Hopr named as AMTD leader in Gartner's "Hype Cycle for Endpoint Security, 2023"

Automated Moving Target Defense

Hopr automates the rotation of workload credentials at a high frequency

Threat actors have time and skill to steal credentials and launch damaging attacks.

AMTD is proactive, automated, deception that prevents threat actors from launching attacks

Unrestricted workload access

Threat actors penetrate networks and access workloads from anywhere, then move laterally, discover static identity and secret credentials, and attack valuable resources.

Hopr's Solution

Provide workloads with special “sidecars” that frequently rotate workload access credentials to restrict threat actor movement within containerized environments.

Learn More
abstract icon of a certificate

Unsecured network transport

Threat actors sniff unsecured transport and obtain keys and other information to launch attacks.. Ensuring “mTLS everywhere” is challenging, impractical, and costly.

Hopr's Solution

Our sidecars use our patented SEE™ protocol to create end-to-end encrypted communication channels without a key exchange between workloads.

Learn More

Unverified workload identity trust

Automated PKI certificates used for workloads have a chain of trust that ends with the certificate authority, and not the workload. Each certificate replacement represents an entirely new identity that lacks verification.

Hopr's Solution

We assign a workload its identity credential when it is first registered and receives a Hopr sidecar. The ID rotates as the workload conducts sessions with other workloads. Trust is verified at each session.

Learn More

Read About Cloud Native AMTD

Hopr's cloud native automated moving target defense prevents attacks on cloud workloads, APIs and data. And it includes important cybersecurity enhancements that lower cyber risk.
Read the Paper

Valuable Benefits

Lower cyber risk
Threat actors are unable to obtain the valid information they need to launch an attack.
True Zero Trust
Six of the seven NIST zero trust principles are met with frequent verification of workload identity and trust.
Fast time-to-value
Equipping workloads with Hopr’s AMTD usually happens within three weeks after sign-up.
Lower costs
Hopr’s AMTD reduces the costs of expensive services such as managing keys, secrets, and PKI certificates.
Simple deployment
Sidecars are container images that are easily configured and deployed by DevOps using a familiar YAML file.
No code changes
Security by default. No modification to existing application and API code is required. Compatible with other security tools, too.

Compelling Advantages

Simple, DevOps-friendly configuration and deployment.
Configuring and implementing other solutions is time consuming, complicated, and costly.
Workload credentials rotate faster than a threat actor can find them.
In AMTD speed matters. Other solutions move too slowly to be effective at disabling threat actors.
Both credentials are frequently verified and meet six of the seven NIST zero trust principals.
Other solutions lack the identity verification necessary to ensure zero trust of workloads.

Discover How AMTD is a Winning Defense

Schedule a 15-minute discovery call with one of our experts to discuss your use case and learn how Hopr's automated moving-target defense can prevent cyber attacks on your business.
Schedule a Call
Gartner, Hype Cycle for Endpoint Security, 2023 Franz Hinner, Satarupa Patnaik, Eric Grenier, Nikul Patel, et al.., 1 August 2023. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.