Hopr named as AMTD leader in Gartner's "Hype Cycle for Endpoint Security, 2023"
x

Automated Moving Target Defense

Hopr automates the rotation of workload credentials at a high frequency
AMTD is proactive, automated, deception or obfuscation that disrupts threat actors and prevents attacks.

80% of alerts raised by detection and response cyber defenses are false positives and overburden SOC teams.

Average threat response times of detection and response tools range from a half-hour to hours.

Threat actors have learned how to circumvent cyber defenses, such as user behavior analytics, and operate inside networks undetected.

Threat actors have time and skill to steal credentials and launch damaging attacks.

Unrestricted workload access

Threat actors penetrate networks and access workloads from anywhere, then move laterally, discover static identity and secret credentials, and attack valuable resources.

Hopr's Solution

Provide workloads with special “sidecars” that frequently rotate workload access credentials to restrict threat actor movement within containerized environments.

Learn More
abstract icon of a certificate

Unsecured network transport

Threat actors sniff unsecured transport and obtain keys and other information to launch attacks.. Ensuring “mTLS everywhere” is challenging, impractical, and costly.

Hopr's Solution

Our sidecars use our patented SEE™ protocol to create end-to-end encrypted communication channels without a key exchange between workloads.

Learn More

Unverified workload identity trust

Automated PKI certificates used for workloads have a chain of trust that ends with the certificate authority, and not the workload. Each certificate replacement represents an entirely new identity that lacks verification.

Hopr's Solution

We assign a workload its identity credential when it is first registered and receives a Hopr sidecar. The ID rotates as the workload conducts sessions with other workloads. Trust is verified at each session.

Learn More

Read About Cloud Native AMTD

Hopr Connect and Connect Gateway prevent attacks on cloud workloads, APIs and data across all environments and even organizational boundaries.
Read the Paper

Valuable Benefits

Lower cyber risk
Threat actors are unable to obtain the valid information they need to launch an attack.
True Zero Trust
Six of the seven NIST zero trust principles are met with frequent verification of workload identity and trust.
Fast time-to-value
Onboarding, configuration and deployment of Hopr Connect by an average-skilled DevOps can be achieved in about 5 days.
Lower costs
Consumption-based pricing and the elimination of multiple centralized cloud services reduces costs.
Simple deployment
Configuration of a DevOps YAML file in automated CD production is all that is needed.
No code changes
Modification of existing services, application, and API endpoint code is not needed.

Compelling Advantages

Simple, DevOps-friendly configuration and deployment.
Configuring and implementing other solutions is time consuming, complicated, and costly.
Workload credentials rotate faster than a threat actor can find them.
In AMTD speed matters. Other solutions move too slowly to be effective at disabling threat actors.
Both credentials are frequently verified and meet six of the seven NIST zero trust principals.
Other solutions lack the identity verification necessary to ensure zero trust of workloads.
icon of a smart phone

Discover How AMTD is a Winning Defense

Schedule a 15-minute discovery call with one of our experts to discuss your use case and learn how Hopr's automated moving-target defense can prevent cyber attacks on your business.
Schedule a Call
Gartner, Hype Cycle for Endpoint Security, 2023 Franz Hinner, Satarupa Patnaik, Eric Grenier, Nikul Patel, et al.., 1 August 2023. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.