TLS Accelerator has been discontinued.


Don’t pull your hair out ever again! Generate the certificate request and then purchase your certificate on your server – in 10 minutes or less – and all from one page! It’ll be automatically installed! It’s not something that you love to do, so why go through all the headaches?


TLS Accelerator makes your HTTP server into HTTPS, with full support for proven Transport Layer Security version 1.2 (TLS is the successor and more secure version to SSL 3.0). This is the ONLY accelerator that includes Perfect Forward Secrecy out of the box.


Trading off security for performance isn’t really a trade-off. It’s a functional gap!  With fewer server hops to reduce latency, accelerated cryptography and quicker set up times, you’ll never have to sacrifice rock-solid hardened security for performance and processing.


100% Designed for Amazon Elastic Compute Cloud (EC2)

The first SSL (and TLS) Accelerator ever designed specifically for the public cloud. You don’t have to force-fit this into a VPC — it was designed for it from the ground up.

TLS Accelerator
TLS Accelerator

Perfect Forward Secrecy (PFS)

PFS is permanently impenetrable even to well-funded governments, and TLS Accelerator is the first accelerator to offer PFS out of the box. With PFS, your information today is kept secret even if the private key was to be somehow compromised in the future.

“A” Rating from SSL Labs

With an “A” rating from SSL Labs, our protocol, key exchange and cipher support is in the top performing (and most secure) percentile band.

TLS Accelerator
TLS Accelerator

Bypasses the Amazon Elastic Load Balancing (ELB) Data Hole

Amazon Elastic Load Balancing uses rapid IP changes. Traffic intended for your website could be routed to other webservers and either tampered with, sniffed or malicious code injected or replaced.

With an SSL certificate mismatch, missing page elements, scripts, and media can occur when your browser rejects the unknown certificate, or certificate mismatch errors may be displayed, or worse. These risks are present during every sixty second window on any of an ELB’s frequent IP changes, which often occur on an hourly or greater basis, depending on the amount of traffic.

Hardware Accelerated Cryptography

Take advantage of a cryptographic accelerator for blazing fast computationally intensive encoding and decoding of secure information while allowing your host CPU to perform other processing tasks.

TLS Accelerator
TLS Accelerator

Mitigates against BEAST and CRIME

You’ll never have to worry about BEAST (Browser Exploit Against SSL/TLS) and CRIME (Compression Ratio Info-leak Made Easy).

TLS Accelerator defeats the BEAST attack out of the box and prefers the strongest and latest TLS versions first, and only falls back to known-secure protocols.