✓ Passive technology, no installed software agents to manage, ideal for medical devices
✓ Utilizes research based on deep experience in medical device use and design and strong
understanding of cybersecurity principles & practices, along with Artificial Intelligence
(AI), machine learning and proprietary algorithms, to perform deep packet analysis
of device data traversing the network
✓ Supports several use cases across Inventory, Cybersecurity and Operational
Management with an expanding platform roadmap to meet additional operational and
strategic organizational requirements
✓ Integrates with an organization’s supporting IT/Security platforms, i.e. CMMS, SIEM,
Vulnerability Scanners, Network firewalls and network access controls to support the health
system overall IT Security and Risk management programs and maximize existing platform tools and investments Visibility of critical information across organizational disciplines: Clinical Team, IS Team, Risk Managers
✓ External Connections: finding the bad actors
✓ IT Services protocols: i.e. SMB, RDP, FTP
✓ Anomalies: real time Network Traffic Analysis (NTA)
✓ Forensics: data flow, protocols, and traffic stats
✓ FDA Recall: linked to FDA device database
✓ Supported by Asimily researchers and analysts