SECURE TRAFFIC TO AND FROM 
SOFTWARE CONTAINERS
MAKE TRAFFIC RECOGNIZABLE
EPHEMERAL CONTAINERS
  • Cloud based applications

  • Docker images

  • VMs

  • All transmitted data encrypted 

  • Ability to authenticate container

  • Expose container based application through HTTPS

BENEFITS
GOOD FOR