How we do it

aXite develops in-house components to provide cybersecurity for technical installations. aXite always develops and configures these components completely independently, so that we have full knowledge of our work and the skills necessary to provide maximum security and awareness of results. We regularly share this knowledge in publications and (online) seminars.

aXite has developed a number of specific solutions for a broad range of applications including:

  • Artificial Intelligence models for the detection of anomalies or threats;
  • Open architecture: Service and Security Platforms for:
    • advanced communication;
    • easy connectivity with gateways or APIs;
    • secure data sharing;
    • scalable IT.
Fitting together
  • Deep packet inspection for:
    • data integrity;
    • for real time FAT/SAT and change management;
    • for data in context for efficient responses;
    • for network visualization and enhanced capacity utilization.
  • Cyber resilience for:
    • Zero trust on end-point and systems
    • Security by design – Detect and Protect (IDS and IPS)
    • 360º security – Monitoring of sensor physics and model-based fault diagnoses
Skilled programming

A selection of our techniques

Skilled programming

Since our Because platforms are always communicating with each other, aXite has a great understanding knowledge of programming languages and communication protocols. Below is a selection of the techniques and standards we apply:

Applied programming languages:

Applied platforms and operating systems:

Applied standards:

Usage of standards

Compliance

aXite has knowledge of compliance for different sectors as well, including:

  • NIST (National Institue of Standards and Technology);
  • NCSC (National Cyber Security Centrum);
  • IEC (International Electrotechnical Commission);
  • GDPR (General Data Protection Regulation);
  • ISO 27000 en NEN 7510.
Compliance

Technology Change Management

For our project management and consultancy practice, we use a self-developed methodology: Technology Change Management, which is based on PRINCE2.

Technology Change Management

aXite implements Location Based Security. Learn more about it in our publication in: the Journal of Airport Management.