Ongoing tracking of current threat patternsIndustry standard security protocolsIrrefutable evidence of identity