{"id":13073,"date":"2026-01-12T07:26:12","date_gmt":"2026-01-12T15:26:12","guid":{"rendered":"https:\/\/www.coretechnologies.com\/blog\/?p=13073"},"modified":"2026-01-12T07:30:11","modified_gmt":"2026-01-12T15:30:11","slug":"eu-cyber-resilience-act","status":"publish","type":"post","link":"https:\/\/www.coretechnologies.com\/blog\/company\/eu-cyber-resilience-act\/","title":{"rendered":"Q&#038;A: Do You Comply With The EU Cyber Resilience Act (CRA)?"},"content":{"rendered":"<div align=\"center\"><img loading=\"lazy\" decoding=\"async\" class=\"no-lazy-load\" src=\"\/blog\/images\/do-you-comply-with-eu-cyber-resilience-act.webp\" style=\"margin-bottom:20px;\" title=\"Do You Comply with the EU Cyber Resilience Act (CRA)?\" alt=\"Do You Comply with the EU Cyber Resilience Act (CRA)?\" border=\"0\" width=\"380\" height=\"160\" \/><\/div>\n<div class=\"blog-qa-question-box\">\n<img loading=\"lazy\" decoding=\"async\" class=\"no-lazy-load\" src=\"https:\/\/cdn.coretechnologies.com\/images\/quotes-transparent-21x21.webp\" width=\"21\" height=\"21\" \/>&nbsp;&nbsp;I work for a large technology company based in Germany. Last year, we bought an <a href=\"\/products\/AlwaysUp\/AlwaysUp_Versions.html#UnlimitedOEM\">Unlimited OEM License for AlwaysUp<\/a> and integrated it into our industrial automation delivery chain.<\/p>\n<p>As an important supplier, we want to ensure that your company takes a holistic approach to Cybersecurity. And in particular, we&#8217;d like to know if you&#8217;ll be implementing the new <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/cyber-resilience-act\" target=\"_blank\">EU Cyber Resilience Act (CRA)<\/a>. Please provide a short statement.<\/p>\n<p>If your product will comply, we can rely on that. If you cannot confirm conformity (mostly in case delivery is done outside the EU market), we may have to analyze further effects on our side and raise additional requests\/requirements.<\/p>\n<p align=\"right\">&mdash; Michael S.<\/p>\n<\/div>\n<p>Hi Michael, thanks for reaching out.<\/p>\n<p>Even though we&#8217;re based in the USA, our team has been tracking this new EU regulation ever since it started taking shape in 2023. It soon became clear that the CRA would impact us since we have many customers deploying our software in the EU.<\/p>\n<p>But let&#8217;s start at the beginning.<\/p>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<h2 class=\"blog-caption\">What is the Cyber Resilience Act (CRA)?<\/h2>\n<p>The <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/cyber-resilience-act\" target=\"_blank\">EU Cyber Resilience Act<\/a> enhances cybersecurity standards for hardware and software products by requiring manufacturers and retailers to infuse cybersecurity throughout the lifecycle of their products. It came into force in November 2024 and organizations in the European Union have until December 2027 to achieve full compliance.<\/p>\n<p>Our company isn&#8217;t located in the EU and we don&#8217;t make any hardware products. But we do create software used by EU companies. As such, <b>we must help our EU customers adhere to the CRA<\/b>.<\/p>\n<p>Fortunately the CRA aligns with other global standards &mdash; like <a href=\"https:\/\/www.iso.org\/standard\/27001\" target=\"_blank\">ISO 27001:2022<\/a> &mdash; which we already embrace. So let&#8217;s review what we have in place today.<\/p>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<h2 class=\"blog-caption\">We&#8217;re serious about security<\/h2>\n<p>To understand we do today, please review this article detailing <a href=\"\/blog\/company\/secure-software-practices\/\">how we keep our software (and company) safe and secure<\/a>. There, you&#8217;ll see that we&#8217;ve infused information security best practices throughout our processes and practices.<\/p>\n<p>But even though there&#8217;s overlap with the CRA and other time-tested standards, the new regulation brings its own perspectives. It deserves dedicated examination. Therefore, from our viewpoint as a US-based software producer, we&#8217;ll review 10 major requirements of the CRA and briefly describe how we support you and other EU organizations in each area.