
Secure access without complexity or cost
Secure access without complexity or cost
Free Open-Source Proxy that Eliminates VPNS, Credential sharing and Costly SSO Fees.

No Inbound Access
No Inbound Access
No Inbound Access
Eliminate all inbound firewall rules with outbound-only connections
Eliminate all inbound firewall rules with outbound-only connections
Eliminate all inbound firewall rules with outbound-only connections

Zero SSO Tax
Zero SSO Tax
Zero SSO Tax
Free integration with Google, Okta, JumpCloud and more
Free integration with Google, Okta, JumpCloud and more
Free integration with Google, Okta, JumpCloud and more

Complete Audit Trail
Complete Audit Trail
Complete Audit Trail
Standardized audit logs for all access in one place
Standardized audit logs for all access in one place
Standardized audit logs for all access in one place

Deploy in Minutes
Deploy in Minutes
Deploy in Minutes
Average setup time of 4.3 minutes across 200+ deployments
Average setup time of 4.3 minutes across 200+ deployments
Average setup time of 4.3 minutes across 200+ deployments



Eliminate Attack Exposure
Eliminate Attack Exposure
Eliminate Attack Exposure
Public endpoints expand your attack surface.
VPNs and firewall rules across distributed environments adds unnecessary risk and overhead.
Public endpoints expand your attack surface.
VPNs and firewall rules across distributed environments adds unnecessary risk and overhead.
Public endpoints expand your attack surface.
VPNs and firewall rules across distributed environments adds unnecessary risk and overhead.
Eliminate inbound exposure.
Agents create secure outbound-only tunnels, linking authenticated users to approved infrastructure.
Eliminate inbound exposure.
Agents create secure outbound-only tunnels, linking authenticated users to approved infrastructure.
Eliminate inbound exposure.
Agents create secure outbound-only tunnels, linking authenticated users to approved infrastructure.
Simplify and Shrink Your Attack Surface
Stop spending hours managing rule sprawl and automate safe, policy-driven access without complexity.
Simplify and Shrink Your Attack Surface
Stop spending hours managing rule sprawl and automate safe, policy-driven access without complexity.
Simplify and Shrink Your Attack Surface
Stop spending hours managing rule sprawl and automate safe, policy-driven access without complexity.
End the SSO Tax
Free IdP Integration
Identity integration shouldn't be a premium feature.
Free IdP Integration
Identity integration shouldn't be a premium feature.
Free IdP Integration
Identity integration shouldn't be a premium feature.
Automatically map permissions to roles in IdP
Connect Google Workspaces, Okta, JumpCloud, Entra ID, Auth0, and AWS Cognito to hoop.dev with no extra licensing fees.
Automatically map permissions to roles in IdP
Connect Google Workspaces, Okta, JumpCloud, Entra ID, Auth0, and AWS Cognito to hoop.dev with no extra licensing fees.
Automatically map permissions to roles in IdP
Connect Google Workspaces, Okta, JumpCloud, Entra ID, Auth0, and AWS Cognito to hoop.dev with no extra licensing fees.
Unify authentication across your stack
Save on licensing while improving your security posture.
Unify authentication across your stack
Save on licensing while improving your security posture.
Unify authentication across your stack
Save on licensing while improving your security posture.






Standardized audit trails
Standardized audit trails
Standardized audit trails
Simplified and Centralized
Centralize access to data and export it to multiple audit formats.
Simplified and Centralized
Centralize access to data and export it to multiple audit formats.
Simplified and Centralized
Centralize access to data and export it to multiple audit formats.
hoop.dev captures every action
Regardless of connection, database, shell, or cluster, logged in one consistent format for easy auditing and fast response.
hoop.dev captures every action
Regardless of connection, database, shell, or cluster, logged in one consistent format for easy auditing and fast response.
hoop.dev captures every action
Regardless of connection, database, shell, or cluster, logged in one consistent format for easy auditing and fast response.
Continuous Compliance
Stay compliant with SOC 2, GDPR, and more with exportable records and full-text search across access logs
Continuous Compliance
Stay compliant with SOC 2, GDPR, and more with exportable records and full-text search across access logs
Continuous Compliance
Stay compliant with SOC 2, GDPR, and more with exportable records and full-text search across access logs
GET TO KNOW
SIMPLICITY BY DEFAULT
GET TO KNOW
SIMPLICITY BY DEFAULT
GET TO KNOW
SIMPLICITY BY DEFAULT

Complex Architecture made Simple
Complex Architecture made Simple
Complex Architecture made Simple
Hoop's architecture uses outbound-only connections to secure your infrastructure without complex firewall rules. Authenticate through your existing IdP and access is proxied through to infrastructure, eliminating exposure of sensitive systems.
Hoop's architecture uses outbound-only connections to secure your infrastructure without complex firewall rules. Authenticate through your existing IdP and access is proxied through to infrastructure, eliminating exposure of sensitive systems.
Hoop's architecture uses outbound-only connections to secure your infrastructure without complex firewall rules. Authenticate through your existing IdP and access is proxied through to infrastructure, eliminating exposure of sensitive systems.

Secure by Design
Secure by Design
Secure by Design
Protect your infrastructure with end-to-end TLS encryption and zero-trust verification for every request.
The system uses ephemeral access tokens with automatic expiration instead of storing credentials on client devices.
All security protocols are transparently documented on GitHub for independent verification.
Protect your infrastructure with end-to-end TLS encryption and zero-trust verification for every request.
The system uses ephemeral access tokens with automatic expiration instead of storing credentials on client devices.
All security protocols are transparently documented on GitHub for independent verification.
Protect your infrastructure with end-to-end TLS encryption and zero-trust verification for every request.
The system uses ephemeral access tokens with automatic expiration instead of storing credentials on client devices.
All security protocols are transparently documented on GitHub for independent verification.
GET STARTED
GET STARTED
Transform your infrastructure access from a security liability into a competitive advantage. Join leading organizations and deliver secure, frictionless access that both engineering and security teams love.
FAQ
How long to get a pilot with a few connections?
How hard is it to self-host?
How long are pilots?
Is hoop.dev SOC2 compliant?
FAQ
How long to get a pilot with a few connections?
How hard is it to self-host?
How long are pilots?
Is hoop.dev SOC2 compliant?
FAQ
How long to get a pilot with a few connections?
How hard is it to self-host?
How long are pilots?
Is hoop.dev SOC2 compliant?

Join a growing community of software engineering teams transforming secure infrastructure access.
SSO
AI DATA MASKING

Join a growing community of software engineering teams transforming secure infrastructure access.
SSO
AI DATA MASKING

Join a growing community of software engineering teams transforming secure infrastructure access.
SSO
AI DATA MASKING