Thank you for contacting us!
We will be in touch shortly.
If you requested a download, please check your corporate email for the download.
What is OT Asset Discovery?
Check out the different technologies available for building an OT asset inventory, and how to start using them today
What is OT Asset Management?
Learn what OT asset management is, how it works, which use cases it covers, and what it can do for you
Why you need an OT asset inventory
Need to convince others why an OT asset inventory is a must have? Here are some arguments.
FOUNDER AND CEO
Consider Langner an international software startup with 30 years of experience. We morphed from a leading OT security consultancy to a software vendor and are based in the US and in Germany.
Langner is independent and small. We don’t depend on external capital and crazy growth expectations. We don’t maintain an expensive workforce of traveling sales people and solution architects. We focus on product development with a small, dedicated team of world class experts that have worked together for more than ten years.
We pick customers who share our vision that building a secure and safe Industrial Internet of Things requires innovative software tools — tools that we build with the strong feedback of our customers, some of which are global leaders in their industries. If you share this vision, we’d like to hear from you.
Ralph Langner founded the German branch of the Langner group in 1988, and the US-based Langner Inc. in 2017. Ralph accumulated 25 years of hands-on field experience in the cyber security issues of power plants, water treatment facilities, nuclear facilities, food and beverage plants, automotive factories, steel mills, and many more.
He received worldwide recognition for his swift and comprehensive analysis of the Stuxnet malware and is considered a leading global expert on cyber defense.
“Ralph Langner is the global authority on cyber-physical attacks.”
“The Langner Group has assembled the world’s top experts in cyber-physical security.”
“Ralph Langner knows cyber-physical security and its policy implications like nobody else.”