The document discusses hardware security in the connected world. It notes that with 25+ billion endpoints expected by 2020 and the rise of 5G, IoT, and AI, security is more important than ever as devices have increased attack surfaces. It advocates for a comprehensive security strategy including validated hardware and firmware, secure networks, and security management infrastructure. The importance of hardware-based security is discussed, noting that truly secure computing requires addressing security at the hardware, firmware/OS, and application layers. Samsung's Knox platform is highlighted as an example of building and maintaining trust from manufacturing through runtime with features like hardware root keys, verified boot, encryption, and real-time kernel protection.