What cybersecurity framework governs Hopr’s security controls?
Hopr’s Corporate and Development Securities Policies and Process Framework is based on the Center for Internet Security Inc. (CIS) Controls, Version 8. For instance, Hopr’s corporate (non-product development) processes and documentation are created, maintained and stored in a Google Business Cloud Space that is encrypted both in transit and at rest. Services such as remote video conferencing, email, partner collaboration, etc. are secured through the use of GoogleWorkspace.
What contact does Hopr have with my customer's data?
Hopr does not remove and customer data from your networks. And no Hopr proprietary code is in contact with your customer's data when it passes through a sidecar. The code that 'touches' your customer data as it ingresses and egresses the sidecar is highly maintained and vetted open source software (Envoy proxy and the AES 256 GCM library).
How does Hopr maintain objective security checks on the design and development of its products and services?
Periodically, Hopr leverages outside experts in vulnerability assessments and ethical hacking to identify potential vulnerabilities that may otherwise be unnoticed.
Stay in touch with us
Sign up for our awesome newsletter! No spam ever.
Thank you! Your subscription is confirmed.
Oops! Something went wrong while submitting the form.