<\/p>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<h2 class=\"blog-caption\">CRA Requirement #1: No exploitable vulnerabilities<\/h2>\n<p style=\"font-style:italic;\">Don&#8217;t ship software with serious flaws<\/p>\n<h3 class=\"smaller\"><img decoding=\"async\" src=\"\/images\/check-mark-14x14.png\" style=\"vertical-align:text-bottom;\"> How we help you to comply<\/h3>\n<p>It\u2019s very important to check for malware at every stage of the software production pipeline. And, most importantly, the final product must be pristine. That&#8217;s why we engage third-party services to verify that nothing strange has crept into our software.<\/p>\n<p>For example, before release, we run all our applications through <a href=\"https:\/\/www.virustotal.com\/\" target=\"_blank\">Virustotal<\/a> &mdash; a well-respected online virus-scanning engine owned by Google. We halt the release if any critical or high vulnerabilities are detected.<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/service-protector-virustotal-summary.png\" class=\"zoomPopup\" title=\"Service Protector Virustotal Summary\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/service-protector-virustotal-summary.png\" title=\"Service Protector Virustotal Summary (click to enlarge)\" alt=\"Service Protector Virustotal Summary\" border=\"1\" style=\"border-color:#d0d0d0\" width=\"520\" \/><\/a><\/div>\n<p>The bottom line: The software we provide to customers is free of major known vulnerabilities at the time it&#8217;s shipped.<\/p>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<h2 class=\"blog-caption\">CRA Requirement #2: A secure default configuration<\/h2>\n<p style=\"font-style:italic;\">Make software as secure as possible out-of-the-box<\/p>\n<h3 class=\"smaller\"><img decoding=\"async\" src=\"\/images\/check-mark-14x14.png\" style=\"vertical-align:text-bottom;\"> How we help you to comply<\/h3>\n<p>Both <a href=\"\/products\/AlwaysUp\/\">AlwaysUp<\/a> and <a href=\"\/products\/ServiceProtector\/\">Service Protector<\/a>:<\/p>\n<ol style=\"margin-bottom:24px\">\n<li>\n<p>Must be installed by an administrator<\/p>\n<\/li>\n<li>\n<p>Are installed to a protected folder in &#8220;C:\\Program Files (x86)&#8221; by default<\/p>\n<\/li>\n<li>\n<p>Must be run by an administrator<\/p>\n<\/li>\n<\/ol>\n<p>There&#8217;s no way around those important, default safeguards.<\/p>\n<p>Furthermore, there are no &#8220;default passwords&#8221; of any kind.<\/p>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<h2 class=\"blog-caption\">CRA Requirement #3: Regular security updates<\/h2>\n<p style=\"font-style:italic;\">Establish a method of resolving vulnerabilities discovered after the software was installed<\/p>\n<h3 class=\"smaller\"><img decoding=\"async\" src=\"\/images\/check-mark-14x14.png\" style=\"vertical-align:text-bottom;\"> How we help you to comply<\/h3>\n<p>It&#8217;s company policy to issue a patch for critical and high vulnerabilities within 30 days of their discovery. Medium and Low vulnerabilities are addressed as part of regularly scheduled quarterly or annual releases.<\/p>\n<p>However, as purveyors of software that must operate 24\/7\/365, we do not support <a href=\"\/blog\/alwaysup\/survive-automatic-updates\/\">unattended, automatic updates<\/a> because they&#8217;re too dangerous. We leave it to customers to deploy updates manually &mdash; after sufficient testing and at a time of their choosing. We keep customers informed of security issues by posting security bulletins on <a href=\"\/blog\/\">our active blog<\/a>.<\/p>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<h2 class=\"blog-caption\">CRA Requirement #4: Protection from unauthorized access<\/h2>\n<p style=\"font-style:italic;\">Ensure that the software is accessible only to those who are allowed to use it<\/p>\n<h3 class=\"smaller\"><img decoding=\"async\" src=\"\/images\/check-mark-14x14.png\" style=\"vertical-align:text-bottom;\"> How we help you to comply<\/h3>\n<p>AlwaysUp and Service Protector are restricted to administrators only. A standard user without admin rights cannot start either of the programs on his own.