CRA vulnerability notification obligations take effect in September 2026 — early warning within 24 hours. When the SBOM lives in one tool, production records in another, and update status in a third, that timeline is impossible to meet. OnBoardTM IoT Security (OBIS) keeps all three on the same evidence chain — so the path from a CVE to the affected device serial resolves in a single query.
SecOps teams do not need another vulnerability feed. They need to answer — quickly, reliably, and with an auditable record — what a given CVE means for the devices they shipped. Each of these questions has a structured answer when SBOM, VEX decisions, and device history share the same data model.
Each binding happens at the moment the data is created. The device asset record reflects the device's current state — patched devices drop off the exposure map without manual reconciliation.

When OBIS matches a new CVE to a Production Version, it creates an assessment workflow. The security analyst evaluates the impact and records one of four VEX dispositions.
Bring a recent CVE. A 30-minute walkthrough covers the exposure map, the VEX disposition flow, and remediation coverage data against a representative fleet.