Hopr

www.hopr.co

Hopr provides Zero Trust (ZT) Automated Moving Target Defense (AMTD) solutions to data rich enterprises with resilient security and integrity of workload access and data, including API endpoints within cloud infrastructures. We establish and verify identity credentials to make zero trust adoption attainable. Hopr's Zero Trust AMTD ensures that an attacker’s window of opportunity to exploit workloads or capture high value data in transit is closed. The company’s novel moving target defense protects workloads, APIs and data across all clouds by rotating credentials with high frequency, building end-to-end encrypted communication tunnels and verifying identities at both endpoints. By establishing and verifying a chain of trust in workload identities, Hopr streamlines the adoption of Zero Trust in cloud infrastructures – matching credentials to prove identity before any workload is trusted. The company’s patented CHIPS technology builds end-to-end encrypted communication channels between trusted workloads, and verifies trust in workload identities at each session. These tunnels are: ■ Ephemeral and self-constructed by trusted workloads with a Sidecar as needed on demand ■ Hardened by symmetric end-to-end encryption without a key exchange ■ Zero Trust where trust is verified with two ‘credentials’ that rotate at a high frequency ■ Built for containers, enabling fast low-friction DevOps deployment

Read more

Reach decision makers at Hopr

Lusha Magic

Free credit every month!

Hopr provides Zero Trust (ZT) Automated Moving Target Defense (AMTD) solutions to data rich enterprises with resilient security and integrity of workload access and data, including API endpoints within cloud infrastructures. We establish and verify identity credentials to make zero trust adoption attainable. Hopr's Zero Trust AMTD ensures that an attacker’s window of opportunity to exploit workloads or capture high value data in transit is closed. The company’s novel moving target defense protects workloads, APIs and data across all clouds by rotating credentials with high frequency, building end-to-end encrypted communication tunnels and verifying identities at both endpoints. By establishing and verifying a chain of trust in workload identities, Hopr streamlines the adoption of Zero Trust in cloud infrastructures – matching credentials to prove identity before any workload is trusted. The company’s patented CHIPS technology builds end-to-end encrypted communication channels between trusted workloads, and verifies trust in workload identities at each session. These tunnels are: ■ Ephemeral and self-constructed by trusted workloads with a Sidecar as needed on demand ■ Hardened by symmetric end-to-end encryption without a key exchange ■ Zero Trust where trust is verified with two ‘credentials’ that rotate at a high frequency ■ Built for containers, enabling fast low-friction DevOps deployment

Read more
icon

Country

icon

State

Maryland

icon

City (Headquarters)

Columbia

icon

Employees

1-10

icon

Founded

2017

icon

Social

  • icon

Employees statistics

View all employees

Potential Decision Makers

  • Vice President of Product Engineering

    Email ****** @****.com
    Phone (***) ****-****
  • Chief Information Security Officer

    Email ****** @****.com
    Phone (***) ****-****
  • Partner / Creative Director

    Email ****** @****.com
    Phone (***) ****-****

Technologies

(15)

Reach decision makers at Hopr

Free credits every month!

My account

Sign up now to uncover all the contact details