<\/p>\n<p>If a standard user attempts to start AlwaysUp, Windows prompts for admin credentials:<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/uac-prompts-for-admin-credentials.png\" class=\"zoomPopup\" title=\"Windows prompts for admin credentials when starting AlwaysUp\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/uac-prompts-for-admin-credentials.png\" title=\"Windows prompts for admin credentials when starting AlwaysUp (click to enlarge)\" alt=\"Windows prompts for admin credentials when starting AlwaysUp\" border=\"0\" \/><\/a><\/div>\n<p>That important safeguard prevents untrusted (or untrained) individuals from updating your critical applications and services.<\/p>\n<p>Furthermore, after you install your program as a service with AlwaysUp, you have the power to enforce who can start, stop, restart or edit the service.<\/p>\n<p>That capability is available by selecting <b>Advanced &gt; Service Security Settings<\/b> from the <b>Application<\/b> menu:<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/alwaysup-open-service-security-settings.png\" class=\"zoomPopup\" title=\"Open service security settings\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/alwaysup-open-service-security-settings.png\" title=\"Open service security settings (click to enlarge)\" alt=\"Open service security settings\" border=\"0\" width=\"520\" \/><\/a><\/div>\n<p>From there, it&#8217;s easy for you to specify what each user can do. For example, here&#8217;s how we allow Hazel Jones to start or stop the service, but not to modify or delete it:<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/allow-user-to-start-stop-service.png\" class=\"zoomPopup\" title=\"Allow Hazel to start or stop the service only\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/allow-user-to-start-stop-service.png\" title=\"Allow Hazel to start or stop the service only (click to enlarge)\" alt=\"Allow Hazel to start or stop the service only\" border=\"0\" \/><\/a><\/div>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<h2 class=\"blog-caption\">CRA Requirement #5: Data confidentiality<\/h2>\n<p style=\"font-style:italic;\">Maintain the confidentiality of all data processed<\/p>\n<h3 class=\"smaller\"><img decoding=\"async\" src=\"\/images\/check-mark-14x14.png\" style=\"vertical-align:text-bottom;\"> How we help you to comply<\/h3>\n<p>None of our products collect personal data.<\/p>\n<p>And when our applications communicate with our servers &mdash; for example when checking for updates or assigning a license &mdash; all data is encrypted in transit over HTTPS.<\/p>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<h2 class=\"blog-caption\">CRA Requirement #6: Data integrity<\/h2>\n<p style=\"font-style:italic;\">Protect data collected from manipulation or modification<\/p>\n<h3 class=\"smaller\"><img decoding=\"async\" src=\"\/images\/check-mark-14x14.png\" style=\"vertical-align:text-bottom;\"> How we help you to comply<\/h3>\n<p>By design, we intentionally limit the data stored by our applications. That&#8217;s because our strong preference is to delegate all data persistence to the Windows operating system.<\/p>\n<p>For example, when you set up an application with AlwaysUp:<\/p>\n<ul style=\"margin-bottom:24px\">\n<li>\n<p>Your configuration\/settings are saved in the standard registry entries related to the Windows Services created<\/p>\n<\/li>\n<li>\n<p>Any account passwords you supply are saved and protected by Windows itself (the same way it handles other passwords)<\/p>\n<\/li>\n<\/ul>\n<p>That is, there is no separate repository of data managed by AlwaysUp. And we rely on Windows to protect any settings we collect from manipulation or modification.<\/p>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<h2 class=\"blog-caption\">CRA Requirement #7: Minimize data collection<\/h2>\n<p style=\"font-style:italic;\">Don&#8217;t collect and process data unless it&#8217;s absolutely necessary<\/p>\n<h3 class=\"smaller\"><img decoding=\"async\" src=\"\/images\/check-mark-14x14.png\" style=\"vertical-align:text-bottom;\"> How we help you to comply<\/h3>\n<p>As mentioned before, we intentionally limit the data collected and stored by our applications. And none of our products collect personal data.<\/p>\n<p>That&#8217;s by design. We simply don&#8217;t want the responsibilities, requirements and headaches that come with collecting unnecessary information!