All transmitted data is encrypted in process and at rest. Data is de-identified and
secure from ingest to output. Device data is ingested by the gateway and securely
sent to an AWS instance where it is then parsed for use downstream. Parsed data is
reassembled, contextualized and shipped to authorized internal and external
applications.