Cloud Native Automated Moving-Target Defense for Applications and Devices

animated GIF of Hopr AMTD and rotation with cloud machines

By 2025, the worldwide cost of cyber crime Ā is estimated to exceed $10 trillion annually.

92% of API attacks reported were against public-facing API endpoints.

84% of API attacks against financial/insurance APIs were authenticated, but were actually threat actors.

The API data breach rate in 2023 is on pace to exceed more than one billion data records.

61% of IT professionals say that the theft or misuse of machine identities is a serious concern.

By 2026, more than 90% of enterprises will operate in multiple clouds, and face increased complexity.

Secure Your Applications, APIs, Devices, and data with Hopr's WoSP

Hopr's Workload Security Proxy (WoSP) offers unparalleled protection for your containerized applications, APIs, and data. With our Automated Moving Target Defense, you can ensure secure and Ā trusted access for every communication session.

We solve significant workload access, API, and data challenges

The Hopr WoSP provides Zero Trust, quantum-proof, application networks across all cloud environments and protects them with an Automated Moving Target Defense (AMTD).

Abuse of static access credentials

  • Access to applications and APIs use credentials that are static and seldom change.
  • Static credentials are easy targets for threat actors.
  • Compromised or stolen access credentials cannot be immediately discovered on misuse.
  • API endpoints repeatedly leak sensitive data.

Hopr's solution:

Hopr's WoSP rapidly 'hops' the access credentials for containerized apps to disrupt a threat actors ability to find and misuse them. Only trusted applications can know the correct credentials to gain access.

Untrusted identities of workload

  • Containerized applications (workloads) and devices (machines) use static identity credentials called 'certificates'.
  • Certificates are issued to workloads and devices automatically by centralized 'authorities' without first vetting for trust.
  • A 'chain of trust' exists only with the certificate authority and not the workload or machine.
  • By 2026, it’s estimated that new Ā devices Ā will connect to the Internet at a rate of 5,000 per minute!

Hopr's solution:

Hopr's WoSP manages a dynamic Machine Identity credential (a MAIDā„¢) that is issued with high trust, is repeatedly verified for trust at each communication session, and builds a chain of trust in workloads and machines.

Complex data sharing Ā  across clouds Ā 

  • Cloud environments have identity and crypto boundaries create 'seams' that impede data sharing across environments.
  • Methods to securely share data across cloud boundaries are complex, require high skills, are time-consuming, and error-prone.
  • Encryption of data transport is vulnerable to key intercept and data loss at cloud seams.

Hopr's solution:

Hopr's WoSP enables seamless application networking across clouds with comprehensive, end-to-end-encrypted communication channels (without exposing a key in an exchange).

See the WoSP in operation

Click the image at left to watch a 3:36 (min:sec) recorded demo of Hopr WoSPs protecting workload endpoints, end-to-end encrypting messages, and refusing access from untrusted connections.
Learn How It Works

The Magic of the WoSP

WoSPs are small, lightweight, networking proxies that incorporate three uniue and patented technologies or protocols

Innovations designed to defeat cyber threats

Hopr's uniue and patented innovations are desiged to preemptively disrupt cyber threats before an attack can be launched. They also meet important Zero Trust principles, are future proof to quantum attacks, immediately discover compromised secrets, and ensure data privacy across all cloud envrionments.
API Threat Protection Icon
01
Codes Hidden In Plain Sight (CHIPSā„¢)

CHIPSā„¢ technology uses an algorithm to generate a cryptographic secret. The magic of CHIPS is that two identically configured WoSPs can generate an identical secret if their algorithms run at nearly the same time.

motorcycle with sidecar
02
Synchronous Ephemeral Encryption (SEEā„¢) protocol

The SEEā„¢ protocol uses the CHIPSā„¢ secret to build an end-to-end-encrypted communication channel at the start of a communication session between two WoSPs, eliminating the vulnerability of a key exchange.

app with sidecar
03
Machine Alias ID (MAIDā„¢) credential

A MAIDā„¢ is a decentralized dynamic machine identity credential that is issued by a Hopr control plane, identity provider, and trust verifier.

The MAIDā„¢ is managed and rotated by the WoSP and verified for trust by an external Trust Verifier at the start of each communication session .

app with sidecar tested
04
Automated Moving Target Defense (AMTD)

WoSPs create an AMTD around workloads and machines when they communicate with each other. The high frequency hopping of access credentials make it nearly impossible for threats to penetrate this defense.