<\/p>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<h2 class=\"blog-caption\">CRA Requirement #8: Protect essential functions<\/h2>\n<p style=\"font-style:italic;\">Employ methods to survive cyber attacks and other onslaughts<\/p>\n<h3 class=\"smaller\"><img decoding=\"async\" src=\"\/images\/check-mark-14x14.png\" style=\"vertical-align:text-bottom;\"> How we help you to comply<\/h3>\n<p>AlwaysUp and Service Protector are all about protecting essential functions. It&#8217;s not a stretch to say that simply using our products demonstrates your commitment to surviving crashes, human error, and other exceptions &mdash; just as the CRA demands.<\/p>\n<p>Our software can also help you protect your systems from cyber attacks. For example, you can have AlwaysUp run your security monitoring components 24\/7. And in that scenario, even if a hacker kills your application, AlwaysUp will be there to restart protection in a few seconds.<\/p>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<h2 class=\"blog-caption\">CRA Requirement #9: Limit attack surfaces<\/h2>\n<p style=\"font-style:italic;\">Minimize interfaces and other points of vulnerability when designing and implementing software<\/p>\n<h3 class=\"smaller\"><img decoding=\"async\" src=\"\/images\/check-mark-14x14.png\" style=\"vertical-align:text-bottom;\"> How we help you to comply<\/h3>\n<p>Security always has a front row seat whenever we design and build software.<\/p>\n<p>For example, with AlwaysUp:<\/p>\n<ul style=\"margin-bottom:24px\">\n<li>\n<p>There are no open\/listening TCP\/IP ports<\/p>\n<\/li>\n<li>\n<p>All communication is encrypted in transit<\/p>\n<\/li>\n<li>\n<p>Program settings (including passwords) are stored by the operating system and accessed via Windows API functions<\/p>\n<\/li>\n<li>\n<p>Only administrators can run the program<\/p>\n<\/li>\n<\/ul>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<h2 class=\"blog-caption\">CRA Requirement #10: Logging &amp; monitoring<\/h2>\n<p style=\"font-style:italic;\">Implement event logging and reporting<\/p>\n<h3 class=\"smaller\"><img decoding=\"async\" src=\"\/images\/check-mark-14x14.png\" style=\"vertical-align:text-bottom;\"> How we help you to comply<\/h3>\n<p>Both AlwaysUp and Service Protector write detailed, timestamped messages to the <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/eventlog\/event-logging\" target=\"_blank\">Windows Event Logs<\/a>. If you&#8217;re curious, <a href=\"\/products\/AlwaysUp\/EventLog.html\">this page<\/a> documents the information, errors and warnings reported by AlwaysUp.<\/p>\n<p>Specifically, AlwaysUp writes entries to the Application event log. You can browse those records using the <a href=\"\/blog\/windows-services\/event-viewer-troubleshoot-windows-services\/\">Event Viewer<\/a>:<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/event-viewer-alwaysup-application-logs.png\" class=\"zoomPopup\" title=\"Event Viewer shows the AlwaysUp logs\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/event-viewer-alwaysup-application-logs.png\" title=\"Event Viewer shows the AlwaysUp logs (click to enlarge)\" alt=\"Event Viewer shows the AlwaysUp logs\" border=\"0\" width=\"520\" \/><\/a><\/div>\n<p>It&#8217;s important to realize that because our products support standard Windows logging methods, customers can easily feed those records into a <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-siem\" target=\"_blank\">SIEM<\/a> or other central repository. As such, our logging and reporting is readily compatible with professional, enterprise systems.<\/p>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<p>Hopefully this article demonstrates our commitment to the principles behind the Cyber Resilience Act. Needless to say, we&#8217;ll continue to monitor the emerging regulation and react to any amendments introduced before 2027.<\/p>\n<p style=\"margin-top: 30px\">\nStay safe!\n<\/p>\n<div style=\"margin-top:30px\" align=\"center\">\n<div class=\"cta-button-1\">\n<table role=\"presentation\" cellspacing=\"0\" cellpadding=\"0\" border=\"0\" align=\"left\">\n<tbody>\n<tr>\n<td align=\"center\"><a href=\"\/blog\/tag\/security\/\" title=\"More articles about security\"><span><nobr>More articles about security&#8230;<\/nobr><\/span><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<!-- relpost-thumb-wrapper --><div class=\"relpost-thumb-wrapper\"><!