* hardware‑anchored identity
* vulnerability remediation
* encrypted data flows
* isolated compute boundaries
* post‑quantum cryptography