Access control at endpoints

  • Threat actors have proven abilities to bypass perimeter security controls.
  • They can identify critical endpoints, avoid detection, and launch attacks.
  • Annual losses from unauthorized access amount to billions of dollars.

Hopr's solution:

Our patented CHIPSā„¢ technology enables rotation of Ā credentials at a high frequency to create a moving target defense that prevents threat actors from gaining the information they need for an attack.

Experts Agree on the Value of a Moving Target Defense

ā€œI am a big fan of this defensive strategy.
Adversaries spend 90% of their time in attack planning, this prevents them from launching an attack.ā€
SVP Security, Global Financial Services

Learn about a new kind of cyber defense

Automated Moving Target Defense (AMTD) has been described by Gartner as ā€œthe future of cyber.ā€ Hopr’s AMTD is a cloud native form that protects containerized workloads, APIs, and data in transit across all clouds. Read our FREE white paper to learn the basics of cloud native AMTD.
Don’t become a threat statistic.

Add Cloud Native AMTD to your cybersecurity architecture.
Abstract graphic icon of a workload   connected to Hopr algorithm
Hopr named a tech innovator in Gartner's
"Emerging Tech: Security — Tech Innovators in Automated Moving Target Defense"

Want more detail? Learn from our FREE resources.

We curated a collection of white papers, videos, and webinars in our ā€˜Discovery’ library. The resources are FREE with an email. We also have public resources available from the site navbar menu.
Get Free Discovery Resources

Business Value in Cloud Native AMTD

Exfiltrated API credentialsĀ 

Reduce Cyber Risk from a Cloud Native AMTD that verifies identity trust and prevents attacks on valuable resources and data.

Exfiltrated API credentialsĀ 

Improved Compliance from data security features that enhance privacy and prevent data loss.

Exfiltrated API credentialsĀ 

Fast Time-to-Value with self-serve onboarding and simple ā€œlow-codeā€ DevOps -friendly configuration and deployment. And changes to existing application or API code are Ā not required.

Exfiltrated API credentialsĀ 

Lower Ownership Costs from ā€œcert-freeā€œ cloud native technology, reduced central cloud services costs, and simpler implementation and maintenance.

Compelling Advantages

Capability

Others

DECENTRALIZED IDENTITY
With Hopr, workloads carry their own identity and secrets management system.
CENTRALIZED IDENTITY
Multiple external identity, key, and secrets management services constrain connectivity and increase costs.
ATTACK PREVENTION
ā€Hopr rotates credentials at a high frequency to prevent theft and misus
VULNERABLE CREDENTIALS
Static credentials are discovered, stolen, and used in cyber attacks.
DATA SECURITY
Hopr achieves comprehensive end-to-end protection of data in transit
DATA EXPOSURE
TLS/mTLS encryption is discontinuous and vulnerable to session key intercept
REJECT UNTRUSTED SOURCES
With Hopr, connections from untrusted sources are blocked from connecting to an endpoint.
UNTRUSTED CONNECTIONS
Access controls are unable to prevent threat access.
See the complete list of Hopr features

Award Winning Innovations

Image of the gold and silver 2023 Globee Cybersecurity World Awards
High Frequency Credential Rotation. Access credentials to workloads and devices hop (rotate) at a high frequency to prevent discovery and disrupting threats before an attack can occur.

Exfiltrated API credentialsĀ 

Identity Trust Verification. Workload identity trust is established once at deployment and then verified frequently.

Exfiltrated API credentialsĀ 

Synchronous Ephemeral Encryption (SEEā„¢). End-to-end encryption (without a key exchange) assures data privacy and integrity of data in transit everywhere.

Exfiltrated API credentialsĀ 

Token-free Authentication. Ingress messages must pass SEEā„¢ decryption to be recognized (authenticated) as originating from a legitimate sender.
Immediate Discovery of Stolen Keys. Stolen API keys that are presented by threats are immediately discovered and the API query is logged and rejected before reaching the API endpoint.
Learn How These Work

Our Latest Insightful Articles

Gartner, Emerging Tech: Security — Tech Innovators in Automated Moving Target Defense, Mark Pohto, and Carl Manion, 6 June 2023. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.