Malicious traffic can bypass gateways
In the past, gateways sat at the perimeter and controlled access. But today, mobile access, IoT devices, multiple cloud environments and new technologies complicate API security since there is rarely a single “gateway” point at which API protection can be enforced.
Applies a moving-target defense to workloads and API endpoints and hardens their communication routes against attack. Regardless of how they arrived, all ingress messages must pass decryption first. If decryption fails, then they're logged and dropped.