Can Hopr work with any infrastructure?
Can different sidecars be used or must they be identical?
Do both workloads (client and server) in a connection need a Hopr Sidecar?
Do existing apps and APIs have to be modified to work with Hopr?
Does Hopr have cost benefits?
How many API calls are in a session?
What contact does Hopr have with my customer's data?
Are annual plans available with discounted pricing?
Does Hopr have cost benefits?
How does consumption (usage) pricing work?
If I purchase through AWS marketplace, can I use the sidecar with workloads in any cloud?
What conditions exist on the Free Forever plan?
What costs would I incur from operating a Hopr Sidecar?
What is the Pay-as-you-go Plan?
What plan do you recommend if I frequently overuse the Free Forever Plan?
What service levels are available in your plans?
At what network layer does encryption occur?
Can Hopr work with any infrastructure?
Can different sidecars be used or must they be identical?
Do both workloads (client and server) in a connection need a Hopr Sidecar?
Do existing apps and APIs have to be modified to work with Hopr?
How do Hopr's products meet Zero Trust principles?
How does SEE™ differ from mTLS?
How is key generation for SEE™ synchronized?
How many API calls are in a session?
Is CHIPS™ just another form of Time-based One Time Passwords (TOTP)?
Is the CHIPS™ algorithm dynamic enough to seed the key generator?
What contact does Hopr have with my customer's data?
What happens if identical sidecars do not build identical keys?
What is Hopr’s product security testing process?
What is a "workload"?
At what network layer does encryption occur?
How are Hopr’s product SBOMs created and maintained?
How does Hopr collect customer security potential concerns?
How does Hopr ensure the security of its products throughout the development process?
How does Hopr maintain objective security checks on the design and development of its products and services?
How does SEE™ differ from mTLS?
How is key generation for SEE™ synchronized?
Is the CHIPS™ algorithm dynamic enough to seed the key generator?
Is the encryption used by SEE™ quantum safe?
What contact does Hopr have with my customer's data?
What cybersecurity framework governs Hopr’s security controls?
What encryption libraries does Hopr use for its Product’s Data Transport Security?
What is Hopr’s overall security strategy and approach?
What is Hopr’s product security testing process?