Listing Thumbnail

    Eclypses MTE® Relay Server

     Info
    Deployed on AWS
    Free Trial
    Protect application data between clients and services and remove dependencies on network based defenses. Eclypses MTE Relay Server runs on ECS/EKS as a proxy in front of your backend and pairs with an MTE Relay Client (client integration may be required)

    Overview

    Open image

    Overview

    Eclypses Relay Server delivers data protection designed for modern AI and microservices environments by embedding protection within the data itself.

    Modern breaches often occur when data is exposed without effective controls. This can happen when data moves to AI systems, third-party services, or across unprotected supply chains where attackers harvest traffic today for future decryption.

    Eclypses Relay Server ensures sensitive data is never exposed in usable form, even if networks, credentials, or AI systems are compromised. Data moves safely across services, clouds, and AI pipelines without relying on network trust or long-lived keys.

    This approach is built for microservices environments and zero trust architectures, with protection designed for the post-quantum era.


    Why Companies Need This Now

    As AI adoption accelerates, Eclypses Relay Server protects the data itself, not just the connection.

    TLS protects the network session, not the application data.
    Once decrypted, traffic is exposed to risks such as:

    • Compromised credentials, impersonation, and replay abuse
    • Supply chain exposure across services and processors
    • Long-term harvest now, decrypt later collection

    How It Works

    Inline Application Layer Protection

    Runs as a lightweight relay in web and mobile applications with no backend code changes.

    Per Request Data Protection

    Each payload is protected independently, removing reliance on sessions or shared secrets.

    Zero Trust by Default

    No trust is placed in networks, TLS sessions, or long-lived credentials. Each part of the payload is protected independently, with no reliance on shared secrets or session trust.

    Future Safe Design

    Captured data has no usable value today or in the future, including in post-quantum environments.


    Primary Use Cases

    • Protect sensitive payload data in web and mobile applications
    • Prevent token theft, replay attacks, and session abuse
    • Reduce breach impact and audit scope for regulated data
    • Secure legacy and cloud native applications without backend rewrites

    Deployment Options

    • Deploy on AWS ECS or AWS EKS
    • Containerized design that scales with standard DevOps practices
    • Fits into existing CI and CD workflows
    • Rapid deployment depending on environment and integration scope

    Why Choose Eclypses Relay Server

    Data Protection Beyond the Session

    Embeds data protection within the data, not just the connection.

    Built for the AI Age

    Keeps sensitive data out of AI systems and downstream tooling.

    Zero Trust Without Friction

    No reliance on network trust, VPNs, or static credentials.

    Post-Quantum Ready

    Data in motion protected with ML-KEM and micro-tokens.

    Fast and Simple

    Drop-in deployment with no key management required.


    Bottom Line

    If your web or mobile applications handle sensitive data, network-based encryption alone is not enough.

    Eclypses Relay Server protects the data itself, even when other layers fail.

    Highlights

    • Automatic Key Rotation with OWASP Defense: Delivers continuous key rotation and protects against 8 of the OWASP API Top 10 threats, no code changes required.
    • No Session Reliance or TLS Dependency: Removes the need for TLS sessions or VPN tunnels by encrypting data at the application layer, preventing token hijacking and replay attacks.
    • Quantum-Resistant Payload Protection: Encrypts every API payload using FIPS 140-3 validated, CRYSTALS-Kyber post-quantum encryption, future-proofing sensitive data in transit.

    Details

    Delivery method

    Supported services

    Delivery option
    Deploy in ECS

    Latest version

    Operating system
    Linux

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free for 30 days according to the free trial terms set by the vendor. Usage-based pricing is in effect for usage beyond the free trial terms. Your free trial gets automatically converted to a paid subscription when the trial ends, but may be canceled any time before that.

    Eclypses MTE® Relay Server

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time. Alternatively, you can pay upfront for a contract, which typically covers your anticipated usage for the contract duration. Any usage beyond contract will incur additional usage-based costs.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (1)

     Info
    Dimension
    Description
    Cost/unit/hour
    Hours
    Container Hours
    $0.0029

    Vendor refund policy

    Refund Policy - We do not currently support refunds, but you can cancel at any time.

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Deploy in ECS

    Supported services: Learn more 
    • Amazon ECS
    • Amazon EKS
    Container image

    Containers are lightweight, portable execution environments that wrap server application software in a filesystem that includes everything it needs to run. Container applications run on supported container runtimes and orchestration services, such as Amazon Elastic Container Service (Amazon ECS) or Amazon Elastic Kubernetes Service (Amazon EKS). Both eliminate the need for you to install and operate your own container orchestration software by managing and scheduling containers on a scalable cluster of virtual machines.

    Version release notes

    Support for DOMAIN_MAP environment variable

    Additional details

    Support

    Vendor support

    Eclypses provides custom pricing for customers via Private Offer. Please contact sales@eclypses.com  for a better understanding of our pricing model and products.

    The Eclypses support center is available to assist with inquiries about our products from 8:00 am to 8:00 pm MST, Monday through Friday, excluding Eclypses holidays. Our committed team of expert developer support representatives handles all incoming questions directed to the following email address: customer_support@eclypses.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Application Stacks, Network Infrastructure, Security
    Top
    50
    In Infrastructure as Code, Continuous Integration and Continuous Delivery

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Quantum-Resistant Encryption
    FIPS 140-3 validated cryptography with CRYSTALS Kyber post-quantum encryption algorithm for protecting against current and emerging threats
    Application Layer Payload Encryption
    Stateless payload encoding that encrypts each API payload individually at the application layer, independent of TLS sessions or transport layer security
    Automated Key Lifecycle Management
    Automated key rotation and secure key lifecycle management without requiring application logic changes or code modifications
    Containerized Deployment Architecture
    Lightweight Docker container deployment compatible with AWS ECS and AWS EKS orchestration platforms for seamless integration
    OWASP API Threat Mitigation
    Protection against 8 of the OWASP API Top 10 threats including session hijacking, replay attacks, and token hijacking without code changes
    Cryptographic Architecture
    Built on patented and FIPS 140-2 certified Distributed Fragments Cryptography (DFC) with zero-knowledge-encryption capabilities
    Secrets Lifecycle Management
    Unified management of credentials, certificates, keys, tokens, and API keys across the entire lifecycle for machine identities
    Multi-Cloud and Hybrid Environment Support
    SaaS-based platform designed for hybrid and multi-cloud environments with infinite scalability
    Kubernetes Integration
    Kubernetes secrets injection capability to enhance EKS cluster security operations
    Comprehensive Security Extensions
    Extensions for secure remote access, password management, encryption, and KMS functionality
    Key Lifecycle Management
    Supports comprehensive key and certificate lifecycle management including key storage, generation, rotation, distribution, and usage policies.
    Cryptographic Algorithm Support
    Implements FIPS 140-3 validated encryption libraries, Covercrypt for post-quantum resistance with access policy support, and Findex for search encryption capabilities.
    Public Key Infrastructure Integration
    Provides seamless integration with external Public Key Infrastructure systems for managing keys and certificates beyond organizational boundaries.
    On-the-Fly Encryption and Decryption
    Delivers real-time encryption and decryption key operations for protecting sensitive data including workspace, research and development data, HR information, and electronic communications.

    Contract

     Info
    Standard contract
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.