enterprisesecuritymag

Embedded Solutions 3000: A New Approach to Eliminating Cyber Threats

Dr. Larisa Tsirinsky, Founder, CTO and CEO, Embedded Solutions 3000Dr. Larisa Tsirinsky, Founder, CTO and CEO
The constant barrage of reports about data breaches and account hijacking make it painfully clear that organizations continue to struggle with password-based security. Despite the emergence of advanced security solutions such as biometrics and Single Sign-On (SSO), passwords remain a vital base layer for security across any application or service. However, most password security systems today are flawed because their design has not been updated. Passwords have a limited ability to protect the data or systems, and hence if the credentials created by an individual are not secure, an attacker can easily discover or guess the password and impersonate a user. Add to this the complexity of new cloud-based applications, the rise of Shadow IT, as well as BYOD, and the need for enhanced authentication becomes more critical than ever.

To combat the issues with password-based authentication, Israel-headquartered E.S. Embedded Solutions 3000 (E.S.) has developed a combined hardware and software product line, BitNetSentry (BNS), which secures critical infrastructures and organizations from a vast range of cyber threats. BNS is a smart gateway designed for fraud detection and prevention and critical infrastructure network protection. Dr. Larisa Tsirinsky, founder, CTO and CEO of E.S., says, “Our patented autonomous technology, which originated in the Israeli military forces, eliminates the usage of passwords and passcodes, leaving no room for human errors (as humans are the weakest link in the security chain).”

Some of the unique features that set the protocolagnostic BNS apart are its ‘encryption without encryption’ proficiency, zero visibility, negligible latency (few nanoseconds), and capability to thwart ‘rogue insiders.’ Without network and data-link addresses, BNS remains undetectable to hackers who map out the target’s network infrastructure. Even if attackers do manage to infiltrate the network, they will be redirected to a ‘dummy server’ with fake customer-predefined data, where the hacker will be monitored and tracked while in the system without raising suspicion. The system is also capable of performing bit-level traffic inspection and real-time identification of suspicious traffic, which makes it an excellent solution for detecting and preventing both insider and outsider network attacks. “The real-time, in-motion data traffic inspection ensures that no threat can pass through the BNS-secured stagegates of the network, improving organizational security,” adds Yaron Mintzker, VP of sales and business development.

The real-time, in-motion data traffic inspection ensures that no threat can pass through the BNS-secured stage-gates of the network, improving organizational security


E.S. also has the capability to withstand quantum computer brute force decryption. Quantum computers stand a good chance of changing the face of computing, and that goes double for encryption. But researchers worry that quantum computers might be able to crack certain codes used to send secure messages. To that end, since the BNS doesn’t use any encryption keys, E.S. believes it will be a boon as a quantum-resistant solution. Furthermore, the BNS offers IT/ OT network data link layer separation in a way that enables bi-directional communication and still provides required security level, excluding the need to buy, install, and maintain firewalls and hire IT personal to manage them.

Today, markets such as telecom, banking and finance, public utilities, healthcare, transportation, and casinos, among others, benefit from E.S.’ core BNS technology. To elaborate more on their value proposition, Dr. Tsirinsky cites the success story of a European chemical industry customer that wanted to allow bi-directional communication to and from their SCADA system. While the traditional unidirectional approach they were using helped protect the client’s SCADA system against illegal access, it prevented remote management and control access, which are significant aspects of successful and effective maintenance of such a system. To that end, E.S. integrated its BNS solution with the SCADA system, which allowed the communication to be bi-directional and secure simultaneously. BNS also provided bit-level packet inspection for incoming and outgoing traffic, which enabled them to detect illegal attempts to reach sensitive information or redirect unallowed traffic. “What impressed the client the most was our system’s easy deployment, low cost, and reliable network separation without the need to cut out the useful traffic,” informs Mintzker. “The system’s flexibility with SCADA protocols is just the icing on the cake. It gives the customer the ability to define more and new features in the future.”

Today, E.S. is recognized as a certified exporter by Israel’s Ministry of Economy and the firm’s products are deployed across many of Israel’s leading defense-related companies and agencies. The firm prides itself on providing the highest levels of effective, high-precision technology and product performance while being efficient and ensuring service quality. Proper access management solutions and the right identity are essential for the future of password security in any organization. With solutions like E.S.’ BNS, which ensure seamless bit-level protection, authentication can be made stronger and better. “We truly believe the best is yet to come,” wraps up Dr. Tsirinsky.
Share this Article:
Embedded Solutions 3000

Company
Embedded Solutions 3000

Headquarters
Ramat Gan, Israel

Management
Dr. Larisa Tsirinsky, Founder, CTO and CEO and Yaron Mintzker, VP of Sales and Business Development

Description
Israel-headquartered E.S. Embedded Solutions (E.S.) has developed a combined hardware and software product line, BitNetSentry (BNS), which secures critical infrastructures and organizations from a vast range of cyber threats. BNS is a smart gateway designed for fraud detection and prevention and critical infrastructure network protection. Without network and data-link addresses, BNS remains undetectable to hackers who map out the target’s network infrastructure. Even if attackers do manage to infiltrate the network, they will be redirected to a ‘dummy server’ with fake customer-predefined data, where the hacker will be monitored and tracked while in the system without raising suspicion