Ongoing tracking of current threat patterns
Industry standard security protocols
Irrefutable evidence of identity