We're a team of innovators

At Hopr, we recognize the growing importance of cybersecurity to life in globally digital society. Our mission is to help businesses protect their digital operations and data by re-thinking old problems and then innovating cybersecurity solutions to overcome them.

Photo of two engineers discussing CHIPS code in front of a computer in an office
Hopr Solutions for US DoD
Military use case. Hopr applies its commercial Cloud Native AMTD to military need for secure data sharing across disparate environments.
Gartner Recognition
ACCLAIM. Gartner, a global IT market intelligence firm, recognizes Hopr as a tech innovator in Automated Moving Target Defense (AMTD).
Secure Communications Patent Issued
INNOVATION. Hopr receives a second patent for its novel secure communications networking solution.
Product. Hopr release the beta of its first API threat protection product, XTRA (eXceptionially Tamper Resistant Apis).
Venture Funded
Confidence. Hopr receives its first Seed stage venture funding exhibiting confidence from the venture community.
External Financing Begins
Fundraising. Hopr financing transitions from bootstrapped to external funding with an Angel investment.
PHS Patent Issued
Patent. The initial patent for CHIPS technology used in the Password Hopping System and Method is issued and published.
The Rise of the Machines
Pivot. Hopr recognizes the growing reliance on "machines" in the operation of the cloud and refocuses its technology and solutions to protecting non-human entities.
A Critical Problem
Protection. Hopr recognizes API's are vulnerable and adapts its CHIPS technology to API threat protection, and develops a moving-target defense for operating workloads.
Founder Funded
Bootstrapped. Steady and slow progress to bring password hopping to the market occurs with founder funding only (bootstrapped).
Patent Application
Invention. The invention for a password hopping system (PHS) and method is completed and submitted to the US Patent and Trademark Office
Password Hopping
Innovation. The initial prototyping of CHIPS focused on hopping the passwords of human users. Methods and code were developed and passwords hopped for multiple online applications and accounts.
Hopr Corporation Formed
Business. After some early consultation and market exploration to determine if CHIPS could be monetized in a business and how a "password hopping" service might operate, Hopr Corporation is legally formed.
"Double Trifecta" Loss
Problem. Hopr's founder is the victim of six data breaches in 18 months. The most painful was a healthcare insurance breach that also affected the data privacy of family members.
CHIPS Imagined
Imagination. After much research into how and why data breaches proliferate, Tom McNamara recognizes that time could be used against adversaries. The idea for Codes Hidden In Plain Sight is born.

Our Values

We want people to RAVE about us!

Graphic of hands releasing balloons and confetti in celebration

Exfiltrated API credentials 

Results. We value our commitments to achieve results. And believe the best results come from a team effort.

Exfiltrated API credentials 

Aptitude. We value lifelong learning and asking questions about difficult problems that lead to new or better solutions.

Exfiltrated API credentials 

Values. Living by the "golden rule", persistence, patience, trust, confidence, respect, and teamwork.

Exfiltrated API credentials 

Excellence. We value outcomes that move closer toward excellence. Especially with security.


Head shot photo of Tom McNamara
Tom McNamara
founder & Ceo
Personal photo of Dr. Bill Lawrence
Dr. Bill Lawrence
VP product engineering
Nick Hughes
VP, Product Engineering
Gartner, Emerging Tech: Security — The Future of Cyber Is Automated Moving Target Defense, Lawrence Pingree, Carl Manion, et al.., 28 February 2023. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.