Industrial Security Button

Industrial Security means Limes Security. Whether PLC manufacturer, system integrator, mechanical engineer, production enterprise or utility – we are all facing the same challenges. Profit from the know-how of the leading industrial security experts of Limes Security and protect your industrial enterprise and your machinery as appropriate to your needs.


Many organisations develop software. Only few of them also accomplish to do this securely and prevent weak spots. Secure software development starts already in the early stages of the development process. Limes Security has many years of experience in the introduction and improvement of security at software developing organisations.

Germany, Switzerland and the Netherlands are the fastest to secure their vulnerable Citrix systems 22/01/2020

Since 11.01.2020, Alpha Strike Labs of Limes Security GmbH has been performing scans for vulnerable Citrix systems with the vulnerability CVE-2019-19781, which according to current media reports and Twitter comments is already being actively exploited. For scan acquisition, they use the DCS scan network with over 1000 different search nodes [1], which was presented at […]

Limes Security and Alpha Strike Labs merge to become the leading OT security service provider in the DACH region 05/12/2019

Limes Security, an established Austrian security consulting company in the OT sector (Hagenberg/Vienna) and Alpha Strike Labs, an innovative German-Austrian security company (Berlin/Vienna), are joining forces for a common future. “The aim of the merger is to expand our competences and resources and to grow into one of the leading companies for OT security in […]

If the source code reveals sensitive data … 03/12/2019

In the course of penetration tests [ #link to article ] Limes Security very often also analyses client applications. It is irrelevant whether these are installed and executed on a computer system, a smartphone or an embedded system. Again, and again, the experts at Limes succeed in extracting sensitive data such as passwords, cryptographic keys, […]