Automated Moving Target Defense

We equip workloads to disable threat actors and their methods using AMTD

Without AMTD, threat actors have time and skill to launch damaging attacks.

Unrestricted workload access

Threat actors penetrate networks and access workloads from anywhere, then move laterally, discover static identity and secret credentials, and attack valuable resources.

Hopr's Solution

Ensuring continuous “mTLS everywhere” transport security is challenging, fragile, and costly. Threat actors find gaps, sniff traffic, and gain information to launch MITM attacks.

Learn More

Unsecured network transport

Ensuring continuous “mTLS everywhere” transport security is challenging, fragile, and costly. Threat actors find gaps, sniff traffic, and gain information to launch MITM attacks.

Hopr's Solution

Our sidecars use our patented CHIPS™ technology and protocol to create end-to-end encrypted communication channels without a key exchange between workloads.

Learn More

Unverified workload identities

Automated PKI certificates used for workloads have a chain of trust that ends with the certificate authority, and not the workload. Each certificate replacement represents an entirely new identity that lacks verification.

Hopr's Solution

We assign a workload its identity credential when it is first registered and receives a Hopr sidecar. The ID rotates as the workload conducts sessions with other workloads. Trust is verified at each session.

Learn More

Read our AMTD White Paper

Our 5-page paper explains the use of CHIPS™ technology in creating an automated moving target defense and the key features that protect containerized workloads. It also discusses the CHIPS protocol, the technical architecture, sidecar deployment, and security features.

Valuable Benefits

Lower cyber risk
Threat actors are unable to obtain the valid information they need to launch an attack.
True Zero Trust
Six of the seven NIST zero trust principles are met with frequent verification of workload identity and trust.
Fast time-to-value
Equipping workloads with Hopr’s AMTD usually happens within three weeks after sign-up.
Lower costs
Hopr’s AMTD reduces the costs of expensive services such as managing keys, secrets, and PKI certificates.
Simple deployment
Sidecars are container images that are easily configured and deployed by DevOps using a familiar YAML file.
No code changes
Existing application and API code does not require modification. Our AMTD works with other security tools, too.

Compelling Advantages

Simple, DevOps-friendly configuration and deployment.
Configuring and implementing other solutions is time consuming, complicated, and costly.
Workload credentials rotate faster than a threat actor can find them.
In AMTD speed matters. Other solutions move too slowly to be effective at disabling threat actors.
Both credentials are frequently verified and meet six of the seven NIST zero trust principals.
Other solutions lack the identity verification necessary to ensure zero trust of workloads.

Discover a winning defense

Schedule a 15-minute discovery call with one of our experts to discuss your use case and learn how Hopr's automated moving-target defense can prevent cyber attacks on your business.
Schedule a Call