Features

Exploit mitigation

Filling known security holes

Security by default

Reducing information leakage

Attack surface reduction

Security ease-of-use