Popular topics

Explore all topics

Other helpful resources

Account usage

Your account page displays usage statistics of the Hopr sidecars you have deployed.

Frequently asked questions

Answers to the questions we hear most often.

Frequently asked questions

Can’t find the answer you’re looking for? Reach out to our customer support team.

Explore all FAQs

What cybersecurity framework governs Hopr’s security controls?

Hopr’s Corporate and Development Securities Policies and Process Framework is based on the Center for Internet Security Inc. (CIS) Controls, Version 8. For instance, Hopr’s corporate (non-product development) processes and documentation are created, maintained and stored in a Google Business Cloud Space that is encrypted both in transit and at rest. Services such as remote video conferencing, email, partner collaboration, etc. are secured through the use of GoogleWorkspace.

What contact does Hopr have with my customer's data?

Hopr does not remove and customer data from your networks. And no Hopr proprietary code is in contact with your customer's data when it passes through a sidecar. The code that 'touches' your customer data as it ingresses and egresses the sidecar is highly maintained and vetted open source software (Envoy proxy and the AES 256 GCM library).

How does Hopr maintain objective security checks on the design and development of its products and services?

Periodically, Hopr leverages outside experts in vulnerability assessments and ethical hacking to identify potential vulnerabilities that may otherwise be unnoticed.

Stay in touch with us

Sign up for our awesome newsletter! No spam ever.

Thank you! Your subscription is confirmed.
Oops! Something went wrong while submitting the form.