Hopr's Workload Security Proxy (WoSP) offers unparalleled protection for your containerized applications, APIs, and data. With our Automated Moving Target Defense, you can ensure secure and Ā trusted access for every communication session.
The Hopr WoSP provides Zero Trust, quantum-proof, application networks across all cloud environments and protects them with an Automated Moving Target Defense (AMTD).
Hopr's WoSP rapidly 'hops' the access credentials for containerized apps to disrupt a threat actors ability to find and misuse them. Only trusted applications can know the correct credentials to gain access.
Hopr's WoSP manages a dynamic Machine Identity credential (a MAIDā¢) that is issued with high trust, is repeatedly verified for trust at each communication session, and builds a chain of trust in workloads and machines.
Hopr's WoSP enables seamless application networking across clouds with comprehensive, end-to-end-encrypted communication channels (without exposing a key in an exchange).
WoSPs are small, lightweight, networking proxies that incorporate three uniue and patented technologies or protocols
CHIPS⢠technology uses an algorithm to generate a cryptographic secret. The magic of CHIPS is that two identically configured WoSPs can generate an identical secret if their algorithms run at nearly the same time.
The SEE⢠protocol uses the CHIPS⢠secret to build an end-to-end-encrypted communication channel at the start of a communication session between two WoSPs, eliminating the vulnerability of a key exchange.
A MAID⢠is a decentralized dynamic machine identity credential that is issued by a Hopr control plane, identity provider, and trust verifier.
The MAID⢠is managed and rotated by the WoSP and verified for trust by an external Trust Verifier at the start of each communication session .
WoSPs create an AMTD around workloads and machines when they communicate with each other. The high frequency hopping of access credentials make it nearly impossible for threats to penetrate this defense.
Our patented CHIPS⢠technology enables rotation of  credentials at a high frequency to create a moving target defense that prevents threat actors from gaining the information they need for an attack.