Invisify

Invisify - invisible network security logo

InvisiCore, the invisible protector:

a super filter that allows only legitimate
and threat-free communication

Invisify undetectable network security home

Invisify delivers breakthrough cybersecurity through invisible network security — a revolutionary approach that makes critical infrastructure and network components undetectable to attackers. Leveraging patented, military-grade technology, Invisify eliminates traditional attack surfaces and digital footprints entirely. Our solution provides seamless, bit-level monitoring and threat detection, neutralizing both external and insider risks before they materialize. Trusted by defense, avionics, and critical infrastructure organizations worldwide, Invisify redefines what network protection means — proving that when security is invisible, a target simply cannot be hit.

Invisify invisible network security logo

The Platform

Invisify invisible network security logo

The Platform

InvisiCore 1000 series

Compact industrial cybersecurity — invisible, ultra-low latency,
and built for critical edge deployments

Invisify invisible network security BNS-O
    • Compact Industrial Cybersecurity Platform
    • No MAC address
    • No IP address
    • Ultra-low latency
    • Handheld-size industrial casing
    • Fail-Close and Fail-Open options
    • 2 × RJ-45 Gigabit Ethernet ports
    • 1 × External power supply
    • Supports up to 4 virtual channels and 1 end point
  •  

InvisiCore 5000 series

High-capacity, fanless cybersecurity — industrial-grade performance with support for up to 80 virtual channels

Invisify invisible network security iBNS
  • Enhanced Compact Cybersecurity Platform
  • No MAC address
  • No IP address
  • Ultra-low latency
  • Handheld-size industrial casing
  • Fanless, no moving parts
  • Fail-Close and Fail-Open options
  • 2 × RJ-45 Gigabit Ethernet ports
  • 1 × External power supply
  • Supports up to 80 virtual channels and unlimited end points

InvisiCore 7000 series

Data center-grade cybersecurity — 1U rack-mounted,
scalable to 100GbE with redundant power and virtual
channel support

Invisify invisible network security cBNS
  • Cloud & Data Center Cybersecurity Platform
  • No MAC address
  • No IP address
  • Ultra-low latency
  • 1U 19″ rack-mounted appliance
  • Designed for data centers, cloud environments, and disaster recovery sites
  • Interfaces:

         –  2 × RJ-45 Gigabit Ethernet ports
         –  2 × SFP+ ports (supporting 10GbE fiber 
             or copper transceivers)
         –  Up to 2 x 100GbE aggregate 
             throughput

  • AC or DC redundant power supply options
  • Supports up to 80 virtual channels and unlimited end points

InvisiCore x90 series

Rugged cybersecurity for tactical and aviation environments — military-certified resilience and invisible network protection

Invisify invisible network security rBNS-G

Rugged Cybersecurity Platform for Tactical & Aviation

  • No MAC address
  • No IP address
  • Ultra-low latency
  • Hardened, shock-resistant appliance
  • Designed for military, aviation, and extreme environments
  • Certified to

         –  MIL-STD-810G
         –  MIL-STD-461
         –  MIL-STD-704
         –  DO-178
         –  DO-254

  • Supports up to 80 virtual channels and unlimited end points

On top of the platform, we provide advanced cybersecurity services

Invisify invisible network security logo

The Services

Invisify invisible network security InvisiHide

1. InvisiHide

Network Entities Hiding: Making critical network entities, such as firewall, invisible to attackers.

  • Hide existing firewall’s network access
  • No IP address
  • No MAC address
  • Not identifiable as device
  • Network peering unaffected
Invisify invisible network security InvisiFlow-IT

3. InvisiFlow-IT


Network communication smart filtering:

  • Bidirectional Separation of networks on OSI level 2 and up
  • Deep Packet inspection
  • Packet adjustment/redirection
  • Real-time Anomaly detection
  • Zero-Time Administrative access
Invisify invisible network security InvisiFlow-OT

2. InvisiFlow-OT

Network Entities Hiding: Making critical network entities, such as firewall, invisible to attackers.

