鈼 End-to-end encrypted messaging
鈼 End-to-end encrypted Voice and Video Conferencing and Screen Share
鈼 End-to-end encrypted File Share
鈼 End-to-end encrypted Integrations with third party data sources
鈼 End-to-end encrypted Records Retention and Audit Trails
鈼 Crisis Response and Notification Reserve Capacity
鈼 Email and Text Alerts