Battle Card

Architecture Diagram

People, Places, Things

All transmitted data is encrypted in process and at rest. Data is de-identified and

secure from ingest to output. Device data is ingested by the gateway and securely

sent to an AWS instance where it is then parsed for use downstream. Parsed data is

reassembled, contextualized and shipped to authorized internal and external

applications.