Symphony Security: How it works