Listing Thumbnail

    Hopr Connect for Workload and Application Networking

     Info
    Sold by: Hopr.co 
    Service mesh works great inside a cluster, but connections get complicated as soon as services or applications need to connect outside the cluster, or across container system environments, or across clouds, or across organizations to third party apps. Securely connecting services and applications across environments with disparate identity and secrets domains is a longstanding and difficult problem. It's also prone to error and hard to maintain. Hopr Connect solves these challenges. It is a B2B SaaS service that simply and easily connects containerized workloads located in any cloud environment anywhere. Acclaimed by cybersecurity analysts as "nothing else like it in the world," Hopr Connect (built on Envoy proxy) builds high-trust, ultra-secure connections between workloads with DevOps-friendly configuration and deployment. And the connections and workload endpoints are protected by an Automated Moving Target Defense (AMTD). See https://www.hopr.co/connect for details.
    Listing Thumbnail

    Hopr Connect for Workload and Application Networking

     Info
    Sold by: Hopr.co 

    Overview

    Play video

    WHAT DOES IT DO? +++ Connects containerized workloads across all cluster, container system, and cloud environments. +++ Verifies machine identity trust for every connection. +++ Prevents identity theft, key theft, MITM, malware delivery, and session hijacking attacks. +++ Prevents access to workload endpoints by untrusted connections (access control). +++ Secures data in transit over the entire route between endpoints. +++ Creates an Automated Moving Target Defense and shrinks the attack surface.

    HOW IT DOES IT: Hopr Connect equips containerized workloads with a "sidecar" (built on Envoy proxy) that includes a decentralized 'cert-free' machine identity and secrets management capability. This frees the workload from the centralized identity services that restrict connectivity outside an identity 'silo' (domain). Workloads manage their identity and secret credentials and automatically rotate them at a high frequency, creating an Automated Moving Target Defense (AMTD).

    Hopr's SaaS monitors each connection to verify the identity and trust of workloads when they connect. Connections perform a Synchronous Ephemeral Encryption (SEE) protocol that builds an end-to end encrypted channel (at OSI Layer 4 or Layer 7) without a key exchange. The SEE protocol prevents untrusted endpoint access and achieves data confidentiality and integrity over the entire route between endpoints.

    THE PRODUCT: Hopr Connect operates using Hopr SaaS infrastructure and a Hopr Sidecar at each workload (thin client). As workload-sidecar pairs are deployed an application network or "super mesh" is built without any of the connectivity constraints, complications, or costs of centralized cert-based identity services and workload identity federation.

    HOPR SIDECARS: Lightweight, "thin clients" are built on open-source Envoy proxy and deployed host workloads. Two types are offered:

    XTRA Sidecars are used for connecting workloads within an organization where they are deployed with initial trust.

    K4C Sidecars are identical to XTRA but with additional capability for high-trust connections with third party workloads outside an organization (such as partners, affiliates, or suppliers with whom business must be conducted, but trust is uncertain). K4C turns an organization's public-facing workloads into gateways because the sidecar can securely connect outside the organization and inside the organization.

    SUBSCRIPTION PLANS:

    TRY FOR FREE... FOREVER: Use Hopr's Free Forever plan (this public listing) to deploy and operate up to 30 sidecars per month. Each sidecar may make up to 10,000 connections per month at no charge. (API calls and responses within a session after the connection is made are not metered and are unlimited). Sidecar operation will continue if the free volumes are exceeded, but will incur a consumption fee for each month of overuse.

    CONSUMPTION-PRICED PLANS: Additional plans are "consumption priced" with volume discounted pricing. For custom pricing, Pay-As-You-Go (PAYG), and annual contract plans with premium features, please email: aws-mp-sales@hopr.co , for a Private Offer.

    VALUABLE BENEFITS: *** Lower Cyber Risk . ------- Defends against 18 common cyber attacks. ------- AMTD ------- Prevent untrusted access *** Easily network services or applications located anywhere on the Internet. *** Assured Confidentiality and Integrity of data in transit. *** Improved cost efficiency. Eliminates the cost of centralized cloud IAM services. *** Improved container portability and interoperability across cloud environments. *** High trust identity verification necessary for financial and healthcare IT regulations. *** Low Adoption Costs. No code changes to existing apps or APIs. *** Future proof (quantum resistant) *** Resistant to AI threats

    Highlights

    • FAST TIME TO VALUE. +++ Fast training and onboarding of customer DevOps. +++ Simple Devops-friendly configuration and deployment of Sidecars. +++ Security benefits begin immediately on deployment. +++ Security for enterprise and external third party organizations. +++ Self-serve training via the Hopr Help Center.
    • LOWER COST. +++ Cloud native cost and pricing is more efficient than external IAM and cybersecurity SaaS solutions. +++ Decentralized identity management achieves a net positive customer savings of 10% to 80%. +++ Greatly reduced soft costs over legacy PKI protocols. +++ No modification to existing applications or API code is needed. +++ Config and deployment does not require high DevSecOps skills. +++ Improved container portability enables optimization of cloud spend.
    • HIGH SECURITY. +++ Machine Identity Trust: Frequent workload identity verification. +++ Synchronous Ephemeral Encryption: (SEE™) ensures data in transit is confidential and tamper-proof over the entire route. MITM attacks are prevented. +++ Blocked Untrusted Connections: Untrusted message traffic fails SEE™ decryption and is discarded. +++ Automated Moving Target Defense (AMTD): Workload credentials rotate at a high frequency.

    Details

    Sold by

    Delivery method

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Hopr Connect for Workload and Application Networking

     Info
    Pricing is based on contract duration. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. Usage-based pricing is in effect for any usage exceeds the entitle amount or not covered in the contract. These charges will be applied on top of the contract price. If you choose not to renew or replace your contract before it ends, access to your entitlements will expire.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    Private-facing sidecars
    Sidecars that prevent attacks on internal workloads and endpoints
    $0.00
    Public-facing sidecars
    Sidecars that prevent attacks on public-facing workloads and endpoints
    $0.00

    Additional usage costs (3)

     Info

    The following dimensions are not included in the contract terms, which will be charged based on your usage.

    Dimension
    Cost/unit
    Unit fee for sidecars above the free volume (1 unit = 1 sidecar)
    $2.50
    Fee for connections above the free limit (1 unit = 1000 connections)
    $0.60
    No DevOps? Our DevOps will config and deploy our sidecars for you
    $6,000.00

    Vendor refund policy

    All fees are non-cancellable and non-refundable except as required by law.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    Technical and business support personnel are available via email M-F from 9AM-5PM US Eastern time zone. Free Forever products are supported on a "best effort" basis. The fastest method of technical support is to send email to service@hopr.co  with the issue in the subject line and a full description of the problem in the message body. You will receive an automated response to your submitted support request email. Follow-up response times vary. Our goal is to follow-up within 24 hours. service@hopr.co 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    No customer reviews yet
    Be the first to write a review for this product.