
Horangi Scanner
Horangi Scanner is designed to enable your organization's secure software development lifecycle and improve your overall security posture. Web, Network and Code scanners ensure all your vulnerabilities are discovered.
Horangi builds security products that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.
Already have an account? Sign-in to your client area
Have a question? Visit the Support Center
Free
Level 0 Features
|
---|
Web-Scanning 1 free host |
OSINT Analysis |
Market Comparison |
Security Report Card |
Web-Scanning Up to 3 hosts |
OSINT Analysis |
Market Comparison |
Security Report Card |
Github Integration |
Multi-User Account |
Security Consulting |
Web-Scanning Up to 10 hosts |
OSINT Analysis |
Market Comparison |
Security Report Card |
Github Integration |
Multi-User Account |
Security Consulting 40 hours / year |
Hunter (Endpoint Detection & Response) |
Web-Scanning Up to 25 hosts |
OSINT Analysis |
Market Comparison |
Security Report Card |
Github Integration |
Multi-User Account |
Security Consulting 160 hours / year |
Hunter (Endpoint Detection & Response) |
Need a custom solution for your business? |
Horangi can provide a bespoke security strategy comprised of products & services for any sized business.
Discuss our services with a knowledgeable member of our Tiger Team by emailing us at hello@horangi.com |
Already have an account? Sign-in to your client area
Have a question? Visit the Support Center
Want Horangi tigers working for you? Get in touch to get started
Horangi helps save your company money by identifying vulnerabilities and offering assistance to remediate them.
We want to make Cyber Security threats easy to understand and even easier to mitigate.
We work with you and your team to identify and fix security issues as quickly as possible.
We work 24/7 to keep our service up and running with minimal downtime.
We support our customers from the very beginning and stand beside them through their security issues.
We strive to provide our clients with quality and rigorously tested solutions that work the first time.
Learn about Horangi, our Products and our unique approach to Cyber Security. Review our Services and meet our leadership. Dive into each of our Products with detailed one-pagers and learn how they are different from conventional offerings.
Horangi Scanner is designed to enable your organization's secure software development lifecycle and improve your overall security posture. Web, Network and Code scanners ensure all your vulnerabilities are discovered.
Horangi Hunter is built to hunt for advanced persistent threats and smoothly runs on Windows, OSX and Linux systems. Hunter collects forensic data which is reviewed by our team of world-class cyber security experts.
Horangi Storyfier is your always-on command center helping you to understand and respond to vulnerabilities. Storyfier bridges our automated products and human driven analysis into one easy to use interface.
To ensure that Horangi’s platform, products and services are secure, we are establishing a Bug Bounty Program (BBP) that allows the wider cybersecurity community to submit any vulnerabilities that they may have identified on our online portals and or website.
When an organization discovers it has been the victim of a cyber attack, Horangi can send Incident Response Experts to identify the problem and help remove the attackers from the environment. In addition to assisting your organization's IT team, our experts can also navigate the business ramifications of an attack and will regularly consult with executive staff on each step of the response.
A full-scope security assessment is a one-time audit that includes internal and external examinations of your environment. This assessment often results in the discovery of security holes that Horangi is eager to help you plug. We use our software to help speed up the normal security overview process and ensure correct logging is in place.
After an attack, our Tigers complete an analysis and submit a professional report detailing what happened, when and what information was potentially lost. From there we assess the steps necessary to mitigate the damage including retrieval of lost data, identification of additional systems that may have been compromised and reporting to law enforcement.
Based on our vast industry experience we regularly provide advice to top management and can help structure comprehensive cyber security policy for your organization. By establishing proper polices and implementing monitoring and strengthening, we ensure the highest level of accountability and transparency and aim for broad-based employee participation.
We offer a variety of customized learning opportunities including Digital Forensics and Incident Response courses. Our Security Architecture course helps Chief Information Security Officers and IT staff to design a network security infrastructure that will help prevent and detect cyber attacks as well as facilitate a proper incident response. At its core, Cyber Security begins with our Digital Forensics and Incident Response courses which help organizations identify attacks, limit the damage and, most importantly, prevent an attack situation from worsening.
Horangi’s vision is simple, accessible and usable security. To support our commitment to user-centered design we employ research techniques, implement features that best serve our users and apply human-focused security principles. We recognize that good design supports not only our business efforts but also the goals of our clients and we place customer experience at the forefront of our priorities.
