Eclypses Receives FIPS 140-3 Validation, Proves Efficacy and Security of its MTE Technology

Validation ensures Eclypses customers are using a product validated by a National Institute of Standards and Technology approved testing laboratory.

Eclypses, a leader in end-point data protection, today announced that it received the Federal Information Processing Standard 140-3 (FIPS 140-3) validation after an independent, NIST accredited laboratory put the Eclypses encryption modules through a series of tests for its MTE technology. Seen as the gold standard in data security, the FIPS 140-3 validation proves that Eclypses’ MTE data protection technology effectively and consistently safeguards user data to ensure bad actors cannot access valuable information at any point during the data transmission process. MTE technology secures data at the application level, and provides endpoint verification, jailbreak or root protection, and zero trust with full knowledge. Eclypses is committed to providing its customers with the most stringently reviewed technology to ensure their users’ data is protected.

FIPS 140-3 is a U.S. government computer security standard used to approve cryptographic modules and covers a wide range of potential applications. With this validation from a National Institute of Standards and Technology (NIST) approved testing laboratory, Eclypses Cryptographic Library (ECL) is now validated. ECL houses all cryptographic algorithms used by Eclypses’ patented MTE technology. MTE provides true end-to-end payload protection through every aspect of a network, regardless of the configuration, and ensures that in the event of a breach, attackers cannot use the data to cause harm. This technology is an added layer of security at a low latency, to complement existing cyber security protocols with real-time speeds.

“Between 2019 and 2020, ransomware attacks rose by 62 percent worldwide, signaling the growing need for data security, especially at the mobile application level,” said Bryan Champagne, CEO of Eclypses. “With our MTE technology receiving FIPS 140-3 validation, we are proud to offer our customers secure algorithms that will ultimately protect their customers’ most important personal data.”

Mobile applications are notoriously difficult for developers to safeguard because hackers are able to steal data at the operating system layer. But with MTE technology, that data remains protected and unreadable to those bad actors. Eclypses is currently working with companies in critical infrastructure, fintech, retail and healthcare to ensure their mobile applications have the highest level of protection.

“This validation signals a company has completed a strict review process, and received validation from one of the most highly regarded security standards body in the world,” said Michael Brown, Rear Admiral USN (Retired) & Eclypses Board Advisor. “With the FIPS 140-3 validation, Eclypses can continue to deliver data security for its finance, healthcare, retail and critical infrastructure clients.”

In order to achieve FIPS 140-3 validation, cryptographic modules are subject to testing by NVLAP-accredited Cryptographic and Security Testing laboratories. The validation for Eclypses was performed by Penumbra Security, Inc. (Penumbra).

Interested in learning more? Contact us today.

About Eclypses

Eclypses, a disrupting cyber technology firm, offers organizations with an advanced data security solution not seen in today’s environments, called MicroToken Exchange® (MTE). MTE technology was developed to be the most innovative and disruptive data security solution for all mobile application technologies and websites. MTE technology generates a random string of values that is used to replace any form of structured or unstructured data. This replacement string of values is referred to as MTE, which provides innovative security against man-in-the-middle cyber-attacks. With a focus in the mobile sector, Eclypses aims to provide a higher level of security to protect against man-in-the-middle cyber-attacks in products and applications that may have limited resources, such as battery life, processor, or throughput.