The empirical basis of FN’s Results Oriented Security approach is based on the following five pillars:
Benchmark all known threats and test FN against all of said known threats.
Third party validation of FN’s results to further validate security efficacy.
Bug Bounty / Rewards
Utilization of external industry researchers to further test FN’s mission critical secure coding and quality standards.
Hacker Challenges / Rewards
Similar to bug bounty/rewards, but in the case of attack challenges/rewards, researchers are incentivized to circumvent FN’s data and code protection technologies.