Global Regulatory Approval
Design, develop, and ship secure medical devices that meet modern regulatory requirements using ELTON
Overview
Premarket Confidence for Streamlined Postmarket
ELTON helps manufacturers accelerate premarket regulatory approval and avoid mid-submission delays l by ensuring that medical devices are built to FDA standards on a secure and resilient foundation from day one. Through software vulnerability discovery, continuous cybersecurity testing, and context-aware CVSS scoring, ELTON equips teams with accurate, actionable insights throughout the design and development process.
Identify Early to Avoid Delays
By providing platform vulnerability capabilities premarket, ELTON ensures each development software release continuously improves, vulnerability risks are well understood, and regulatory expectations are met long before submission. The result is a continuously improving security posture that streamlines FDA review and reduces costly rework late in the lifecycle.
Postmarket Continuity
When ELTON is engaged during premarket development, it already understands the product’s architecture, software components, and risk posture by the time regulatory submission occurs. This continuity streamlines the transition to postmarket monitoring, ensuring that ongoing vulnerability analysis is aligned with the same context, structure, and documentation previously submitted to the regulator.
Why ELTON
600+ Products Approved with ELTON Assistance
We’ve assisted hundreds of products and interfaced with global regulators in response to questions or concerns around the globe.
ELTON embodies years of hands-on regulatory expertise, bringing deep understanding of what it takes to meet premarket expectations the right way—efficiently, defensibly, and without overburdening engineering teams. By helping manufacturers build more secure designs from the start, ELTON reduces the long-term cost of postmarket maintenance, where vulnerabilities are more expensive to address.
Meet DoD/DHA requirements for Authority-to-Operate (ATO)
The platform’s robust capabilities such as SBOM generation, continuous CVE monitoring, contextual vulnerability scoring, and audit-ready reporting align closely with key ATO expectations, including ongoing risk assessment, vulnerability tracking, and patch planning. By streamlining evidence collection and integrating vulnerability management into the full product lifecycle, ELTON reduces duplication of effort between civilian and military regulatory pathways.
Regulations
ELTON Meets Global Cybersecurity Regulations
Do it right the first time, for all markets
Starting in 2014 the US FDA released premarket guidance for cybersecurity and further introduced an update in 2023 with expansive additions. The US FDA release postmarket cybersecurity guidance in 2016 that remains in effect today.
In the EU, 74/2017 (MDR) and 746/2017 (IVDR) called the Medical Device Regulations are requiring all medical devices sold in the EU be recertified to enhanced cybersecurity standards. TheMedical Device Coordinating Group (MDCG) provided guidance for meeting the EU Medical Device Regulation (MDR) as it pertains to cybersecurity (MDR MDCG 2019-16).
China (CFDA) Cybersecurity Law (CSL) is the administration of medical devices in China, where as of 2018 medical devices must be assessed for cybersecurity protection under the Principles on Guiding Technology Examination of Medical Device Cybersecurity Registration (CFDA Guidelines).
Japanese regulation stipulates that, in addition to the conformity to the JIS T 2304 (IEC 62304), for medical devices connected to other IT devices and medical devices connected to the Internet, cyber security measures based on JIS T 81001-5-1 (IEC 81001-5-1) are required to reduce cyber security risks to acceptable levels. This new regulation was put into practice on April 1, 2023, with a one-year transitional period until March 31, 2024.
Get Faster Regulatory Approval by Meeting Premarket Guidance
Improper documentation will result in outright rejection
Meet global regulatory expectations the first time with ELTON’s cybersecurity testing and vulnerability management platform, purpose-built to support FDA and international premarket requirements. ELTON executes and documents all necessary cybersecurity activities such as SBOM generation, penetration testing, CVE triage, and risk analysis in the format expected by regulators, reducing the risk of delays or rejections due to missing or incomplete documentation. Unlike traditional services that require costly tools and dedicated teams, ELTON delivers a complete, subscription-based solution that streamlines compliance and reduces overhead for manufacturers and startups alike.
Threat Modeling
Mitigation Development
Vulnerability Analysis
Risk Analysis
Software Composition & Vulnerability Analysis
Software Bill of Materials (SBOM) Generation
Secure Code Analysis
SAST/DAST Scanning
Penetration Testing
Fuzz Testing
Robustness Testing
Security Views of Architecture
Security Verification & Validation
Security Risk Management Reporting
Meet the Evolving challenges of postmarket
Cybersecurity is ever-evolving and the approach unique
How a manufacturer continuously predicts, identifies, and mitigates potential cybersecurity issues in a fleet of products is a new and evolving process for product security teams that don’t traditionally operate in this fashion.
Each postmarket cybersecurity issue requires an assessment to assure regulators your device has appropriately evaluated cybersecurity threats, identified vulnerabilities, mitigated them to an acceptable level, and documented the entire process appropriately.
Postmarket Activities
Get Proactive with Postmarket Cybersecurity
The 2016 US FDA Postmarket Cybersecurity guidance requires manufacturers to execute a variety of functions once a product is on the market and evidence that they possess the capability during premarket submission. Level Nine provides a complete solution for postmarket cybersecurity management of a product, alleviating manufacturers and startups from the burden of executing a postmarket program requiring expensive software and multiple full-time staffers.
- Annual penetration testing
- Monitoring for vulnerabilities in Software Bill of Materials (SBOM)
- Vulnerability disclosure portal for customers to learn of security issues in the product
- Vulnerability handling process to intake reported vulnerabilities from researchers/customers
- Vulnerability Management process for evaluating vulnerabilities and their risk to the device
- Rapid patching strategy for addressing issues quickly
- End of life cybersecurity planning and customer notification
Authority to operate (ATO)
What is ATO in Medical Device Cybersecurity?
Medical devices sold to DoD or DHA facilities must meet ATO compliance to ensure the device isn’t a threat to the environment it may reside.
The Authority to Operate (ATO) process involves a unique set of operational and technical controls that go beyond traditional regulatory requirements. ELTON supports medical device manufacturers in navigating ATO compliance by aligning existing FDA-focused cybersecurity artifacts with DoD expectations—eliminating duplication of effort. Our team works directly with DoD stakeholders to interpret control applicability, document implementation strategies, and build phased plans for future compliance. ELTON enables a streamlined path to ATO by leveraging the same platform used for premarket FDA submissions.
Assess
Assess the system at the stated DoD risk level.
Enumerate
Enumerate controls from eMASS that the client product has been assigned with (from ISSO).
Develop
Develop the System Security Plan (SSP), security assessment report (SAR), and plan of action and milestones (POAM or POA&M) for client with government templates and in collaboration with technical contact.
Scan
Perform initial scans as required (discovery, full plug-in, and config (STIG).
Insights
Learn More About ELTON
Our security experts regularly share insights and updates from the field.
Premarket Cybersecurity Starts with ELTON
Design, develop, and ship secure medical devices that protect customer data and meet all regulatory requirements.