Easy microsegmentation. Encrypted communications. Cloaked assets.