- To monitor API calls
- To encrypt data in transit
- To manage network access
- To protect web applications from common web exploits