
Hopr
Automated moving target defense for cloud cybersecurity.
USD | 2021 | 2022 | 2023 |
---|---|---|---|
Revenues | 0000 | 0000 | 0000 |
% growth | - | 50 % | 33 % |
EBITDA | 0000 | 0000 | 0000 |
Profit | 0000 | 0000 | 0000 |
EV | 0000 | 0000 | 0000 |
EV / revenue | 00.0x | 00.0x | 00.0x |
EV / EBITDA | 00.0x | 00.0x | 00.0x |
R&D budget | 0000 | 0000 | 0000 |
Source: Dealroom estimates
Related Content
Hopr is a cybersecurity company specializing in Automated Moving Target Defense (AMTD) to protect cloud-native applications. Founded in 2021 by Tom Casey, an electrical engineer and entrepreneur with prior experience at companies like Intel and as a founder of other tech ventures, the company aims to disrupt cyber attacks before they can be executed.
The firm's core technology protects workloads, APIs, and data in transit across various cloud environments. Hopr's patented approach involves the high-frequency rotation of workload identities and secrets, creating a dynamic and unpredictable target for threat actors. This method is designed to prevent attacks by making it difficult for adversaries to steal and use credentials. The system is built on three main innovations: Codes Hidden In Plain Sight (CHIPS™), the Synchronous Ephemeral Encryption (SEE™) protocol, and a decentralized, certificate-free identity manager. This multi-layered defense ensures that only trusted, authenticated messages can reach an endpoint, effectively blocking connections from untrusted sources even if they are encrypted.
Hopr's business model targets organizations adopting Zero Trust security architectures in their cloud infrastructures. By continuously verifying workload identities before granting trust, the company streamlines the implementation of Zero Trust principles. Recognized by Gartner as a tech innovator in AMTD, Hopr provides a solution for securing modern, distributed systems against sophisticated cyber threats. The company operates in the cloud security market, serving clients that require robust protection for their digital assets and communications.
Keywords: Automated Moving Target Defense, AMTD, cloud security, workload protection, API security, Zero Trust, data-in-transit, cybersecurity, credential rotation, identity management