 Welcome to embedded world. Do your products require security? Does your market require security? Do you believe your company needs some help to analyze, understand and implement security? If some of the answers are yes, then ST has a solution for you. It's called STM32 Trust, associated to the great partner offer built around it. STM32 U5 is a great micro for security, state of the art with no rival today. Fast and side-channel protected critical graphic accelerators including for external memory encryption, hardware unique keys for storing the secrets, strengthened trust zone implementation to isolate critical trusted assets for memories and peripherals and that includes your application assets too. And we also provide a robust TFM secure trusted firmware implementation and all of this is protected by a CZIP and PSA level 3 certification including substantial physical attack protection. We understand the complexity of addressing security and that's why we are building a solid offer of partners to simplify your life going from early pre-design activities such as training, consulting, to full implementation to attach to cloud securely like the one we present you on U5 in this booth with Microsoft Azure and its certified cloud connectivity implementation. We also have multiple security libraries like Cryptography Secure Boot of TLS provided by Wolf SSL. Proven Run is offering services for secure trusted execution, Linaro showing how to secure an AI, Twilow turning any device into an edge device and a lot of different offers around router trust, IoT endpoints and digital device identity management solutions like CryptoQuantique, Device Authority, Kudalski, trusted objects or Verify. Let me apologize for all the others I could not mention in this short video. So if you want to know more about STM32 trust and our associated partners, visit our dedicated product webpage on st.com slash STM32 trust or contact your local ST representative. Talk to you soon!