Hopr Enterprise Ultra
for Elite Enterprises

Enterprise Ultra introduces a new paradigm:
Zero Trust by the Transaction

Zero Trust by Transaction goes beyond legacy perimeter controls and certificate-based trust.

“I have never seen anything else like this. I am concerned with secrets sprawl and the cost of securing an ever-growing number of secrets"
Global Chief Information Security Officer, Manufacturing Enterprise

Persistent Challenges with
Status Quo Cybersecurity

Graphic icon of containers that have uncertain trust
Untrusted Non-Human Identities (NHIs)
Static PKI certificates and auto-approved CSRs expose workload identities to impersonation and misuse.
graphic icon of a session key intercepted by a cyber threat actor
Passing Secrets and Keys
TLS and mTLS rely on handshake-based key exchange, which is vulnerable to session hijacking and early termination across cloud boundaries.
a graphic representation of a certificate
Centralized Secrets Services
Centralized Certificate Authorities (CAs) and secrets vaults represent high-value attack surfaces. And they require yet another secret to access a vault.
Weak and Incomplete Zero Trust
Conventional “Zero Trust” solutions often stop at initial authentication, failing to reverify identity trust at each transaction.
These weaknesses are exacerbated in cloud-native, multi-cloud, and hybrid environments where workloads are ephemeral, distributed, and span trust boundaries.

What is
Zero Trust by the Transaction?

ZT by the Transaction implements continuous, transaction-level identity trust verification and ephemeral encryption that renders intercepted data, credentials, or session keys useless — even to quantum- and AI-capable adversaries.

Strategic Value

Enterprise Ultra offers elite enterprises a strategic ability to protect valuable information,  expose insider threats, and disrupt sophisticated threats before an attack can occur

Enterprise Ultra is a Cloud Native Automated Moving Target Defense (AMTD) platform that continuously hops workload identities and secret credentials to deliver future-proof, quantum-resilient, zero trust protection
Hover over each Technology card below to see the Advantage gained.
Codes Hidden In Plain Sight (CHIPS™)
Algorithms generate identical secrets at two workloads when they run at nearly the same time.
THE CHIPS™'s ADVANTAGE
CHIPS™ secrets are ephemeral and generated on demand. When a communication session closes the secrets vanish, eliminating costly storage
Synchronous Ephemeral Encryption (SEE™)
SEE™ is a protocol that uses CHIPS™ secrets as encryption keys, and builds end-to-end-encrypted communication channels without a key exchange.
THE SEE™ ADVANTAGE
Keys remain with the workload where they were generated and this prevents any chance of discovery in a key exchange.
SEE™ encryption occurs at Layer 7 to ensure data remain confidential and tamper-proof, and it is quantum-proof.
Machine Alias Identity (MAID™)
A MAID™ is a decentralized hopping identity credential (the MAID™) that is verified for trust at the start of each  communication session.
If the MAID™ verification fails, security teams receive an immediate alert and can determine the appropriate action.
THE MAID™ ADVANTAGE
Identity trust verification is an important Zero Trust principal not met by conventional identity solutions using PKI Certs alone (which are static keys) whose trust is only assumed when CSRs are received or a communication session begins.

Hopr's innovations provide a simple upgrade path to augment or replace vulnerable legacy PKI certificates, TLS, and static secrets with transaction-specific ephemeral identity and encryption, eliminating replay and man-in-the-middle attack opportunities, and dramatically upgrading the enterprise security architecture.

Enterprise Ultra.
‍
Strategic Infrastructure,
Not Just Another Tool.

Secure East-West and North-South traffic with a zero trust
automated moving-target defense

Unlike traditional bolt-on security tools, Enterprise Ultra is a cybersecurity infrastructure platform
Future Proof
Future-proof against quantum threats: No persistent credentials, keys, or secrets to steal or exploit.
Non-disruptive Upgrade
Deploys easily as lightweight proxies with existing containers — no need to refactor applications.
Multi-cloud Resilience
Simple and seamless business operations across cloud and organizational boundaries.
True Zero Trust
Complies with Zero Trust mandates (OMB M-22-09) requiring per-transaction trust validation.

The Art of the Possible:
Lessons from SolarWinds

graphic red and black icon of threat access denied
Sophisticated and Persistent Threats
The SolarWinds breach illustrates the devastating power of identity compromise and stealthy lateral movement. FireEye — a top-tier security vendor — was compromised and lost its red team tools. Dozens of U.S. agencies and elite firms were infiltrated.
Conventional Cyber Defenses Failed
These victims weren’t negligent — they followed best practices. But they relied on conventional identity, certificate, and network-based trust models.
Upgrade to Zero Trust by Transaction
The Zero Trust by Transaction paradigm eliminates these root vulnerabilities by augmenting or removing static credentials, automating identity rotation, and encrypting data at the transaction level — making SolarWinds-class breaches structurally impossible.

Invest once. Stay ahead forever.

Elite enterprises with ultra-valuable data — AI models, defense IP, biopharma R&D, financial intelligence — cannot afford to treat cybersecurity as a discretionary toolset. Hopr's Enterprise Ultra is not another monitoring add-on. It is strategic infrastructure.
Read the Paper

Elite and Customized Features

Enterprise Ultra includes elite and customized features for critical enterprise use cases
five gold stars in a circular pattern
Korvette-SE WoSP
Korvette-SE WoSPs are only available on the Enterprise Ultra Platform. A unique Zero-Trust-by-the-Transaction capability for elite enterprises.
Enhanced Fault Tolerance
Fault tolerance is enhanced by defining alternate CHIPS™ algorithms should the initial algorithm become inoperable.
Micro-segmentation
Workloads can be micro-segmented at the application layer to any number of workloads (as few as two workloads.)
Custom MAID Rotation
Elite enterprises can define and configure a custom MAID™ hopping cycle for their sensitive workloads.
Custom CHIPS™ Algorithms
Elite enterprises can define and configure a custom CHIPS™ algorithm for use by their Korvette-S WoSPs.
Gartner, Emerging Tech: Security — The Future of Cyber Is Automated Moving Target Defense, Lawrence Pingree, Carl Manion, et al.., 28 February 2023. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.