Use-Case Summaries
1. High-Security Subnet Access 2. Remove VPN Attack Surface & Enforce MFA 3. Third-Party Access to Restricted Webapps 4. Ephemeral Outbound Internet Access for Patching 5. SSH Attack Surface in Distributed Environments 6. File Transfer Gateway & Ad-Hoc Uploads 7. Trusted Partner Access to Web Applications 8. HPC, SFTP &


