I can see this as a hardened VPN in a mission-critical deployment, which could not be as easily compromised as a software stack.
I can see this as a hardened VPN in a mission-critical deployment, which could not be as easily compromised as a software stack.