Hopr
www.hopr.coHopr provides Zero Trust (ZT) Automated Moving Target Defense (AMTD) solutions to data rich enterprises with resilient security and integrity of workload access and data, including API endpoints within cloud infrastructures. We establish and verify identity credentials to make zero trust adoption attainable. Hopr's Zero Trust AMTD ensures that an attacker’s window of opportunity to exploit workloads or capture high value data in transit is closed. The company’s novel moving target defense protects workloads, APIs and data across all clouds by rotating credentials with high frequency, building end-to-end encrypted communication tunnels and verifying identities at both endpoints. By establishing and verifying a chain of trust in workload identities, Hopr streamlines the adoption of Zero Trust in cloud infrastructures – matching credentials to prove identity before any workload is trusted. The company’s patented CHIPS technology builds end-to-end encrypted communication channels between trusted workloads, and verifies trust in workload identities at each session. These tunnels are: ■ Ephemeral and self-constructed by trusted workloads with a Sidecar as needed on demand ■ Hardened by symmetric end-to-end encryption without a key exchange ■ Zero Trust where trust is verified with two ‘credentials’ that rotate at a high frequency ■ Built for containers, enabling fast low-friction DevOps deployment
Read moreHopr provides Zero Trust (ZT) Automated Moving Target Defense (AMTD) solutions to data rich enterprises with resilient security and integrity of workload access and data, including API endpoints within cloud infrastructures. We establish and verify identity credentials to make zero trust adoption attainable. Hopr's Zero Trust AMTD ensures that an attacker’s window of opportunity to exploit workloads or capture high value data in transit is closed. The company’s novel moving target defense protects workloads, APIs and data across all clouds by rotating credentials with high frequency, building end-to-end encrypted communication tunnels and verifying identities at both endpoints. By establishing and verifying a chain of trust in workload identities, Hopr streamlines the adoption of Zero Trust in cloud infrastructures – matching credentials to prove identity before any workload is trusted. The company’s patented CHIPS technology builds end-to-end encrypted communication channels between trusted workloads, and verifies trust in workload identities at each session. These tunnels are: ■ Ephemeral and self-constructed by trusted workloads with a Sidecar as needed on demand ■ Hardened by symmetric end-to-end encryption without a key exchange ■ Zero Trust where trust is verified with two ‘credentials’ that rotate at a high frequency ■ Built for containers, enabling fast low-friction DevOps deployment
Read moreCountry
State
Maryland
City (Headquarters)
Columbia
Industry
Employees
1-10
Founded
2017
Social
Employees statistics
View all employeesPotential Decision Makers
Vice President of Product Engineering
Email ****** @****.comPhone (***) ****-****Chief Information Security Officer
Email ****** @****.comPhone (***) ****-****Partner / Creative Director
Email ****** @****.comPhone (***) ****-****
Technologies
(15)