P-X Verticals

Security precautions like air gaps, network segregation or other forms of remote site isolation can hinder cybersecurity monitoring operations as they often rely on relaying all relevant data streams to a central machine where network data is filtered in search of potential threats.

Cost efficiency and/or infrastructural limitations can get in the way of attaining the desired level of detection capability through the use of central monitoring systems. P-X is a versatile, protocol agnostic cyber sensor that can help monitor the blind spots found in industrial and corporate networks including (but not limited to) the industry verticals found on this page.


Manufacturing in industries like consumer electronics, automotive, aerospace, metals and steel and other consumer goods including food have a couple of things in common. Heavy automation is at the core of their assembly lines, and the machines and robots that make up crucial parts of the assembly lines are more often than not controlled by computers that run end-of-life operating systems.

The lack of security updates for these machines render them vulnerable to accidental (through infected maintenance tools for example) or deliberate abuse. Sometimes, a tight integration with back-office networks is required to enable real-time analysis of crucial business data, which means an even larger part of the operation is exposed to cyber risk.

Companies like Boeing have suffered the consequences of cyber related damage to their assembly lines. To circumvent those vulnerabilities, manufacturing IT personnel often segregate machine networks from the general networks. Also, a physical isolation of certain parts of the factory infrastructure may be a factor. This increases the need for effective, high quality cybersecurity tools that can be deployed non-intrusively into manufacturing IT infrastructures.


A distribution of assets lies at the heart of the electrical power generation, transmission and distribution networks that form critical pieces of (inter-) national infrastructure. Both central and remote sites as well as their associated communication networks need to be secure.

The combination of distribution and often critical infrastructure adds complexity to the cybersecurity operations responsible for ensuring their integrity.

Threats like the cyber attacks that affected the Ukraine power grid in 2015 and 2016 can have devastating consequences.


Oil extraction, transportation and refining are carried out in similarly expansive and complex infrastructures. These infrastructures are comprised of multiple elements that ensure efficient upstream, midstream and downstream operations.

The subsequent segregation and/or isolation of the digital assets that are being used to drive the operation can be a challenge when it comes to deploying an advanced cyber security detection solution.

This potentially results in poor visibility into network communications and remote site cyber security.

Considering the fact that the oil industry is vulnerable due to the critical international importance of its commodity, and is heavily targeted by advanced attackers, staying ahead in terms of cyber security operations is essential


Monitoring gas extraction, storage and distribution facilities is notoriously difficult due to factors that are similar to the challenges found in the oil and electrical business.

Large and complex infrastructures, a plethora of systems and protocols to monitor, and an inherent state of security measures that can prevent some cybersecurity staples to take place. Staples like filtering for threats across the entire infrastructure in a central command centre.

A physical and virtual distribution of assets means that some (critical) areas can become blind spots. Getting a grip on those blind spots can be technically cumbersome and/or financially unfeasible.


The cyber resilience of water processing and distribution facilities is of key national importance. If water quantity or quality gets compromised in any way, entire civilian populations may suffer the consequences.

Water management infrastructures are composed of the same distributed assets as gas or oil storage and distribution facilities. This means that they are equally susceptible to sustaining cybersecurity related blind spots. Water related cyber incidents have happened, and vulnerability increases with the influx of efficiency and workflow driven digitalisation processes.

Eliminating existing or developing blind spots in the digital infrastructure is essential to developing a sufficient amount of cyber resiliency.


Chemical products require maximum attention because the consequences of an incident with them can be very grave. Simple misconfigurations can lead to fire, toxic fumes or even explosions that can be very hazardous to human life or the environment. This means that extreme care is required to help prevent equipment, and consequently the people who work with the equipment, from malfunctioning.

As IT and OT networks converge, simple digital attacks, not even targeted at a specific chemical plant, can inflict major damage to people and the environment.

Because of the randomness with which sophisticated threats can strike, manufacturers of chemical products need to develop advanced insights into what’s going on with their corporate and operational networks.



As with chemical products, the manufacturing of pharmaceutical drugs is a high stakes business. Faulty dosages or production stops caused by malfunctioning manufacturing equipment can threaten human life and potentially derail economies due to outbreaks of illness and medicine shortages.

This means that pharmaceutical plants are strategical targets for state-sponsored attackers and are subject to industrial espionage and silent infections, waiting to be activated. Pharmaceutical companies also have precious intellectual property to protect.

IP could even be accessible through production networks that are often poorly protected.


Harbours, airports, roads, bridges, tunnels and the like are all critical pieces of infrastructure. They are essential to making sure that a country ‘functions’ and that people and goods are able to move from A to B without hiccups. When pieces of this delicate ecosystem get derailed due to malfunctions, major resources have to be deployed to restore traffic flows and prevent a loss of revenue or worse. Unfortunately, traffic signs and control systems have been victims of successful hack attempts.

Advanced criminal entities can and will try to exploit the connectivity between control systems and the sites they control, which can lead to advantages for them but major problems for everybody else.

P-X employs a system that is perfect to deploy into remote sites and control rooms to help monitor the digital integrity of any piece of critical infrastructure.

Security and military

Integrity is at the heart of any security related organisation. The integrity of data, and the integrity of communication systems is absolutely crucial to running secure, successful operations.

The playing field in which security and military operate demands the highest levels of device security, ranging from the weapons systems to the surveillance and communications devices operators utilise to complete their missions. But who guards our guardians? As physical security and military operations blend more and more into the digital realm, high quality cyber security devices are required to help ensure the integrity of the tools and systems security and military operators use to fight an increasingly digital battle.

P-X technology can help secure the digital operations of security and military operators.

Our cyber sensors have been developed with military standards in mind. Robust, independent hardware, coupled with state of the art cyber detection software, and enhanced with a reliable, tried and tested old school communications technology (RF) to help ensure maximum usability, anywhere, anytime.