Popular topics

Explore all topics

Other helpful resources

Account usage

Your account page displays usage statistics of the Hopr sidecars you have deployed.

Frequently asked questions

Answers to the questions we hear most often.

Frequently asked questions

Can’t find the answer you’re looking for? Reach out to our customer support team.

Explore all FAQs

At what network layer does encryption occur?

Sidecars can be configured to perform SEE™ at either layer 4 or layer 7 of the ISO network stack. Layer 4 supports network load balancers (NLB) and layer 7 supports application load balancers (ALB).

Is the CHIPS™ algorithm dynamic enough to seed the key generator?

There is a significant amount of dynamism (variability) in the seed elements used in CHIPS algorithms. It begins with a vast number of URLs where dynamic information can be found, and increases with the many possible locations at an URL. It increases further because algorithms have many possible structures to alter or modify the dynamic elements. This includes nearly two-dozen variables, each of which has many possible values.

How do Hopr's products meet Zero Trust principles?

Zero Trust requires verification of trust. Hopr rotates workload identity and secret credentials at a high frequency with our CHIPS™ technology and the SEE™ protocol. Hopr verifies both credentials at the start of each session to guarantee the authenticity and trust of both workloads in a communication session. Hopr's products meet 6 of the 7 NIST principles for zero trust. We intentionally do not monitor data traffic (principle #7) because we believe this increases cyber risk to PII and other sensitive data.

Stay in touch with us

Sign up for our awesome newsletter! No spam ever.

Thank you! Your subscription is confirmed.
Oops! Something went wrong while submitting the form.