Network security functions include fingerprint-based dual-factor identity authentication, security configuration control, high real-time communication encryption/decryption, resistance to replay attacks and network storms, and centralized log control
Supports security auditing of real-time control actions and business process operations
Achilles Level 2 certification; communication robustness at top international level