Listing Thumbnail

    Cloud Native AMTD for API Threat Protection and Access Control

     Info
    Sold by: Hopr.co 
    Are your existing API security solutions underperforming? Too many false positives? Too many successful API attacks? Maybe it's time for a new kind of defense? Acclaimed by cybersecurity analysts as "nothing else like it in the world," Hopr's Cloud Native AMTD for API Threat Protection and Access Control delivers a new generation of high trust, ultra-strong, cybersecurity for containerized services and APIs across all clouds. See https://www.hopr.co for details.
    Listing Thumbnail

    Cloud Native AMTD for API Threat Protection and Access Control

     Info
    Sold by: Hopr.co 

    Overview

    Play video

    Legacy API threat protection and access control solutions weren't built for the speed and scale of the cloud. Statistics indicate they are failing to protect cloud resources. Hopr's cloud native Automated Moving Target Defense is built for the cloud and uses four patented innovations that no other API Threat Protection or Access Control solution has:

    DECENTRALIZED IDENTITY AND VERIFIED TRUST: Each workload holds and manages their own Identity and Secrets service. Workload identities are "certificate-free," overcoming the implementation challenges common with external centralized IAM services and improving trust and interoperability across cloud environments. Workload identity trust is verified at each communication session..

    END-TO-END ENCRYPTION OF DATA EVERYWHERE WITHOUT A KEY EXCHANGE. Workload egress messages are secured using a Synchronous Ephemeral Encryption (SEE™) protocol, SEE™builds end-to-end encrypted communication channels without a key exchange. Existing API keys are wrapped in encryption and recognized and trusted on arrival.

    MALWARE DELIVERY PREVENTION: Ingress messages from untrusted and malicious sources fail decryption on arrival and are discarded before they can reach the endpoint, even if they arrive via the Public Key Infrastructure that is in place (e.g. TLS).

    AUTOMATED MOVING TARGET DEFENSE: Hopr automatically rotates credentials at a high frequency in real time and across all clouds to disable the ability of threat actors to steal and misuse workload credentials or launch MITM attacks. Untrusted connections are prevented in all clouds and across organizations.

    THE PRODUCT: These four innovations protect workloads, API endpoints, and data in transit. Our SaaS solution is composed of Hopr Sidecars and Hopr Infrastructure.

    HOPR SIDECARS: Lightweight, thin clients that are built on open-source Envoy proxy and deployed with host workloads. XTRA Sidecars operate within the enterprise and K4C sidecars interoperate with external organizations, such as partners, suppliers, and customers.

    Hopr Sidecars are to workloads what USB is to physical computing devices - a universal connector. And Hopr Sidecars connect trusted workloads in any cloud environment and across organizations, adding much needed trust and security to B2B ecosystems such as financial services and healthcare systems, manufacturing, utilities, and retail. Hopr Sidecars keep every business, supplier, partner, and customer safe.

    THE PLAN:

    TRY FOR FREE... FOREVER: Hopr's Free Forever plan (this public listing) protects up to 30 workloads per month, each performing up to 10,000 communication sessions per month. (API calls within a session are not charged and are unlimited). These are monthly limits and usage above either the free workload volume or free session volume is billed at a small unit fee.

    CONSUMPTION-PRICED PLANS: Hopr Sidecars are used in all of our cloud native SaaS plans. All plans are "consumption priced" with fees charged for the number of workloads equipped with sidecars and the number of communication sessions performed each month. Consumption prices decrease with increased volume of use.

    For custom pricing, pay-as-you-go, and annual contract plans with features such as reporting, custom algorithms, fault tolerance, SLA/SLO, or a Private Contract, please email aws-mp-sales@hopr.co , for a Private Offer.

    VALUABLE BENEFITS: *** Lower Cyber Risk ------- Defends against 18 common cyber attacks ------- Malware delivery prevention *** Assured Data Confidentiality and Integrity *** Cost savings over third-party and cloud IAM services *** Improved container portability and interoperability across cloud environments *** Cloud Native Automated Moving Target Defense *** Low Adoption Costs. No code changes to existing apps or APIs. *** Future proof (quantum resistant)

    IMPORTANT FEATURES: --- Immutable, rotating, workload identities --- Verified workload identity trust (trust is verified at the start of every communication session). --- Synchronous Ephemeral Encryption (end-to-end symmetric encryption without a key exchange.) --- Decentralized and autonomous identity and secrets management --- High Frequency Credential Rotation (prevents credential theft). --- 100% Malware Delivery Prevention (even if it arrives encrypted in TLS) --- 100% Data Confidentiality and Integrity (in transit, over the entire routed between endpoints) --- Decryption-based trust verification. --- Protection of both client and server endpoints --- Protection across all cloud environments (private, hybrid, multi-cloud) --- Encryption and decryption at either Layer 4 (every packet) or Layer 7 (message bodies). --- Protection of N-S traffic and E-W traffic --- Operates with any containerize workload system or VMs

    Highlights

    • FAST TIME TO VALUE. +++ Immediate Protection: Security benefits are immediate at runtime. +++ Simple Devops-friendly configuration and deployment of Sidecars. +++ Security benefits begin immediately on deployment. +++ Security for enterprise and external third party organizations. +++ Self-serve training via the Hopr Help Center.
    • LOWER COST. +++ Cloud native cost and pricing is more efficient than legacy IAM and cybersecurity SaaS solutions. +++ Decentralized identity produces a net positive customer savings of 10% to 80%. +++ Greatly reduced soft costs over legacy PKI protocols. +++ No modification to existing applications or API code is needed. +++ Config and deployment does not require high DevSecOps skills. +++ Improved container portability enables optimization of cloud spend.
    • HIGH SECURITY. +++ Machine Identity Trust: Frequent workload identity verification. +++ Synchronous Ephemeral Encryption: (SEE™) ensures data in transit is confidential and tamper-proof over the entire route. MITM attacks are prevented. +++ Malware Delivery Prevention: Untrusted message traffic fails SEE™ decryption and is discarded. +++ Automated Moving Target Defense (AMTD): Workload credentials rotate at a high freque

    Details

    Sold by

    Delivery method

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Cloud Native AMTD for API Threat Protection and Access Control

     Info
    Pricing is based on contract duration. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. Usage-based pricing is in effect for any usage exceeds the entitle amount or not covered in the contract. These charges will be applied on top of the contract price. If you choose not to renew or replace your contract before it ends, access to your entitlements will expire.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    Private-facing sidecars
    Sidecars for use with internal workloads and endpoints
    $0.00
    Public-facing sidecars
    Sidecars for use with public-facing workloads and endpoints
    $0.00

    Additional usage costs (3)

     Info

    The following dimensions are not included in the contract terms, which will be charged based on your usage.

    Dimension
    Cost/unit
    Unit fee for workloads above the free volume (1 unit = 1 workload)
    $2.50
    Fee for sessions above the per-workload limit (1 unit = 1000 sessions)
    $0.60
    No DevOps? Our DevOps will config and deploy our sidecars for you
    $6,000.00

    Vendor refund policy

    All fees are non-cancellable and non-refundable except as required by law.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Technical and business support personnel are available via email M-F from 9AM-5PM US Eastern time zone. Free Forever products are supported on a "best effort" basis. The fastest method of technical support is to send us a support request email with the issue in the subject line and a full description of the problem in the message body. You will receive an automated response to your submitted support request email. Follow-up response times vary. Our goal is to follow-up within 24 hours. service@hopr.co 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    No customer reviews yet
    Be the first to write a review for this product.