Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

STAR Registry Listing for

HYPR

Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best practices.

HYPR

HYPR’s founders set out to tackle a pervasive and persistent 60-year old problem, security controls built on the weakest of foundations, the password. They launched HYPR, The Passwordless Company, in 2014. Nearly a decade later, the company has grown to be a trusted provider of modern authentication security to marquee brands around the globe and has become the proven passwordless authentication leader and FIDO-standards pioneer. With successful large-scale global deployments, HYPR serves over a billion users across the widest range of use cases, protecting companies’ workforce and customers.
HYPR combines open standards, best-of-breed security and a fast and consistent user experience to deliver a proven, modern authentication solution for your workforce and customers. HYPR Authenticate and HYPR Adapt provide the strongest passkey-based authentication protection, with end-to-end, adaptive security risk assurance and an intuitive, simple passwordless experience.
With HYPR, IT and business leaders can drastically reduce their attack surface and deliver the highest levels of authentication security assurance. At the same time, HYPR empowers people to work more productively, with fast, seamless access to systems and applications and a more streamlined workflow. HYPR puts an end to the hassles, frustrations, and vulnerabilities associated with passwords and traditional multi-factor authentication (MFA).

Information about HYPR
Listed Since: 07/27/2023
Last Updated: 07/27/2023

STAR Level 1

Self-Assessment & Partner-Provided

Consensus Assessments Initiative Questionnaire v4.0.2

CAIQ 4.0.2 Self-assessment
Offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services. It provides a set of Yes/No questions a cloud consumer and cloud auditor may wish to ask of a cloud provider to ascertain their compliance to the CSA Cloud Controls Matrix (CCM).