How we do it
aXite develops in-house components for the cybersecurity of technical installations. aXite always develops and configures these components completely ourselves, so that we have all the knowledge and skills available to gather the maximum out of the components. We regularly share this knowledge in publications and (online) seminars.
aXite have developed a number of specific applications or solutions, such as:
- Artificial Intelligence models for the detection of anomalies or threats;
- Open architecture: Service and Security Platform:
- as a communication platform;
- for easy connectivity with gateways or APIs;
- for the secure sharing of data;
- for making IT scalable.

- Deep packet inspection:
- for data integrity;
- for real time FAT / SAT and change management;
- for data in context for efficient response;
- for network visualization and better capacity utilization.
- Cyber resilience:
- Zero trust on end-point and systems
- Security by design – Detect and Protect (IDS and IPS)
- 360º security – Monitoring sensor physics – Model based fault diagnoses


A selection of our techniques

Because aXite uses different platforms and always have to let them communicate with each other, aXite has a great knowledge of platforms, programming languages and communication protocols. Below is a selection of our applied techniques and standards:
Applied programming languages;
Applied platforms and operating systems:
- Apache Karaf and Apache Camel;
- Redhat/Centos Linux and extensive knowledge of network and security capabilities;
- Rockwell, ABB, Pilz en Siemens Simatic automatiserings en PLC’s;
- DICOM and DICOS (Digital Imaging and Communication for Security);
- Fieldbus systems, such as Profibus and Profinet, OPC UA en ModBus.
Applied standards:
- ITIL v4 Service Management;
- PRINCE2 (tailored) Project Management, we call that Technology Change Mangement (TCM).
Usage of standards


Technology Change Management
For project management and consultancy we use a self-developed methodology: Technology Change Management which is based on PRINCE2.

aXite implements Location Based Security. Learn more about it in our publication in: the Journal of Airport Management.