How we do it
aXite develops in-house components to provide cybersecurity for technical installations. aXite always develops and configures these components completely independently, so that we have full knowledge of our work and the skills necessary to provide maximum security and awareness of results. We regularly share this knowledge in publications and (online) seminars.
aXite has developed a number of specific solutions for a broad range of applications including:
- Artificial Intelligence models for the detection of anomalies or threats;
- Open architecture: Service and Security Platforms for:
- advanced communication;
- easy connectivity with gateways or APIs;
- secure data sharing;
- scalable IT.

- Deep packet inspection for:
- data integrity;
- for real time FAT/SAT and change management;
- for data in context for efficient responses;
- for network visualization and enhanced capacity utilization.
- Cyber resilience for:
- Zero trust on end-point and systems
- Security by design – Detect and Protect (IDS and IPS)
- 360º security – Monitoring of sensor physics and model-based fault diagnoses


A selection of our techniques

Since our Because platforms are always communicating with each other, aXite has a great understanding knowledge of programming languages and communication protocols. Below is a selection of the techniques and standards we apply:
Applied programming languages:
Applied platforms and operating systems:
- Apache Karaf and Apache Camel;
- Redhat/Centos Linux and extensive knowledge of network and security capabilities;
- Rockwell, ABB, Pilz en Siemens Simatic automatiserings en PLC’s;
- DICOM and DICOS (Digital Imaging and Communication for Security);
- Fieldbus systems, such as Profibus and Profinet, OPC UA en ModBus.
Applied standards:
- ITIL v4 Service Management;
- PRINCE2 (tailored) Project Management, we call that Technology Change Mangement (TCM).
Usage of standards


Technology Change Management
For our project management and consultancy practice, we use a self-developed methodology: Technology Change Management, which is based on PRINCE2.

aXite implements Location Based Security. Learn more about it in our publication in: the Journal of Airport Management.