CRA-compliant with Hays
without tying up resources
We get your products with digital elements safely through EU certification.
These customers
already trust us

How we are there for you
We are familiar with the complex legal and technical requirements of the Cyber Resilience Act and develop practical, realisable strategies for you. We understand the ambiguities and challenges of implementing new regulations within existing corporate structures.
We offer a comprehensive view of your CRA challenges and optimise your organisation, processes and IT systems.
What happens after
you contact us




What is the
Cyber Resilience Act?

The ultimate CRA checklist: Are you prepared?
What do you
need to do?
Requirements for
affected companies
Cybersecure development
Conformity assessment and CE marking
Categorisation according to risk classes
Cybersecurity throughout the entire product life cycle
Security update and vulnerability management
Software bill of materials
User information
Responsibilities in the supply chain
Liability and sanctions
Contact
us now
FAQ
This includes all hardware and software products that can be directly or indirectly connected to a device or network, such as smartphones, smart home devices, industrial systems, B2B software and mobile applications that are provided commercially.
"Important" or "critical" refers to products with higher cybersecurity relevance that are listed in Annexes III and IV of the CRA regulation , such as firewalls or smart cards, and require more stringent third-party conformity assessment procedures.
"Security by design" means integrating cybersecurity into the product development process from the outset, while "secure by default" requires products to be delivered with the most secure default settings that require minimal user intervention.
The Software Bill of Materials (SBOM) is a detailed inventory of all software components and their dependencies used in a product, comparable to a list of ingredients for food.
CVE (Common Vulnerabilities and Exposures) monitoring is the continuous monitoring and management of known security vulnerabilities in products and their components in order to identify, fix and report them as quickly as possible.