Overview
Eclypses MTE Relay Server Architecture Diagram
Eclypses MicroToken Exchange Relay Server Architecture Diagram
Overview
Eclypses Relay Server delivers data protection designed for modern AI and microservices environments by embedding protection within the data itself.
Modern breaches often occur when data is exposed without effective controls. This can happen when data moves to AI systems, third-party services, or across unprotected supply chains where attackers harvest traffic today for future decryption.
Eclypses Relay Server ensures sensitive data is never exposed in usable form, even if networks, credentials, or AI systems are compromised. Data moves safely across services, clouds, and AI pipelines without relying on network trust or long-lived keys.
This approach is built for microservices environments and zero trust architectures, with protection designed for the post-quantum era.
Why Companies Need This Now
As AI adoption accelerates, Eclypses Relay Server protects the data itself, not just the connection.
TLS protects the network session, not the application data.
Once decrypted, traffic is exposed to risks such as:
- Compromised credentials, impersonation, and replay abuse
- Supply chain exposure across services and processors
- Long-term harvest now, decrypt later collection
How It Works
Inline Application Layer Protection
Runs as a lightweight relay in web and mobile applications with no backend code changes.
Per Request Data Protection
Each payload is protected independently, removing reliance on sessions or shared secrets.
Zero Trust by Default
No trust is placed in networks, TLS sessions, or long-lived credentials. Each part of the payload is protected independently, with no reliance on shared secrets or session trust.
Future Safe Design
Captured data has no usable value today or in the future, including in post-quantum environments.
Primary Use Cases
- Protect sensitive payload data in web and mobile applications
- Prevent token theft, replay attacks, and session abuse
- Reduce breach impact and audit scope for regulated data
- Secure legacy and cloud native applications without backend rewrites
Deployment Options
- Deploy on AWS ECS or AWS EKS
- Containerized design that scales with standard DevOps practices
- Fits into existing CI and CD workflows
- Rapid deployment depending on environment and integration scope
Why Choose Eclypses Relay Server
Data Protection Beyond the Session
Embeds data protection within the data, not just the connection.
Built for the AI Age
Keeps sensitive data out of AI systems and downstream tooling.
Zero Trust Without Friction
No reliance on network trust, VPNs, or static credentials.
Post-Quantum Ready
Data in motion protected with ML-KEM and micro-tokens.
Fast and Simple
Drop-in deployment with no key management required.
Bottom Line
If your web or mobile applications handle sensitive data, network-based encryption alone is not enough.
Eclypses Relay Server protects the data itself, even when other layers fail.
Highlights
- Automatic Key Rotation with OWASP Defense: Delivers continuous key rotation and protects against 8 of the OWASP API Top 10 threats, no code changes required.
- No Session Reliance or TLS Dependency: Removes the need for TLS sessions or VPN tunnels by encrypting data at the application layer, preventing token hijacking and replay attacks.
- Quantum-Resistant Payload Protection: Encrypts every API payload using FIPS 140-3 validated, CRYSTALS-Kyber post-quantum encryption, future-proofing sensitive data in transit.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Description | Cost/unit/hour |
|---|---|---|
Hours | Container Hours | $0.0029 |
Vendor refund policy
Refund Policy - We do not currently support refunds, but you can cancel at any time.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Deploy in ECS
- Amazon ECS
- Amazon EKS
Container image
Containers are lightweight, portable execution environments that wrap server application software in a filesystem that includes everything it needs to run. Container applications run on supported container runtimes and orchestration services, such as Amazon Elastic Container Service (Amazon ECS) or Amazon Elastic Kubernetes Service (Amazon EKS). Both eliminate the need for you to install and operate your own container orchestration software by managing and scheduling containers on a scalable cluster of virtual machines.
Version release notes
Support for DOMAIN_MAP environment variable
Additional details
Usage instructions
Visit our GitHub page for a detailed usage guide: https://github.com/Eclypses/mte-relay-server/blob/master/guides/aws/mte-relay-server-container-usage-guide.md
Support
Vendor support
Eclypses provides custom pricing for customers via Private Offer. Please contact sales@eclypses.com for a better understanding of our pricing model and products.
The Eclypses support center is available to assist with inquiries about our products from 8:00 am to 8:00 pm MST, Monday through Friday, excluding Eclypses holidays. Our committed team of expert developer support representatives handles all incoming questions directed to the following email address: customer_support@eclypses.com
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.