CTOs on the Move


 
HYPR is the leader in decentralized authentication with millions of users secured across the Fortune 500. Named a “Cool Vendor” by Gartner in 2017, HYPR is trusted by major enterprises such as Mastercard and Samsung to prevent breaches, eliminate fraud, and accelerate transaction speeds.
  • Number of Employees: 100-250
  • Annual Revenue: $1-10 Million
  • www.hypr.com
  • 45 W 34th St Rm 710
    New York, NY USA 10001
  • Phone: 646.503.5366

Executives

Name Title Contact Details

Funding

HYPR raised $18.3M on 10/01/2019
HYPR raised $35M on 04/20/2021

Similar Companies

Worksafe Technologies

Worksafe Technologies is a Los Gatos, CA-based company in the Computers and Electronics sector.

Beyond Identity

Beyond Identity is revolutionizing secure digital access for workforces, contractors, customers and developers. Our Universal Passkey Architecture provides the industry`s most secure and frictionless multi-factor authentication that prevents credential-based breaches, ensures device trust, and delivers secure and frictionless digital access, eliminating passwords entirely. Industry leaders like Snowflake, Unqork and Roblox rely on Beyond Identity to solve their access security challenges for their customers, employees, contractors and developers and to advance their journey toward Zero Trust Security.

TG Security Technology Co.

TG Security Technology Co. is a Fishers, IN-based company in the Computers and Electronics sector.

Counterpane Internet Security

Counterpane Internet Security, Inc is a Santa Clara, CA-based company in the Computers and Electronics sector.

Zimperium

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks. Zimperium is the first and only company to provide a complete mobile security system that continuously runs on the device to provide visibility, security and management for iOS and Android devices. With its non-intrusive approach, users can be confident that their data and their privacy are protected at all times, both on and off the corporate network. Finally, a mobile security system that solves the unique challenges of securing a mobile device without draining the battery or relying on an Internet connection.