Secure boot
Guaranteed boot of the device using software trusted by the manufacturer
Secure boot with own electronic digital signature
Loader encryption
Availability of Trust Zone OS, ensuring safe execution of apps working with sensitive data (encryption, encoding/decoding, etc.)
Full control over the early boot stages (integrity checking, automatic update, etc.)
Hardware security
Protecting information and information systems at the hardware level
Hardware isolation of hazardous environment from the protected environment
Hardware encryption key storage
Replaceable mobile communication radio module
Replaceable WiFi/Bluetooth radio module
Encryption of traffic with hardware encoder, with possibility of using own encryption algorithms
Availability of physical switches for hardware shutdown