<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.hopr.co</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/about</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/access-denied</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/blog</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/checkout</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/contact</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/differentiation</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/hopr-press-releases</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/how-it-works</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/all-products</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/log-in</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/news-coverage</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/order-confirmation</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/paypal-checkout</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/pricing</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/privacy-policies</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/reset-password</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/korvette-s-wosp</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/search</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/security</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/sign-up</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/case-studies</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/strengthen-api-protection</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/terms-of-service</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/update-password</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/user-account</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/white-papers</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/web-retriever-open-source-project</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/ai-protection-case-study</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/intelligent-iot-case-study</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/korvette-se-wosp</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/financial-services-case-study</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/manufacturing-case-study</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/enterprise-ultra</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/cost-and-roi-white-paper</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/why-hopr-navigating-the-amtd-landscape</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/devops-friendly-security-automation</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/lane7-blueprints</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/healthcare-it-case-study</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/author/tom-mcnamara</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/blog-category/api-security</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/blog-category/automated-moving-target-defense</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/blog-category/machine-identities-and-secrets</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/blog-category/zero-trust-for-workloads</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/a-looming-crisis</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/a-moving-target-defense-for-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/a-short-history-of-moving-target-defense</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/ai-and-the-crisis-of-machine-credentials-and-how-to-avoid-it</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/amtd-and-zero-trust-in-a-single-solution-the-wosp</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/an-unintentional-secret-automated-tls-and-its-zero-trust-fallacy</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/beyond-the-locked-front-door</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/flipping-the-script-why-the-future-of-cloud-native-is-network-first</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/four-dilemmas-of-keeping-secrets</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/from-glass-cases-to-ephemeral-access</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/iam-in-a-box</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/keeping-secrets-is-hard</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/machine-identity-avoid-the-crisis</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/machine-identity-whos-who</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/proxies-in-the-cloud-managing-traffic-and-securing-a-digital-world</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/redefining-multi-cloud-application-networking-with-a-workload-security-proxy</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/reversing-a-rising-tide---api-data-losses</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/runtime-microsharding-shrinks-the-enterprise-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/small-fast-moving-targets</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/the-complexity-tax-for-platform-engineers-and-devops</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/the-end-of-the-security-bottleneck-democratizing-zero-trust-with-lane7-blueprints</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/vanishing-secrets</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/what-does-hopr-replace-in-an-enterprise</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/when-identity-is-the-blast-radius</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/why-is-the-trend-of-api-attacks-still-increasing</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/post/why-tls-1-3-and-automated-pki-fall-short-of-zero-trust-principles</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/lp/amtd</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/lp/api-key-replacement</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/lp/api-threat-protection-and-access-control</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/lp/application-endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/lp/cloud-edge-and-iot</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/lp/devops-friendly-security-automation</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/lp/kill-the-pain-of-east-west-complexity</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/lp/machine-identity-trust</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/lp/runtime-microsharding-tm-animating-the-attack-surface-to-break-the-attack-chain</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/lp/synchronous-ephemeral-encryption</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/white-papers/a-new-kind-of-defense</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/white-papers/animating-the-attack-surface-with-runtime-microsharding-tm</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/white-papers/api-threat-protection-threat-topology-coverage</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/white-papers/api-threat-protection-using-cloud-native-amtd</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/white-papers/high-trust-ultra-secure-application-networking</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/white-papers/hopr-connect-and-connect-gateway</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/white-papers/lane7-blueprints-democratizing-zero-trust-for-devops</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/white-papers/principles-of-machine-identity-trust</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/white-papers/the-complexity-tax-why-centralized-trust-is-failing-platform-engineers</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/white-papers/total-ownership-costs-of-cloud-services-versus-hopr</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/white-papers/wosp-total-ownership-cost-and-roi-analysis</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/white-papers/zero-trust-by-the-transaction</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/white-papers/zero-trust-quantum-proof-secure-application-networking-with-wosps</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/white-papers/zt-amtd</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/news-coverage/application-and-cloud-security-is-a-shared-responsibility</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/news-coverage/columbia-company-selected-for-google-for-startups-cloud-program</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/news-coverage/commentary-on-the-circleci-breach</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/news-coverage/cyberwire-hopr-selected-for-google-for-startups-program</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/news-coverage/hopr-accelerates-product-led-go-to-market-strategy</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/news-coverage/hopr-ceo-comments-on-generative-ai-threat-to-api-security</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/news-coverage/hopr-ciso-dr-bill-lawrence-contributes-to-quantum-computing-article</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/news-coverage/hopr-commentary-on-cisa-policy-for-security-by-default</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/news-coverage/hopr-commentary-on-cisa-software-security-attestation</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/news-coverage/hopr-harnesses-500k-to-fortify-api-protection</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/news-coverage/hopr-named-a-tech-innovator-in-automated-moving-target-defense</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/news-coverage/hopr-named-in-gartners-emerging-tech-amtd-advances-proactive-cloud-defense</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/news-coverage/hopr-raises-500k-in-funding</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/category/amtd-for-api-threat-protection</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/product/connect-payg</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/product/gateway-payg</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/product/k4c-ff</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/product/xtra-ff</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/webinars/an-introduction-to-amtd</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/webinars/cloud-native-amtd-for-workload-endpoints</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/webinars/secure-cyberspace-monetization-at-scale</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/webinars/why-amtd-is-needed-now</loc>
    </url>
    <url>
        <loc>https://www.hopr.co/ff-applicants/tom</loc>
    </url>
</urlset>