As the hype for cryptocurrency continues to grow, countless hackers have been eyeing for these valuable anonymized currency stored in the form of “bits”. At Horangi, our Tigers are able to provide you with technical solutions and security best practices on how to secure your cryptocurrency wallet, be it Bitcoin, Ethereum, Litecoin, Zcash, etc.
Cashless payments within web applications and mobile apps has become the critical revenue stream for many companies. If engineering teams don’t bake security into the the development process from the beginning, it often leaves their apps exposed to exploitation. Attackers frequently attempt adjusting price and quantity before a purchase, modify in-app purchases, and scrap data from their competitors databases to gain advantage. Horangi’s Tigers help our customers build anti-fraud strategies by detecting fraudsters and working with developers to implement a secure software development lifecycle.
Application and Network architecture are often designed for functionality, rather than for security. Poor design of architecture often expose the application and network to many security loopholes. Our Tigers from Horangi will help your organization to bridge that gap by performing security design review on your current or to-be architecture, and mitigate the risks by patching up the potential security flaws.
The word Horangi means tiger in Korean. In Asian cultures, especially Korean and Chinese, the tiger is a symbol of guardianship. Known for its protective nature, the tiger is constantly warding off evil spirits and disasters. In the modern world, cyberspace is a territory full of threats and attacks that are usually detected after the fact but we believe there is no “off” switch on a tiger. In other words, our team of professionals will tirelessly hunt for attackers and pro-actively pursue solutions that defend companies from potential attacks around the clock.
We're growing fast and making moves. Interested in investing? Email us at hello@horangi.com
Web Scanning is designed to probe a server or a host for vulnerabilities, and also to retrieve data on exposure risks. Web Scanning is done remotely; fuss-free, efficiently, and quickly.
An OSINT (Open-source Intelligence) analysis brings forth the technical expertise from open source networks to retrieve metadata regarding your servers or hosts. OSINT Analyses provide an overview of your security ecosystem, and a comparison to other similar players in the industry.
This is a summary of the results of your security ecosystem placed in a basic chart; comparing your cyber security position with similar players in the industry. A Market Comparison helps you to understand the current dynamics of cyber security standards in the industry and indicates how you can improve your organisation's position.
A Security Report Card encompasses Market Comparison data and a comprehensive list of vulnerabilities and detected exposure risks. This is drafted in a concise and intelligible manner to aid your organisation and us in building a stronger and safer cyber security ecosystem.
Integrate your Github account with the Horangi platform to automatically or manually sync vulnerabilities detected with your desired repository or project.
Users can invite other team members to share security information based on scan results. Invited users can see their current security levels, scan results, market comparisons as well as add hosts.
Security Consulting encompasses a series of steps:
Ultimately, the goal of IR is to effectively handle the incident so that the damage might be mitigated and both recovery time and costs are kept at a minimum.
We give our Startup level clients a reduced rate on our Remote Incident response at 100 USD an hour, so if something does happen, we are here to help.
Web Scanning is designed to probe a server or a host for vulnerabilities, and also to retrieve data on exposure risks. Web Scanning is done remotely; fuss-free, efficiently, and quickly.
An OSINT (Open-source Intelligence) analysis brings forth the technical expertise from open source networks to retrieve metadata regarding your servers or hosts. OSINT Analyses provide an overview of your security ecosystem, and a comparison to other similar players in the industry.
This is a summary of the results of your security ecosystem placed in a unsophisticated chart; comparing your cyber security position with similar players in the industry. A Market Comparison helps you to understand the current dynamics of cyber security standards in the industry and helps your organisation to improve upon your position.
A Security Report Card encompasses the Market Comparison chart, and also a comprehensive list of vulnerabilities and exposure risks detected. This is drafted in a concise and intelligible manner to aid your organisation and us in building a stronger and safer cyber security ecosystem from status quo.
Integrate your Github account with the Horangi platform to automatically or manually sync vulnerabilities detected with your desired repository or project.
Users can invite other team members to share security information based on scan results. Invited users can see their current security levels, scan results, market comparisons as well as add hosts.
Information Security Consulting
Incident Preparedness
Penetration Test
Hunter is built around the Sniper Forensics Methodology that seeks to identify business risk and enable quick response. Once findings are validated, actionable items are displayed in Horangi Storyfier so our customers can make quick decisions. Action items from the Hunter workflow can be managed from within Storyfier and exported to Jira or Github for simplified task tracking.
We understand that not all business fit the mold of our plans here, and some might prefer that we perform tests on-site or include other types of services.
Horangi can formulate a customised set of services to meet the demands of your business, be it security testing for fast iterating software teams, security awareness training, and other infosec services.