 Hi, I'm Michele Sartori, Product Manager at Cushield. Today, IoT devices are widely deployed across industries and they can be highly vulnerable to attacks. To reduce the cybersecurity risk and comply with regulations, it is important to identify the correct security approach. First, you can protect your devices, your firmware, your application and your data to prevent security issues as well as IP and data theft. Second, you can monitor and detect security breaches in real time. And third, you can recover in case of issues by re-securing compromise certificates. So, how do we protect data and intellectual property for IoT devices? Cushield, our application shielding solution at QuartzLab, provides code and data protection technologies that prevents attackers from reverse-engineering applications. Cushield offers 30-plus authentication passes. So, what do they do? They, in fact, help to hide operations and make it extremely hard for attackers to understand how applications behave. Cushield can be used to protect your firmware and application on SD devices. In the demo, you can see how Cushield can be used to complexify a simple code and hide the data it contains with a low-code approach. Once deployed, it can be very complex to have the right feasibility on the security environment of your IoT device fleet. In fact, service operators are frequently unaware of security flaws and vulnerabilities of their fleets. Cushield provisioned two libraries that can be integrated on the backend side and within the SD devices on the other side. This enables you to monitor the security capabilities in real time, which means you can easily monitor the sanity of your fleet and receive alerts in real time that take appropriate actions. Just to talk about the alerts for a minute, you can see them really clearly here. They include the detection of a debugger, the reverse-engineering tools, emulators, and any kind of code and data tampering at runtime. In the demo, you can see how Cushield environment checks can be easily integrated within a Grafana-based monitoring system. In many cases, devices share TLS certificates and out-in-critication credentials like AWS or Microsoft Azure IoT cloud tokens and store them in unprotected configuration files. These certificates can be easily hacked to produce fake data, which makes it difficult to differentiate genuine devices from fake ones. To solve this problem, it means that devices actually need to be recalled. But guess what? We have a solution also for deal. In the demo, you can see how Cushield data protection, integrated with Mandor's Device Configuration Manager, provisions unit keys to ST devices over the year. Update devices can securely authenticate and sign the data sent from the device to the server. You can easily re-secure your devices and better protect your certificates over the year and protect against counterfeiting. To learn more about how you can build your IoT security bright to our experts. Thanks for watching and goodbye.