Professional Cybersecurity Assessors
Compliance ready findings, evidence and fixes.
Professional Cybersecurity Assessors
Compliance ready findings, evidence and fixes.
Signed in as:
filler@godaddy.com
Compliance ready findings, evidence and fixes.
Compliance ready findings, evidence and fixes.
At XtraByte, our mission is for clients to declare cybersecurity conformance for their radio devices as quick and hassle free. We create the technical files, provide guidance on user docs for reflecting the new cybersecurity aspects and conducted in-depth system reviews. Individualized penetration tests and vulnerability scans ensure protection of the end user and critical digital assets. At every step of the way, our goal is to provide guidance and support to ensure your equipment meets conformance and operates safely and securely in an ever-evolving cyber landscape.
We make sure only the right people and devices can touch the things that matter so misconfigurations don’t become breaches.
What we Test: Roles, sessions, MFA, access rules, authentication mechanisms
What you Get: Clear access matrix, proof of bypasses (if any), and fast fixes
Our thorough testing of your update process will ensure your costumers can never install bad, old, and tampered firmware. Only signed updates land, and recovery will be safe and repeatable.
What we test: Signature checks, TLS/pinning, anti-rollback, A/B or DFU recovery.
What you get: Pass/fail evidence, rollback fencing results, and a hardening checklist.
Our test suite target secrets at rest, including stored passwords, keys and tokens and identifying weak cryptography choices. If it’s worth stealing, we try to steal it; if it’s weak, we make it strong.
What we test: Password hashing policy, key custody (SE/TPM vs. filesystem), crypto algorithms/modes.
What you get: “Secrets map,” crypto bill of materials, and prioritized changes.
A mix of eavesdropping, tampering, and replay techniques on the wire and over the air will prove your network, Bluetooth and API transport security defenses will hold up in all environments.
What we test: TLS 1.2/1.3 config, mTLS for devices, BLE Secure Connections, replay/nonce handling.
What you get: Protocol hardening diffs and packet-level proof of protection.
Our network flooding, fuzzing, and throttling tests will make sure your product stays stable under pressure, and that your monitoring system in place sees smoke before there's fire.
What we test: Rate limits, traffic filters/ACLs, logging/alerting pipelines.
What you get: DoS thresholds, alert trails, and practical resilience tweaks.
We verify the product only collects what it must, protects it in transit and at rest, and gives users simple, transparent controls.
What we test: Data minimization, consent/controls, telemetry defaults, retention.
What you get: A privacy risk list with specific, low-friction changes.
XBC ensures engineering effort turns into compliance outcomes. Feel "Xtra" secure adding EN 18031 to your Deceleration of Conformance. We'll provide a completed ICS and IXITs, clause-mapped test plan, evidence bundles from test outputs, and a clear remediation tracker if necessary. Full support is provided after assessment regarding any failed tests or weak points.
An integral part of penetration-testing and included heavily in ETSI 303 645 are CVE scans to check for current known vulnerabilities in specific operation systems, libraries and protocols.
Ample and upgraded documentation of your systems' threat-model and attack surfaces are key to addressing vulnerabilities and common among audits.
Auditing application source code, server configuration, infrastructure configuration, and architecture is one of the most effective ways of identifying vulnerabilities in a system. Technical audit an d review approaches include:
Less technical considerations might include data classification and labelling, review of the physical environment, and personnel security.
Please reach us at xbc@xtrabyte.com if you cannot find an answer to your question.
Yes.
EN 18031, design to matched RED Articles 3. (d), (e) and (f) includes all internet connected devices. "Internet-connected" is defined in the Delegated Regulation (EU) 2022/30 Article 1.1 as "any equipment that can communicate over the internet, whether it communicates directly or via other equipment." (See definition here) Guidance from TUV SUD and UL repeats the same: if a device's data ultimately exits to the Internet by hitch-hiking on another product, it is still in scope.
Similarly, regardless of whether the product is consumer or facing or not EN 18031 still applies.
Short version: August 1, 2025.
From that date, any radio equipment placed on the EU market that falls under RED Art. 3(3)(d)(e)(f) must comply. You don’t have to use EN 18031, but if you do (EN 18031-1/-2/-3), you get “presumption of conformity.” The EN 18031 references were published in the OJEU on Jan 30, 2025, so you can already cite them on your EU Declaration of Conformity.
By Aug 1, 2025: all new units you place on the market must meet the cybersecurity requirements. Stock already placed before that date can continue to be made available (sold through).
Of course.
However, many believe the peace of mind and possible legal troubles or shipment hold-ups far outweigh the cost of a week of penetration testing. That said, If you firmly believe your product will pass all tests and already conforms, XtraByte will, bearing no responsibility, build your technical file (ICS/IXIT, threat model/VA summary, test evidence (ACM/AUM/SUM/SSM/SCM), and trace to clauses) and update your DoC (list RED 2014/53/EU Art. 3(3)(d)(e)(f) and (optionally) EN 18031-1/-2/-3) and ensure CE marking and user docs reflect the new cybersecurity aspects (privacy/data protection where applicable) without testing.
At XtraByte, we were founded by a software enginee
Over the years, we have grown from a small startup to a leading provider of cybersecurity solutions. Our commitment to innovation, customer service, and quality has helped us build a loyal customer base and establish ourselves as a trusted partner in the industry.
At XtraByte, we believe that cybersecurity is not just about technology, but also about people and processes. We take a holistic approach to cybersecurity, working with our clients to develop customized solutions that address their unique needs.
We know that our clients have unique needs. Send us a message, and we will get back to you soon.
Mon | 07:00 am – 08:00 pm | |
Tue | 07:00 am – 08:00 pm | |
Wed | By Appointment | |
Thu | 07:00 am – 08:00 pm | |
Fri | 07:00 am – 08:00 pm | |
Sat | 11:00 am – 03:00 pm | |
Sun | 11:00 am – 03:00 pm |
Get 10% off your first purchase when you sign up for our newsletter!
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.