Overview
Eclypses MTE API Relay Architecture Diagram
Eclypses MicroToken Exchange API Relay Architecture Diagram
Overview
Eclypses API Relay delivers data protection designed for modern AI and microservices environments by embedding protection within the data itself.
Modern breaches often occur when API data is exposed without effective controls. This can happen when data moves to AI systems, third-party services, or across supply chains where attackers harvest traffic today for future decryption.
Eclypses API Relay ensures sensitive API data is never exposed in usable form, even if networks, credentials, or AI systems are compromised. Data moves safely across services, clouds, and AI pipelines without relying on network trust or long-lived keys.
This approach is built for microservices environments and zero trust architectures, with protection designed for the post-quantum era.
Why Companies Need This Now
As AI adoption accelerates, APIs have become the primary attack surface.
Eclypses API Relay protects the data itself, not just the connection.
TLS protects the network session, not the application data.
Once decrypted, traffic is exposed to risks such as:
- Data manipulation or destruction
- Compromised credentials and impersonation
- Replay attacks
- Harvest now, decrypt later threats
How It Works
Inline API Protection
Deploys as a lightweight relay in front of existing APIs with no backend application changes.
Complete Payload Protection
API payloads are protected end to end, remaining unusable to attackers or unauthorized endpoints.
Zero Trust by Default
No trust is placed in networks, TLS sessions, or long-lived credentials. Each part of the payload is protected independently, with no reliance on shared secrets or session trust.
Future Safe by Design
Captured traffic has no usable value today or in the future, including in post-quantum environments.
Primary Use Cases
- Protect sensitive API data flowing into analytics and AI or LLM workflows
- Prevent data exposure across service meshes
- Secure machine to machine APIs across cloud and hybrid environments
- Stop replay attacks, token theft, and API abuse
- Reduce breach impact and audit scope for regulated data flows
Deployment Options
- Deploy on AWS ECS or AWS EKS
- Containerized design that scales with standard DevOps practices
- Fits into existing CI and CD workflows
- Fast deployment with no changes to backend API code in typical proxy setups
- No changes required to API code, clients, or gateways
Why Eclypses API Relay
Data Protection Beyond the Session
Protects data after TLS, where many breaches occur.
Built for AI Architectures
Keeps sensitive data out of AI systems and downstream tooling.
Zero Trust Without Complexity
No reliance on network trust, VPNs, or static credentials.
Post-Quantum Ready
Data in motion protected with ML-KEM and micro-tokens.
Fast Time to Value
Drop-in deployment with no key management and no major application rewrites.
Bottom Line
If your APIs feed data into AI systems, operate in microservices environments, or handle real-time data flows, network-based encryption alone is not enough.
Eclypses API Relay protects the data itself, even when other layers fail.
Highlights
- Post-Quantum Encryption: FIPS 140-3 validated CRYSTALS-Kyber protects APIs today and tomorrow.
- Stateless Payload Encryption: Each call is individually protected, no session reuse or credential exposure.
- Mitigates OWASP API Threats: Addresses 8 of the top 10 OWASP API vulnerabilities for enhanced endpoint security.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Description | Cost/unit/hour |
|---|---|---|
Hours | Container Hours | $0.0029 |
Vendor refund policy
Refund Policy - We do not currently support refunds, but you can cancel at any time.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Deploy on ECS
- Amazon EKS
Container image
Containers are lightweight, portable execution environments that wrap server application software in a filesystem that includes everything it needs to run. Container applications run on supported container runtimes and orchestration services, such as Amazon Elastic Container Service (Amazon ECS) or Amazon Elastic Kubernetes Service (Amazon EKS). Both eliminate the need for you to install and operate your own container orchestration software by managing and scheduling containers on a scalable cluster of virtual machines.
Version release notes
Support for DOMAIN_MAP environment variable
Additional details
Usage instructions
Visit our Public Doc Site for our detailed MTE API Relay Usage Guide: https://public-docs.eclypses.com/docs/mte-relay/mte-api-relay/aws-usage-docs/mte-api-relay-container-usage-guide
Support
Vendor support
The Eclypses support center is available to assist with inquiries about our products from 8:00 am to 8:00 pm MST, Monday through Friday, excluding Eclypses holidays. Our committed team of expert developer support representatives handles all incoming questions directed to the following email address: customer_support@eclypses.com
Eclypses provides custom pricing for customers via Private Offer. Please contact sales@eclypses.com for a better understanding of our pricing model and products.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.