yes, and it is not just conceptual rather Validation-centric as well. The biggest differentiator is that we don't just deal with theory but active configuration control where we intentionally break thing to see how they respond to ensure robust and durable security operations.