-- filter-class --><div class=\"relpost-thumb-container\"><style>.relpost-block-single-image, .relpost-post-image { margin-bottom: 10px; }<\/style><h3>You may also like...<\/h3><div style=\"clear: both\"><\/div><div style=\"clear: both\"><\/div><!-- relpost-block-container --><div class=\"relpost-block-container relpost-block-column-layout\" style=\"--relposth-columns: 3;--relposth-columns_t: 2; --relposth-columns_m: 2\"><a href=\"https:\/\/www.coretechnologies.com\/blog\/alwaysup\/dropbox-not-working\/\"class=\"relpost-block-single\" ><div class=\"relpost-custom-block-single\"><img decoding=\"async\" loading=\"lazy\" class=\"relpost-block-single-image\" alt=\"Dropbox Version 81.4.195 (September 18, 2019) Not Working With AlwaysUp For Some Customers\"  src=\"https:\/\/www.coretechnologies.com\/blog\/wp-content\/uploads\/dropbox-experiencing-issues-150x150-150x123.png\" style=\"aspect-ratio:1\/1\" style=\"aspect-ratio:1\/1\"><\/img><div class=\"relpost-block-single-text\"  style=\"height: 75px;font-family: Arial;  font-size: 12px;  color: #333333;\"><h2 class=\"relpost_card_title\">Dropbox Version 81.4.195 (September 18, 2019) Not Working With AlwaysUp For Some Customers<\/h2><\/div><\/div><\/a><a href=\"https:\/\/www.coretechnologies.com\/blog\/alwaysup\/close-dialog-boxes-nircmd\/\"class=\"relpost-block-single\" ><div class=\"relpost-custom-block-single\"><img decoding=\"async\" loading=\"lazy\" class=\"relpost-block-single-image\" alt=\"Q&amp;A: Can AlwaysUp Close Dialog Boxes From My Application?\"  src=\"https:\/\/www.coretechnologies.com\/blog\/wp-content\/uploads\/dismiss-dialog-boxes-150x150-1.webp\" style=\"aspect-ratio:1\/1\" style=\"aspect-ratio:1\/1\"><\/img><div class=\"relpost-block-single-text\"  style=\"height: 75px;font-family: Arial;  font-size: 12px;  color: #333333;\"><h2 class=\"relpost_card_title\">Q&amp;A: Can AlwaysUp Close Dialog Boxes From My Application?<\/h2><\/div><\/div><\/a><a href=\"https:\/\/www.coretechnologies.com\/blog\/windows-services\/why-windows-service-starts\/\"class=\"relpost-block-single\" ><div class=\"relpost-custom-block-single\"><img decoding=\"async\" loading=\"lazy\" class=\"relpost-block-single-image\" alt=\"Q&amp;A: Why did my Windows Service Start Unexpectedly?\"  src=\"https:\/\/www.coretechnologies.com\/blog\/wp-content\/uploads\/why-did-windows-service-start-150x150-1.png\" style=\"aspect-ratio:1\/1\" style=\"aspect-ratio:1\/1\"><\/img><div class=\"relpost-block-single-text\"  style=\"height: 75px;font-family: Arial;  font-size: 12px;  color: #333333;\"><h2 class=\"relpost_card_title\">Q&amp;A: Why did my Windows Service Start Unexpectedly?<\/h2><\/div><\/div><\/a><\/div><!-- close relpost-block-container --><div style=\"clear: both\"><\/div><\/div><!-- close filter class --><\/div><!-- close relpost-thumb-wrapper -->","protected":false},"excerpt":{"rendered":"<p>&nbsp;&nbsp;I work for a large technology company based in Germany. Last year, we bought an Unlimited OEM License for AlwaysUp and integrated it into our industrial automation delivery chain. As an important supplier, we want to ensure that your company &hellip; <a href=\"https:\/\/www.coretechnologies.com\/blog\/company\/eu-cyber-resilience-act\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":13087,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[312],"tags":[26,389,378,127,143,147],"class_list":["post-13073","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company","tag-alwaysup-tag","tag-cyber-resilience-act","tag-iso-27001","tag-qa","tag-security","tag-service-protector-tag"],"_links":{"self":[{"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/13073","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/comments?post=13073"}],"version-history":[{"count":20,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/13073\/revisions"}],"predecessor-version":[{"id":13317,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/13073\/revisions\/13317"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/media\/13087"}],"wp:attachment":[{"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/media?parent=13073"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/categories?post=13073"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/tags?post=13073"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}