Computer Proliferation Door
Today, each device in a network is usually a computer. Each computer is a door that can be opened. The highly miniaturized footprint of the ROBUST software enables its integration into smart electronics, thereby reducing the number of required computers. As a result: far fewer doors (and reduced costs).
Also, ROBUST can run without access to the Internet, so no cyber-attack on the Web can stop operations. When access to the Web is restored ROBUST easily resynchronizes with the cloud.
Hardware/software Fragmentation door
By design, general-purpose computers must allow any software to use them. As a result, their hardware cannot provide any level of protection against malicious use. In contrast, a ROBUST system can consist of a custom computer in which hardware and software are keyed together so that only the ROBUST software will run. Simply put: No hardware door that hackers can exploit.