Encryption using the WiredTiger storage engine - no need to buy 3rd party encryption!
Easily generate a master encryption key and begin encrypting database keys using native command line operations
Meeting compliance requirements (PCI DSS, HIPAA, GDPR, etc.)
The importance of KMIP