HomeCII/OTHopr raises $500K for faster product-led go-to-market approach

Hopr raises $500K for faster product-led go-to-market approach

Published on

spot_img

Maryland-based cybersecurity firm Hopr has managed to raise $500,000 in funding from TEDCO, with the institution doubling down on their initial investment of $200,000 from last year by investing an additional $300,000. The firm has developed a novel approach to Automated Moving Target Defense (AMTD) that is expected to become the future of cybersecurity. Hopr’s technology is a more effective strategy than current means of attack detection, employing a patented technique that can prevent intruders from reaching API endpoints. The company’s AMTD technology ultimately reduces the risk of data breaches due to stolen API credentials by rotating workload credentials at a high frequency, disrupting traditional approaches to certificates, keys, and secrets managers and ultimately end-to-end data encryption use cases. The tech solution is particularly significant to the cloud, which increasingly relies on containerized infrastructure in delivering business applications, requiring APIs to share data.

CEO of Hopr, Tom McNamara shared that the company’s second investment from TEDCO, despite the past year’s rocky liquidity and profitability concerns, is evidence of strong investor confidence in the firm and its technology. In turn, Hopr is expected to grow its presence in the market, always advancing its technology. The increase in API attacks has been a cause for concern, with new solutions seeming to have little effect. A report estimates that 78% of attacks come from seemingly legitimate users, when in fact, they are malicious actors who have achieved proper authentication. This highlights the high risk of stolen API credentials.

In recognition of the growing significance of cybersecurity solutions in businesses, Teddy Gresser, TEDCO investment analyst, acknowledges the importance of Hopr’s innovative AMTD approach in keeping data safe for businesses throughout Maryland and beyond. It is critical to provide them with another solution to bolster their information security.

Google for Startups Cloud Program recently recognized Hopr’s work with the firm joining it. This move will allow the company to pursue even more product development work, perform efficient software testing in larger scale use and ultimately explore new multi-cloud solutions.

In conclusion, Hopr’s technology has created new standards in the way cybersecurity solutions are being developed. The firm believes that their unique approach to Automated Moving Target Defense, which focuses on attack prevention rather than solely detection, will be the future of cybersecurity. The investment made by TEDCO and the recognition by Google for Startups Cloud Program will allow the firm to advance its technology and keep pace with ever-evolving threats to data security.

Source link

Latest articles

Are Smartwatches Vulnerable to Cyber Attacks?

Smartwatches have become essential accessories for many people due to their convenience, health-tracking features,...

Thailand cuts off power supply to scam hubs in Myanmar

Thailand's decision to cut off power supply to three areas in Myanmar known for...

Welcome, Hackbots: How AI Is Shaping the Future of Vulnerability Discovery – Source: www.hackerone.com

In the realm of cybersecurity, the role of artificial intelligence (AI) in hacking workflows...

MacOS Ferret operators incorporate deceptive tactics into their malware family

Recent reports have indicated that a new strain of malware, known as Ferret, has...

More like this

Are Smartwatches Vulnerable to Cyber Attacks?

Smartwatches have become essential accessories for many people due to their convenience, health-tracking features,...

Thailand cuts off power supply to scam hubs in Myanmar

Thailand's decision to cut off power supply to three areas in Myanmar known for...

Welcome, Hackbots: How AI Is Shaping the Future of Vulnerability Discovery – Source: www.hackerone.com

In the realm of cybersecurity, the role of artificial intelligence (AI) in hacking workflows...