Secure design
Security-approved hardware and components
Secure boot cycle
Building a root of trust
Secure over-the-air software update
Added firewall
Security event monitoring in field
Secured development via deterministic prevention of remote code execution
SYSGO platform with secure connectivity middleware available
Bundles with 3rd party Security components to keep speed of innovation