MTE Technology

It is important to understand that traditional and modern data security requires trust in the operating system (OS) and in the communication protocol. With zero-day hacking attacks rapidly increasing, traditional security is unable to protect your organization’s valuable data against these constant vulnerabilities. That is why our MTE® technology is different – our technology replaces your data with instantly obsolete random streams of values and restores it on the other side.

Get Started
Overview video
Background graphic element
 How MTE Works

How it Works

MTE technology is a data security solution providing application-level security through our MTE toolkits.

MTE generates instantly obsolete, meaningless, random streams of values that can be used to replace any form of data transmitted between endpoints or can be utilized as single use encryption keys.

Why MTE Technology?

Cyber security organizations have one goal: to keep cyber criminals out, which often means their solution is focused on securing the tunnel, not the actual data.

Why our technology is different

Utilizing our Eclypses Cryptographic Library (ECL), our patented MTE technology replaces your data with instantly obsolete random streams of values and restores it on the other side. By securing at the application level, MTE technology:

  • Verifies each endpoint connection
  • Requires no change to the user experience
  • Minimal impact on system resources
  • Secures data inside the application
  • Allows you to stop trusting the operating system and communication protocol

What are modern zero-day attacks?

Modern zero-day hacking attacks include attacks at the operating system (OS) which include escalated privilege attacks, compromised credentials, and malicious/rouge applications that can capture your information. These attacks can also include your credentials where secrets are passed between client and server that could be intercepted and do not have endpoint verification. TLS also has the potential for a zero-day attack as it relies on known methods and protocols, is susceptible to replay/certificate hijacking, is zero-knowledge/session-based, and relies on the operating system.

Eclypses Security Approach | A Layered Approach

ECL (Eclypses Cryptographic Library): FIPS 140-3 cryptographic library that provides consistent security for all offerings across all platforms

MTE (MicroToken Exchange): Patented technology that uses ECL to randomize and replace data with random streams of values

MKE (Managed Key Encryption): Uses ECL to randomly replace and encrypt data with single use encryption keys generated by MTE

Background graphic element

Protect against targeted attacks that happen at the application level.

Mobile Application Security

endpoint verification icon

Endpoint Verification

Zero Trust with Full Knowledge

application level security icon

Application Level Security

jailbreak protection icon

Jailbreak or Root Protection

website security icon

Website Security

Background graphic element