5 Ways To Wrap An Application For Secure Deployment