AID) system in the US with compatible smartphone…

know more

Preventing connected medical devices from threatening security

Jan 26, 2022

In the rapidly expanding Internet of Medical Things (IoMT), many connected devices unintentionally create life-threatening security risks and jeopardise hospital operations. From decades-old legacy hospital equipment to the latest implantable products controlled by smartphones, these devices share common vulnerabilities. But while many mistakenly believe that IoMT security requires that each of these devices incorporate built-in…

know more

Protecting hospitals from supply-chain counterfeits and other security threats

Sep 10, 2021

Chief security officers and other stakeholders protecting the integrity of healthcare organization supply chains face growing challenges. Thirdwayv’s Vinay Gokhale, VP of Business Development, shares in this article in Security Magazine how smarter, connected supply chains carrying a flow of smarter, connected devices may simplify management and improve efficiency, but they also bring security risks…

know more

Let's Talk

The future of your enterprise is only a few keystrokes away

Ready to start a conversation? We are too. Simply complete the fields below and let's start talking about the shape of what's to come. We'll help you take full advantage of what's happening in our industry. All while guiding and safeguarding your enterprise every step of the way.