Cloud Native AMTD Products
That Disrupt Threats and Protect the Enterprise

animated GIF of Hopr AMTD and rotation with cloud machines

Hopr offers a suite of AMTD products that utilize its novel Workload Security Proxy and patented technologies to achieve elite cyber protection.

"This is a great security tool that any DevOps practitioner will love."
Drew Malone, Solution Engineer and DevOps/Infrastructure veteran

Hopr AMTD Products

Click on a card below to learn more about each product.

Hopr named in Gartner’s
”Emerging Tech: Security —
The Future of Cyber Is Automated Moving Target Defense”

Product Comparison

Pricing

Features

Free Trial
Year 1 - Concierge Tech Support
Made in the USA
AMTD Protection
Continuous runtime protection
Zero Trust Identity Verification
SEE™-encrypted data in transit
Immediate rejection of untrusted access
Future-proof to quantum attacks
Seamless multi-cloud, multi-domain comms
Email technical support
Done-for-you configuration
Protect any application
Immediate discovery of API key abuse
Simple app networking within and across clouds
Microsegment workloads
Log untrusted access attempts
Observability of log data with cloud native tooling
Deploy: Container, VM, on-premises or cloud
Cloud Native data integration with SIEM
Korvette-SE WoSP for the edge
Strategic enterprise infrastructure upgrade
Tech support within 24 hrs
Customized CHIPS™ algorithms
Ultra fault tolerance and reliability
Done for you deployment
Dedicated 24/7 tech and voice support
Extra customization
Abstract graphic icon of a naval corvette within a Kubernetes hexagon

Korvette-S™ WoSP

Usage License
priced per session
$0.07 per WoSP per 1,000 sessions
A WoSP container image product for Zero Trust, secure, application networking and AMTD among workloads within an enterprise.
Up to 30 days or 5,000 sessions
Prepaid, annual, fixed-fee after trial

Enterprise Ultra

Enterprise License
Fixed Annual Fee
Contact Sales for Pricing
A Zero Trust, future-proof AMTD Platform for elite enterprises upgrading their infrastructure to protect high value information.
Schedule a Call

Learn Why Hopr is a Strategic Investment

Hopr's WoSP achieves a more cost-effective security posture for the entire enterprise by streamlining operations and eliminating redundant services.
See a Cost and ROI Analysis

Hopr Connect Gateway FAQ

Do my suppliers and external partners need to register with Hopr?

Yes. Hopr Connect Gateway establishes trust of workloads at your partner organizations with Hopr K4C WoSPs at each endpoint (client and server). Your partner organization's client endpoint is protected by its WoSP.

Does Hopr Connect Gateway assure a trusted workload identity?

Yes. The "Kerberos for the cloud" protocol assures that connections to your APIs from outside parties are high trust with Hopr validating that trust before the connection occurs.

Does Hopr Connect Gateway prevent misuse of stolen API keys?

Yes. API keys are static, easily stolen, and difficult to replace. Bulk resets on a suspected breach are expensive and penalize users. Hopr ensures that stolen API keys are ineffective and only legitimate trusted workloads can use their API key.

What if the third party organizations don’t use Kubernetes?

Hopr Connect Gateway can be used with a variety of popular cloud container systems and even virtual machines. Contact us to learn about solutions for specific architectures.

Frequently Asked Questions

Why do you require an application process for purchasing Hopr's products?
How does "per WoSP per 1,000 sessions" usage pricing work?
Are volume discounts available on the Korvette-S™?
icon of a smart phone

Discover How AMTD is a Winning Defense

Schedule a 15-minute discovery call with one of our experts to discuss your use case and learn how Hopr's automated moving-target defense can prevent cyber attacks on your business.
Schedule a Call
Gartner, Emerging Tech: Security — The Future of Cyber Is Automated Moving Target Defense, Lawrence Pingree, Carl Manion, et al.., 28 February 2023. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.