Listing Thumbnail

    Eclypses MTE® Relay Server

     Info
    Deployed on AWS
    Free Trial
    Advanced Encryption as a Service for Web & Mobile Applications. Protect sensitive application layer data with FIPS 140 3 validated, quantum resistant CRYSTALS Kyber encryption, seamlessly deployed via AWS ECS, EKS. Unlike TLS, which secures only the transport session, Relay Server encrypts each API payload independently, preventing session reuse, token hijacking, and OWASP API attacks. With automated key rotation, integration into existing CDNs and gateways, and deployment in under 60 minutes, MTE Relay Server elevates security posture while simplifying compliance for GDPR, HIPAA, FedRAMP, and more.

    Overview

    Open image

    Eclypses MTE® Relay Server

    Eclypses MTE Relay Server is a next generation Encryption as a Service (EaaS) solution designed to secure sensitive data across any network, including future post quantum environments. Built with FIPS 140 3 validated cryptography and quantum resistant CRYSTALS Kyber, it protects against both current and emerging threats by encrypting data at the application layer, beyond what TLS or HTTPS can offer.

    Unlike traditional session based encryption models, MTE Relay Server protects each payload individually, eliminating reliance on persistent sessions and significantly reducing risk from token hijacking, replay attacks, and OWASP API threats.

    How It Works

    MTE Relay Server runs as a lightweight, containerized proxy using Docker that encodes HTTP data in real time, with no need to change your application logic or infrastructure. It handles:

    • Stateless payload encoding before data leaves your application
    • Automated key rotation and secure key lifecycle management
    • No reliance on TLS sessions or VPN tunnels
    • Seamless integration with load balancers, CDNs, and gateways

    Primary Use Cases

    • Secure HTTP or HTTPS traffic for mobile and web applications
    • Protect JWTs, API keys, session tokens, and IAM data
    • Enhance compliance with HIPAA, GDPR, CCPA, FedRAMP, and CJIS
    • Harden both cloud native and legacy applications without code changes

    Deployment Options

    • Deploy using AWS ECS or AWS EKS on Amazon Web Services
    • Supports low code and no code integrations with DevOps pipelines
    • Delivered as a Docker container, simple to orchestrate, monitor, and scale

    Why Choose Eclypses MTE Relay Server?

    • Uses a FIPS 140 3 validated cryptographic foundation
    • Provides post quantum protection using CRYSTALS Kyber encryption
    • Stops session hijacking, replay attacks, and payload inspection
    • Removes reliance on TLS and session based encryption methods
    • Installs quickly without disrupting existing systems
    • Reduces data security risks without adding development complexity

    Highlights

    • Automatic Key Rotation with OWASP Defense: Delivers continuous key rotation and protects against 8 of the OWASP API Top 10 threats, no code changes required.
    • No Session Reliance or TLS Dependency: Removes the need for TLS sessions or VPN tunnels by encrypting data at the application layer, preventing token hijacking and replay attacks.
    • Quantum-Resistant Payload Protection: Encrypts every API payload using FIPS 140-3 validated, CRYSTALS-Kyber post-quantum encryption, future-proofing sensitive data in transit.

    Details

    Delivery method

    Supported services

    Delivery option
    Deploy in ECS

    Latest version

    Operating system
    Linux

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free for 30 days according to the free trial terms set by the vendor. Usage-based pricing is in effect for usage beyond the free trial terms. Your free trial gets automatically converted to a paid subscription when the trial ends, but may be canceled any time before that.

    Eclypses MTE® Relay Server

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time. Alternatively, you can pay upfront for a contract, which typically covers your anticipated usage for the contract duration. Any usage beyond contract will incur additional usage-based costs.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (1)

     Info
    Dimension
    Description
    Cost/unit/hour
    Hours
    Container Hours
    $0.0029

    Vendor refund policy

    Refund Policy - We do not currently support refunds, but you can cancel at any time.

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Deploy in ECS

    Supported services: Learn more 
    • Amazon ECS
    • Amazon EKS
    Container image

    Containers are lightweight, portable execution environments that wrap server application software in a filesystem that includes everything it needs to run. Container applications run on supported container runtimes and orchestration services, such as Amazon Elastic Container Service (Amazon ECS) or Amazon Elastic Kubernetes Service (Amazon EKS). Both eliminate the need for you to install and operate your own container orchestration software by managing and scheduling containers on a scalable cluster of virtual machines.

    Version release notes

    Patch HTTP Streaming

    Additional details

    Support

    Vendor support

    Eclypses provides custom pricing for customers via Private Offer. Please contact sales@eclypses.com  for a better understanding of our pricing model and products.

    The Eclypses support center is available to assist with inquiries about our products from 8:00 am to 8:00 pm MST, Monday through Friday, excluding Eclypses holidays. Our committed team of expert developer support representatives handles all incoming questions directed to the following email address: customer_support@eclypses.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Application Stacks, Network Infrastructure, Security
    Top
    50
    In Infrastructure as Code, Continuous Integration and Continuous Delivery

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Encryption Methodology
    Utilizes FIPS 140-3 validated, quantum-resistant CRYSTALS Kyber encryption for payload protection
    Payload Security
    Provides stateless payload encoding with individual payload encryption, eliminating session-based vulnerabilities
    Deployment Architecture
    Containerized proxy solution deployable via AWS ECS and EKS with low-code and no-code integration options
    Network Layer Protection
    Secures application layer data beyond traditional TLS, preventing token hijacking and replay attacks
    Key Management
    Implements automated key rotation and secure key lifecycle management without disrupting existing infrastructure
    Cryptographic Architecture
    Patented Distributed Fragments Cryptography (DFC) with zero-knowledge encryption capabilities
    Cloud Platform Integration
    Native integration with AWS infrastructure, supporting AWS Secrets Manager, EKS cluster security, and AWS Key Management Service
    Secret Management Scope
    Comprehensive management of credentials, certificates, keys, tokens, and API keys across DevOps and cloud environments
    Security Compliance
    FIPS 140-2 certified cryptographic platform with zero-knowledge encryption design
    Multi-Cloud Support
    Unified secrets management platform designed for hybrid and multi-cloud infrastructure with infinite scalability
    Key Management Lifecycle
    "Comprehensive key management system with capabilities for key storage, generation, rotation, distribution, and usage policy enforcement"
    Encryption Library Support
    "Supports FIPS 140-3 validated encryption libraries and advanced cryptographic algorithms including post-quantum resistant Covercrypt"
    Public Key Infrastructure Integration
    "Seamless integration with external PKI systems for cross-organizational key governance and management"
    Confidential Computing
    "Runs inside a verifiable and confidential virtual machine ensuring data confidentiality at rest and in use with no hardware or software tampering"
    Cryptographic Access Control
    "Implements advanced access policy mechanisms for encryption keys using Covercrypt technology with post-quantum resistance"

    Contract

     Info
    Standard contract
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.