Deploys security protocols directly to edge computing devices to stop threats at the network perimeter.