AI Buyer Insights:

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Michelin, an e2open customer evaluated Oracle Transportation Management

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Michelin, an e2open customer evaluated Oracle Transportation Management

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

List of hoop.dev Customers

Apply Filters For Customers

Logo Customer Industry Empl. Revenue Country Vendor Application Category When SI Insight
Dock Professional Services 1936 $400M Brazil hoop.dev hoop.dev Identity and Access Management (IAM) 2024 n/a
In 2024, Dock implemented hoop.dev as an Identity and Access Management (IAM) solution to serve finance and operations automation within its Latin American fintech operations. The deployment positioned hoop.dev as an access control layer that functions as an operational access proxy to enforce policy and control risky activities across transaction and onboarding workflows. The implementation used a proxy-based architecture combined with a programmable policy engine and continuous audit capture, aligning with Identity and Access Management (IAM) functional patterns. hoop.dev was configured to block dangerous actions at the access layer and to instrument regulator ready audit trails, enabling automated enforcement of operational guardrails while supporting automated onboarding sequences. Operational scope covered finance and operations teams across Dock’s Latin American operations, where governance focused on reducing manual compliance toil and improving auditability. The rollout prioritized workflow integration for client onboarding and operational task automation, producing regulator ready audit trails and centralized policy enforcement without introducing new third-party implementation partners.
PicPay Banking and Financial Services 1432 $586M Brazil hoop.dev hoop.dev Identity and Access Management (IAM) 2024 n/a
In 2024 PicPay deployed hoop.dev as an Identity and Access Management (IAM) solution to provide protocol-level data masking and self-service, least-privilege database access for its developer and operations teams. The implementation positions hoop.dev to enforce inline access controls and to make access governance a native part of database session handling across PicPay Brazil. hoop.dev was configured to deliver AI data masking and an access proxy with single sign on style session mediation, enabling self-service provisioning workflows and fine grained role based access controls consistent with Identity and Access Management (IAM) functional patterns. Configuration emphasized least privilege, short lived credentials, and automated masking of sensitive fields at the protocol layer to limit exposure during development and operations activity. Deployment was scoped to developer and operations groups and instrumented inline at the database access layer to mediate queries and sessions in real time, providing near instant access for hundreds of developers. Operational coverage focused on PicPay sites in Brazil and centralized DBA policy enforcement, with hoop.dev operating as the control plane for ephemeral access and masking policies across supported database endpoints. Governance was reoriented toward delegated, self service access approvals and automated policy enforcement, reducing manual provisioning tasks for DBAs. As reported, DBA provisioning workload was reclaimed by approximately 93.7 percent, and the platform enabled near instant access for hundreds of developers, while keeping masking and least privilege controls enforced through the hoop.dev Identity and Access Management (IAM) implementation.
RD Station Professional Services 1000 $120M Brazil hoop.dev hoop.dev Identity and Access Management (IAM) 2024 n/a
In 2024, RD Station deployed hoop.dev to centralize and secure database access, using Identity and Access Management (IAM) controls to support engineering, customer support, and security teams across Latin America. RD Station, a CRM and marketing automation provider, implemented hoop.dev to reduce access friction, improve compliance posture, and accelerate customer response times through tighter control over who can query or modify production data. The implementation emphasized secure database access patterns and approval driven read write controls, with configuration aligned to read only access and gated write access workflows. Module usage inferred from the case included an SSO Bridge to federate authentication and an AI Data Masking capability to enable safe read only access to sensitive records while preserving investigative functionality for authorized staff. Access policies were mapped to role based access control and approval workflows, enabling approver inclusion for elevated operations and time bound sessions. Operational coverage focused on engineering, customer support, and security teams across RD Stations Latin America footprint, centralizing access to multiple production databases through a single IAM plane. Integrations were limited to identity federation and database connection orchestration, preserving audit trails and session logging for forensic and compliance review. The approach reduced ad hoc credential sharing by consolidating access requests and approvals into hoop.dev flows. Governance was formalized around approval gates and auditability, with process changes to route read only investigations through masked data channels and to require approvals for write operations. Role based policies and centralized audit logs established a consistent workflow for access requests and escalations, aligning operational practices with the Identity and Access Management (IAM) controls provided by hoop.dev.
Showing 1 to 3 of 3 entries

Buyer Intent: Companies Evaluating hoop.dev

ARTW Buyer Intent uncovers actionable customer signals, identifying software buyers actively evaluating hoop.dev. Gain ongoing access to real-time prospects and uncover hidden opportunities.

Discover Software Buyers actively Evaluating Enterprise Applications

Logo Company Industry Employees Revenue Country Evaluated
No data found
FAQ - APPS RUN THE WORLD hoop.dev Coverage

hoop.dev is a Identity and Access Management (IAM) solution from hoop.dev.

Companies worldwide use hoop.dev, from small firms to large enterprises across 21+ industries.

Organizations such as PicPay, Dock and RD Station are recorded users of hoop.dev for Identity and Access Management (IAM).

Companies using hoop.dev are most concentrated in Banking and Financial Services and Professional Services, with adoption spanning over 21 industries.

Companies using hoop.dev are most concentrated in Brazil, with adoption tracked across 195 countries worldwide. This global distribution highlights the popularity of hoop.dev across Americas, EMEA, and APAC.

Companies using hoop.dev range from small businesses with 0-100 employees - 0%, to mid-sized firms with 101-1,000 employees - 33.33%, large organizations with 1,001-10,000 employees - 66.67%, and global enterprises with 10,000+ employees - 0%.

Customers of hoop.dev include firms across all revenue levels — from $0-100M, to $101M-$1B, $1B-$10B, and $10B+ global corporations.

Contact APPS RUN THE WORLD to access the full verified hoop.dev customer database with detailed Firmographics such as industry, geography, revenue, and employee breakdowns as well as key decision makers in charge of Identity and Access Management (IAM).