Portfolio Analysis

Know Exactly What's Exposed

Complete portfolio review.

Our audit finds every publicly accessible document across your entire FCC filing history and shows you how each one got there.

You Can't Fix What You Can't See

Most companies assume they requested confidentiality. Many didn't. Some requested it but were denied. Without a systematic review, you don't know your actual exposure.

Multiple Products, Multiple Gaps

Different engineers, different test labs, different years. Each filing is a separate opportunity for exposure.

Historical Filings

FCC records go back decades. Discontinued products may still have schematics online.

Test Lab Variance

Some labs default to full disclosure unless you explicitly request protection. Multiple labs means inconsistent practices.

Acquisitions

You inherited their FCC filings and their filing practices. Our audit covers subsidiary filings too.

Audit Scope

Exposure Mapping

We search the FCC database and aggregator sites using your Grantee Code(s), company name variations, and subsidiary identifiers.

Deliverable: Complete inventory of publicly accessible documents

Filing Analysis

For each exposure, we determine what happened. Was confidentiality requested? Granted? Denied? Why?

Deliverable: Filing-by-filing breakdown showing how each exposure occurred

Process Review

Optional

We review your certification workflow: how teams work with test labs, how confidentiality decisions get made, where gaps occur.

Deliverable: Process assessment with specific recommendations

What You Receive

Exposure Report

  • • Complete list of exposed documents
  • • Document types (schematics, BOMs, etc.)
  • • Publication dates
  • • Direct links to source locations
  • • Screenshot evidence

Risk Assessment

  • • Prioritized list by document sensitivity
  • • Business impact evaluation
  • • Recommended remediation order
  • • Cost estimate for full remediation

Action Plan

  • • Step-by-step remediation roadmap
  • • Timeline estimates
  • • Resource requirements
  • • Process improvements (if applicable)

How the Audit Works

1

Day 1-2

Information Gathering

You provide your FCC Grantee Code(s), company name variations, and any subsidiary information. We confirm scope.

2

Day 3-5

Database Scanning

We query FCC databases and aggregator sites. Every document is catalogued, timestamped, and categorized.

3

Day 6-8

Analysis

We examine each exposure to understand how it occurred: missing request, denial, or processing error.

4

Day 9-10

Report Delivery

You receive the complete audit package. We walk you through findings via video call.

This Audit Is Designed For

Enterprise Manufacturers

  • Multiple product lines with FCC certifications
  • History of acquisitions or subsidiaries
  • Multiple test lab relationships over time
  • Need for board-level reporting on IP exposure
  • Compliance or legal teams requiring documentation

Scaling Manufacturers

  • Expanding product portfolio
  • Transitioning from one test lab to another
  • Preparing for due diligence (funding, acquisition)
  • Establishing IP protection processes
  • Need baseline visibility before implementing controls

Custom Pricing for Your Situation

Audit scope varies based on your portfolio size, number of Grantee Codes, and whether you need process review. We provide a fixed-price quote after understanding your specific situation.

What Affects Pricing

  • Number of FCC Grantee Codes to audit
  • Portfolio size (number of certified products)
  • Subsidiary or acquired company filings
  • Optional process review add-on

Audit fees are credited toward remediation. If you proceed with takedowns within 90 days of receiving the audit report, the audit fee applies to your first device remediations.

Questions We Hear Often

How is this different from just running a takedown?

A takedown fixes specific documents you already know about. An audit finds everything, including exposure you didn't know existed. For companies with multiple products or acquisitions, the audit often uncovers filings that were never on anyone's radar.

Can we do this ourselves?

You can search the FCC database manually. However, companies often have multiple Grantee Codes, name variations, and subsidiary filings that don't surface in a simple search. We also check third-party aggregators that mirror FCC data.

What if the audit finds nothing?

Then you have documentation confirming your filings are properly protected. That's a useful compliance record. However, in our experience, most companies with 10+ certified products have at least some exposure.

How long does the audit take?

10 business days from the time we have your company information. Larger portfolios (50+ products) may take slightly longer.

Request an Audit

Tell us about your organization. We'll provide a precise scope and timeline.

Request a Quote

We'll respond within one business day.

After You Submit

We'll respond within one business day with confirmed scope based on our initial search, a fixed-price quote for your specific situation, estimated timeline, and next steps if you want to proceed.