Use cases

We proudly present applied use cases as an example of the activities of Cybersecurity USA.

Physical layer:

Sea Lock Ijmuiden
aXite Security Tools (AST) has proven its comprehensive cybersecurity tools for the protection of the Operational Technology (OT) systems of Sea lock IJmuiden in the simulation environment. The largest sea lock in the world is located in the Netherlands. AST’s intelligent and patented solution, including its AX-BOX Gatekeeper, has been deployed and enabled the client to execute zero trust access control. Moreover, AST has implemented a virtual shield for OT End-point protection, which identifies data or threats in context and provides intrusion detection with active in-depth defence, both at operational (machine) level. This resulted in efficient fully-automated cyber-event management and mitigation, based on classifications of criticality.

Sea Lock Ijmuiden

Logical layer:

Mozilla Open Source Security (MOSS)
Radically Open Security (ROS) performs audits on open-source projects as part of the Mozilla Open Source Security (MOSS) project. This has led to (patched) CVEs in foundational technology libraries, and a subset of ROS’s MOSS audit reports are publicly available including: expat, graphite, iterm. These security audits contribute to Mozilla's work and to the health of the Internet.