Easy micro-segmentation. Encrypted communications. Cloaked assets.