- May 20, 2024
Not enough time? Get the key points instantly.
A medical device founder walks into a hospital procurement meeting with a well-built device. Accurate sensors. Solid battery life. Clean enclosure. The procurement lead asks one question: "Does it integrate with our EHR?" The founder says connectivity is planned for a future version.
The deal doesn't move forward. Not because the device doesn't work, it works well. Because connectivity is no longer a differentiator on the hospital's evaluation sheet. It's a baseline requirement. Devices that can't connect don't get evaluated, regardless of clinical performance.
This is the defining shift in IoMT in healthcare business over the last five years. This article explains what drove it, what hospitals now actually require, and what it means for how you build your next device.
The shift wasn't sudden. It happened across a decade as hospital IT infrastructure matured and clinical operations became data-dependent in ways that isolated devices simply can't support.
Three forces accelerated it:
When a hospital's entire clinical workflow runs on one platform, every device that can't feed data into that platform creates a documentation gap. A nurse manually transcribing readings from a device screen into the EHR. Hospitals have quantified the cost of that gap in nursing hours, and it's significant. Connected devices eliminate it.
Hospitals that run these reimbursement programmes need devices that transmit data automatically. A device that requires manual data collection can't participate in a programme that reimburses for remote monitoring, which means it can't generate the billing that justifies its presence in the workflow.
IT departments in large hospital networks have developed standardised vendor assessment frameworks. A new device now goes through IT security review, network compatibility assessment, and integration scoping before clinical evaluation. A device that fails IT review never reaches the clinical team. Connectivity requirements are evaluated at the door, not after the product demo.
The result is a procurement environment where IoMT in healthcare business is the norm. A device without connectivity isn't a simpler product , it's an incomplete one.
Connectivity on a hospital procurement checklist is not a single checkbox. It has four distinct dimensions, and a device that passes one but fails another still doesn't move forward.
Hospitals don't just want data from your device. They want data in a format their systems can consume without custom middleware. The dominant standard is HL7 FHIR a data format and API specification that defines how clinical data is structured and exchanged. Epic and Cerner both support FHIR natively. A device that outputs data in a proprietary format requires an integration layer between the device and the EHR, which the hospital's IT team has to build, host, and maintain. Most hospital IT departments won't do this for a new vendor. Your device needs to speak the language the hospital already uses.
What hospitals used to evaluate | What hospital procurement evaluates now |
|---|---|
Clinical accuracy | Clinical accuracy + data output format |
FDA clearance | FDA clearance + cybersecurity documentation |
Battery life | Battery life + OTA update capability |
Price per unit | Price per unit + total integration cost |
Warranty | Warranty + software lifecycle commitment |
Connected devices are attack surfaces. IT departments now apply the same security assessment to medical devices that they apply to any networked endpoint. Encryption in transit, secure authentication, and a defined process for patching vulnerabilities are not optional. A device with no patch mechanism is a device the IT department cannot safely put on their network.
Hospital networks are segmented. Clinical devices typically sit on a dedicated VLAN isolated from administrative systems. A device that behaves unexpectedly on a segmented network excessive broadcast traffic, non-standard port usage, dependency on internet connectivity that isn't available on the clinical VLAN fails network compatibility testing. This is a common failure point for devices designed for home or consumer use that are then sold into hospital environments.
Network scenario | Consumer device behaviour | Hospital ready behaviour |
|---|---|---|
VLAN segmentation | Fails - relies on internet access | Operates fully on isolated clinical VLAN |
Bandwidth usage | Uncontrolled broadcast traffic | Documented, bounded bandwidth footprint |
DNS dependency | Hard coded public DNS | Configurable DNS, works with internal resolver |
Port usage | Non standard or undocumented ports | Documented ports, firewall compatible |
Procurement teams are now asking: how long will this device be supported? What happens when a vulnerability is discovered in year three? Who patches it, and how? A device with no defined software lifecycle policy is a long-term liability. Hospitals want a documented commitment to ongoing security maintenance before they deploy.
The cost of treating connectivity as a feature in an IoMT in healthcare business context shows up at one of two points: the procurement conversation or the re-submission.
At the procurement conversation, a device that lacks interoperability or has no defined security posture gets excluded from the evaluation before clinical teams see it. This is a revenue problem. The device may be clinically excellent, it never gets the chance to prove it because it doesn't pass IT review.
At re-submission, a device that gained FDA clearance without a cybersecurity plan and then needs to add connectivity faces a new submission. FDA's updated guidance requires cybersecurity documentation as part of the premarket submission for devices with connectivity features. Adding connectivity post-clearance means starting the regulatory process again for that submission.
Teams that scope connectivity requirements at the start of development avoid both problems. The architecture is built to pass hospital IT review. The regulatory documentation covers the connectivity scope from the beginning. There is no rework cycle.
IoMT in healthcare business requirements have direct implications for three decisions that must happen early in the development process — before a schematic exists.
Protocol selection is a day-one architecture decision. Choosing BLE versus Wi-Fi versus cellular versus wired Ethernet determines your device's network compatibility, power budget, and regulatory scope. BLE works well for wearables but is not appropriate for continuous bedside monitoring that requires reliable high-frequency data transmission. Wi-Fi introduces network compatibility requirements that must be designed around. Cellular adds recurring connectivity cost that changes your business model. These trade-offs cannot be resolved at the firmware layer, they are hardware decisions that define the product category.
Security architecture is embedded in the firmware from the start. Secure boot, encrypted storage, certificate-based authentication, and encrypted data transmission are not features that get added in a later sprint. They require specific hardware support - a secure element or trusted execution environment and they define the BSP from the ground up. A firmware team that inherits a hardware design without these capabilities cannot add them by writing different code.
The data model defines the integration scope. What fields the device transmits, in what format, at what frequency, and to which endpoint determines whether the EHR integration is a configuration task or a six-month engineering project. FHIR resource mapping for a vital signs device is straightforward when the data model was designed with FHIR in mind. It becomes a significant rework when the data model was designed for a proprietary mobile app and then needs to be mapped to clinical data standards retroactively.
Decision | If made at design time | If retrofitted post-development |
|---|---|---|
Protocol selection | Optimised for clinical network | Board respin likely required |
Security architecture | Built into BSP and hardware | Firmware rewrite + possible hardware revision |
Data model | FHIR native from day one | Mapping layer added on top , ongoing maintenance |
OTA mechanism | Designed into firmware architecture | Added as Afterthought, reliability issues |
IoMT in healthcare business has fundamentally changed what a medical device needs to be before it can sell into hospital environments. Clinical performance is still what matters in the room, but you have to get into the room first. Connectivity, security, interoperability, and software lifecycle are the entrance exam. Devices that haven't prepared for it don't get to show their clinical results.
The teams building medical devices that win hospital procurement are not doing anything exotic. They are scoping connectivity as a first-class requirement from day one, selecting hardware that supports the security architecture the hospital will demand, and designing a data model that doesn't need to be rebuilt when the first EHR integration conversation happens.
If you are scoping a connected medical device and want to know whether your current architecture will pass hospital procurement review. CoreFragment's team has built IoMT products through FDA clearance and into hospital deployment. We can review your connectivity approach and flag the gaps before they become delays.