● End-to-end encrypted messaging
● End-to-end encrypted Voice and Video Conferencing and Screen Share
● End-to-end encrypted File Share
● End-to-end encrypted Integrations with third party data sources
● End-to-end encrypted Records Retention and Audit Trails
● Crisis Response and Notification Reserve Capacity
● Email and Text Alerts