Hopr offers a suite of AMTD products that utilize its novel Workload Security Proxy and patented technologies to achieve elite cyber protection.
Click on a card below to learn more about each product.
Yes. Hopr Connect Gateway establishes trust of workloads at your partner organizations with Hopr K4C WoSPs at each endpoint (client and server). Your partner organization's client endpoint is protected by its WoSP.
Yes. The "Kerberos for the cloud" protocol assures that connections to your APIs from outside parties are high trust with Hopr validating that trust before the connection occurs.
Yes. API keys are static, easily stolen, and difficult to replace. Bulk resets on a suspected breach are expensive and penalize users. Hopr ensures that stolen API keys are ineffective and only legitimate trusted workloads can use their API key.
Hopr Connect Gateway can be used with a variety of popular cloud container systems and even virtual machines. Contact us to learn about solutions for specific architectures.
The security and data privacy protections provided by Hopr's innovations are intended for responsible commercial use to benefit civil society. We use a short 'Know Your Customer (KYC) application process to vet purchasers and protect existing customers. We believe trustworthy customers will appreciate our dedication to their security and accommodate our KYC process.
For each WoSP deployed, Hopr counts the number of communication sessions performed and multiplies this by the 'price per session'. But each communication session will have 2 WoSPs. Consequently the cost of a communication session is 2x the per WoSP per session  price listed.
Yes. Volume discounts are tiered and based on monthly usage. Each month's license fee (per license) is billed based on the total volume of sessions at month close.