Second is a vendor neutrality that can deftly neutralize any reluctant (or recalcitrant) healthcare IT vendor, and third is a rich history of domain expertise specifically around industrial-strength network security, identitymanagementandauthentication (at scale).
In fact, the authentication techniques used to identity the king are similar to the identity-management techniques we apply in software and hardware to secure critical systems and applications.