E.S. Embedded Solutions 3000 LTD. (E.S.) is a stable company since 2002 with a bright future ahead. Its core technology incorporates mission-critical and time-critical bit-level communication. Thanks to that, E.S. has now become a system-house for tactical real-time communication systems. These systems have MIL-STDs and DO certifications, and they have been successfully deployed across the Israeli defense sector for almost two decades now.
In the past three years, the same technology was revealed by additional segments such as banks, industrial facilities, critical infrastructures, casinos, business tycoons, mid-range to large organizations, and data-center across the globe. They find out that E.S. (*different cybersecurity approach) can secure their sensitive communication, information, and other elements better than other commercial solutions, and in some cases, they became the only available solution.

E.S. approach to solving security risks

  • Ensure secured communication between two or more Industrial Bit Net Sentries (iBNS) using patented technology
  • Prevent any use of brute force decryption including future use of powerful CPUs or quantum computers

  • Enable bit-level network separation by installing iBNS in between critical infrastructure and control room rather undergoing expensive galvanic separation
  • Identify, filter, and control “critical” operational commands while allowing “non-critical” commands (as per pre-configuration requirements)
  • Maintain “whitelist” (permitted operational codes) and “blacklists” (unauthorized communication) to prevent any malicious and mistaken communication to critical infrastructure

  • Filter meaningful or suspicious content and context at the bit level within network
  • Filtered content and context include MAC address, IP address, ports, unique key words, and bit patterns e.g., credit card numbers, ID numbers etc


  • Prevent rogue insiders from hacking company system
  • “Insider” can be defined as IT admin with system passwords, regular employee with access to company data, consultants and 3rd parties with system-level authorizations
  • These “insiders” can go rogue and steal company info

*These are few examples (there are many more) in which E.S. cybersecurity is different:

I. E.S. BitNetSentry (BNS) appliance is seamless in the network, and there is neither a way to attack it nor to identify its existence anywhere. You can imagine how much benefits our customers get with it…
II. BNS ends the ‘nightmare’ of financial organizations’ management from being hacked by their own trusted insiders like system administrators and security protectors.
III. E.S. invented a brute force safe ‘encryption without encryption’ security method. It will shortly survive the quantum computing era.
IV. BNS reveals if messages get hacked somewhere in the cloud network, for instance, if a man-in-the-middle changes the original destination address, sender address or message content somewhere in the cloud.
V. Thanks to its bit level capabilities, the BNS enables SCADA bi-directional essential communication, including blocking legal-yet-malicious commands from harming PLCs and critical infrastructures.

E.S. team includes 47 of Israel’s top engineers, mathematicians, and algorithmic experts with vast experience of complex communication standards and protocols.

BitNetSentry (BNS) – A totally different approach to cybersecurity

What makes BNS different?

  • Invisible Bit-level network appliance
  • Patented ‘encryption without encryption’ abilities
  • Avionics and Mil-STD certifications

Why is it needed ?

  • Secures from insiders or MITM even in case they have all IT permissions
  • invisible traffic modification
  • Enables bi-directional secured SCADA networking
  • Secures against legal commands sent from legal sender but with malicious abnormal content

Who needs it?

  • Banks
  • Business Tycoons
  • Critical infrastructures
  • Casinos
  • Organizations
  • IoT
  • Medical
  • Defense
  • Avionics

How does it work?

E.S. clients include Israel’s leading defense and military companies, and its solutions have been deployed internationally for critical communication infrastructure across Europe, Africa, and Asia and across the financial, aviation, utilities, telecom, industrial, and security sectors.