Popular topics

Explore all topics

Other helpful resources

Account usage

Your account page displays usage statistics of the Hopr sidecars you have deployed.

Frequently asked questions

Answers to the questions we hear most often.

Frequently asked questions

Can’t find the answer you’re looking for? Reach out to our customer support team.

Explore all FAQs

Can Hopr work with any infrastructure?

Hopr can work with any containerized infrastructure, and virtual machines. Hopr is compatible with Kubernetes, Docker Swarm or other Infrastructure as a Service platforms that use containers. Hopr works in all cloud environments.

What is Hopr’s product security testing process?

Hopr employs continuous security testing from initial development and throughout the CE/CI lifetime of its product lines. In addition to GitLab’s state-of-the-art secure software development tools, GitLab’s code scanning processes, such as Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Container Scanning, and Dependency Scanning can quickly identify the latest known security vulnerabilities in Hopr’s product code throughout the DevSecOps cycles.

At what network layer does encryption occur?

Sidecars can be configured to perform SEE™ at either layer 4 or layer 7 of the ISO network stack. Layer 4 supports network load balancers (NLB) and layer 7 supports application load balancers (ALB).

Stay in touch with us

Sign up for our awesome newsletter! No spam ever.

Thank you! Your subscription is confirmed.
Oops! Something went wrong while submitting the form.