  • Logical Data Diode
  • Industrial Firewall
  • Smart Filtering
  • Optimized for SCADA communication
  • Protocol agnostic (40+ protocols)
  • Secure remote operation
  • Bidirectional Separation of networks on OSI level 2 and up
  • Bidirectional communication compliant with IEC 62443
Invisify invisible network security InvisiTunnel

4. InvisiTunnel

Site-to-site secured tunneling by a reinforced two-layered encryption:


  • Site-To-Site VPN
  • Combined standard AES256 and WBC 
(White Box Cryptography)
  • Passwordless and keyless encryption provide unprecedented protection against brute force attacks, insider attacks and identity theft
  • ZTNA Secure Tunneling
Invisify invisible network security logo

The Services

Invisify invisible network security InvisiHide

1. InvisiHide

Network Entities Hiding: Making critical network entities, such as firewall, invisible to attackers.

  • Hide existing firewall’s network access
  • No IP address
  • No MAC address
  • Not identifiable as device
  • Network peering unaffected
Invisify invisible network security InvisiFlow-OT

2. InvisiFlow-OT

Network Entities Hiding: Making critical network entities, such as firewall, invisible to attackers.

  • Logical Data Diode
  • Industrial Firewall
  • Smart Filtering
  • Optimized for SCADA communication
  • Protocol agnostic (40+ protocols)
  • Secure remote operation
  • Bidirectional Separation of networks on OSI level 2 and up
  • Bidirectional communication compliant with IEC 62443
Invisify invisible network security InvisiFlow-IT

3. InvisiFlow-IT


Network communication smart filtering:

  • Bidirectional Separation of networks on OSI level 2 and up
  • Deep Packet inspection
  • Packet adjustment/redirection
  • Real-time Anomaly detection
  • Zero-Time Administrative access
Invisify invisible network security InvisiTunnel

4. InvisiTunnel

Site-to-site secured tunneling by a reinforced two-layered encryption:


  • Site-To-Site VPN
  • Combined standard AES256 and WBC 
(White Box Cryptography)
  • Passwordless and keyless encryption provide unprecedented protection against brute force attacks, insider attacks and identity theft.
  • ZTNA Secure Tunneling
Invisify invisible network security logo

Why Us

Invisify invisible network security logo

Why Us

The InvisiCore Product Line delivers invisible, zero-latency cybersecurity solutions designed for a variety of industries and deployment environments. All models operate without an IP or MAC address, making them undetectable to attackers while seamlessly integrating with existing infrastructure.

Invisify invisible network security logo

Our Customers

Invisify invisible network security logo

Our Customers

Invisify invisible network security logo

The Team

Invisify CEO Larisa Tsirinsky

Dr. Larisa Tsirinsky
Founder, CTO (acting CEO)

  • Holds Ph.D. in Technical Cybernetics and Computer Science

  • Possesses several registered patents in the fields of time/mission-critical communication and network security

  • A committee member of the “ISO Global Directory” for Industrial and IT security standards

  • Prior to founding E.S., Dr. Tsirinsky led a team at Israel Aircraft Industry, MLM division
Invisify Sales & Marketing Yaron Minzker

Yaron Mintzker

VP Business Development and Sales

  • Holds a master’s degree in innovation and entrepreneurship

  • Engineering background in computer science

  • 15 years experience in global sales, marketing, business development, and channel management positions both in private and public high-tech companies, as well as forming successful collaborations
Invisify COO Ilya Feigin

Ilya Feigin - CISSP
Chief Operating Officer

  • Holds an MBA from the Wharton School at the University of Pennsylvania. a BA in Computer Science from the Open University of Israel as well as CISSP certification.

  • Prior to joining E.S. to Invisify, held roles in cyber security strategy and global business development at Samsung in Korea.

  • Before Samsung, led a team of ethical hackers at EY in Israel and served as an information security team leader in the elite MAMRAM unit of the Israeli Defense Forces (IDF).
Invisify - invisible network security logo

Contact Us

Whether you wish to learn more
about our defense solutions or
our security systems, please
submit this brief form and
we will get back to you shortly.