WebMTE - DATA-IN-TRANSIT Web Application

Securing Transmitted Data

Overview

WebmTE

Most networks being used are simply not safe nor secure. Transmitted data remains vulnerable to attack!

  • Public Wi-Fi – Mobile ~ Corporate ~ Personal ~ Home ~
  • In most encrypted applications, the underlying transport type is TCP. TCP must be resilient to protect applications from attacks
  • “95% of HTTPS servers are vulnerable to Man in The Middle (MitM) attacks.”
  • 1/3+ of exploitation involved MitM attacks.”

Securing Data In Transit - MTE for Web Applications

Eclypses MicroToken Exchange (MTE)

WebMTE is the first protection of its kind as it secures transmitted sensitive data elements within a web page both seamlessly and easily

WebmTE

Securing Data In Transit - WebMTE

Agnostic to communication protocols, Simple implementation, Scales with minimal effort

Data-At-Rest

  • Protects the data that will be transmitted over unsecured Wi-Fi, as well as, many other network connection types

Connected Devices

  • Each instance of sensitive data can be locked down individually before transmission
  • Eliminates plausible “Man-In-The-Middle” attacks
  • No Key Management required nor managed by Endpoints

Data-In-Transit

  • No effect upon “User” experience, including latency
  • No additional action required by user to enable the MTE Technology
  • No software installed onto user endpoints

Securing Data In Transit - MTE for Web Applications

  • WebMTE Secures Transmissions of Sensitive Data to and from Web Servers
  • Payments ~ eCommerce ~ All Payments and PII elements
  • Forms – Applications, Healthcare, Claims Registration, Credentialing, Verification
  • PII – All types of Personal Identifiable Information
  • Secure Structured or Unstructured forms of data
  • Patent Pending key management

The technology behind MTE for Web Applications

WebmTE

Securing Data In Transit - MTE for Web Applications

Securing Data In Transit - MTE for Web Applications

WebmTE
WebmTE

Penetration Tested To NIST 800-30

Penetration Testing Excerpts from H2L Solutions, Inc. - Executive Summary

  • “With the current techniques and safeguards in place, as well as the algorithms being used in MTE Authentication Token generation, it would take the attempt of a nation-state level actor to break the process being used to both generate tokens and decrypt, or read those tokens, as communication between client and server”.
  • “This technology provides possibilities to extend current and future military technologies by allowing the implementation of remote functionality without compromising security and safety of both the warfighters and equipment”.