Securing your website browsers without disruption to the user experience
The MTE Web toolkit is a solution that is deployed through a web browser without plug-ins or disruption to the user experience.
MTE Web protects against vulnerabilities such as replay attacks, Wi-Fi eavesdropping, spoofing (IP spoofing, DNS spoofing, HTTPS spoofing) and hijacking (SSL hijacking, session/browser cookie hijacking, email hijacking).
Protect against targeted attacks that happen at the application level.
Mobile Application Security
Zero Trust with Full Knowledge
Application Level Security
Jailbreak or Root Protection
Continuous Website Security
Replaces your data: utilize MTE to replace your data with instantly obsolete random streams of values. You choose what sensitive data to secure, improving efficiency and allowing for a targeted security approach.
FIPS 140-3 validation: MTE technology has been validated for FIPS 140-3 with our ECL certified cryptographic library.
Secures your data: from your browser all the way to the web server
Prevents man in the middle attacks: when on public or unsecured web connections
No key management needed: as our MKE product provides automated key management with ever changing unrelated keys
Works with all versions of TLS: MTE technology is complementary to your existing security protocols
Individually secures each transmission within the session: this is unlike TLS or traditional web security where it is secured by session.
Compatible & Easy to Use
Works with any modern web browser: easily added to any website
No downloads, plugins, or installations on the client side: MTE is embedded in the website and accessible for use in the client browser with no change to the user experience
No external reliance on Eclypses or 3rd parties: no need for external calls to Eclypses servers or verification services
Small footprint: small size of approximately 60kB, compared to OpenSSL library size of approximately 800kB. MTE has high efficiency/low latency when compared to other security technology offerings
“Eclypses has cracked the code on how to properly secure data that's both at rest and at motion.”Richard Marshall, Former Director of Global Cybersecurity Management
A CISO’s Guide: What To Do Before / After a Cyber Attack
With the creation of faster, more powerful computers and technology has come a steadily increasing number of cyber and ransomware attacks. Now more than ever, compa...
Eclypses Receives FIPS 140-3 Validation, Proves Efficacy and Security of its MTE Technology
Validation ensures Eclypses customers are using a product validated by a National Institute of Standards and Technology approved testing laboratory. Eclypses, a lea...