The power of tigers at work for you.
Horangi builds security products that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise or time to do it themselves.
Security Platform features
Horangi helps save your company money by identifying vulnerabilities and offering assistance to remediate them.
We want to make Cyber Security threats easy to understand and even easier to mitigate.
We work with you and your team to identify and fix security issues as quickly as possible.
We work 24/7 to keep our service up and running with minimal downtime.
We support our customers from the very beginning and stand beside them through their security issues.
We strive to provide our clients with quality and rigorously tested solutions that work the first time.
Which plan is right for you?
|Security Report Card|
|Remote Incident Response $100 USD / hour (min 10 hours)|
|Security Report Card|
|Remote Incident Response / Infosec Consulting / Incident Preparedness 20 hours / year|
|Yearly Manual Assessment (Web or Network Pen Test) Up to 20 hours|
|Security Report Card|
|Remote Incident Response / Infosec Consulting / Incident Preparedness 80 hours / year|
|Yearly Manual Assessment (Web and Network Pen Test) Up to 80 hours|
|Need a custom solution for your business?|
Horangi can provide a bespoke security plan comprised of specially selected services for any sized business.
Discuss our services with a knowledgeable member of our Tiger Team by emailing us at firstname.lastname@example.org
Tigers make the best pen pals
Full-Spectrum CybeR services
When an organization discovers it has been the victim of a cyber attack, Horangi can send Incident Response Experts to identify the problem and help remove the attackers from the environment. In addition to assisting your organization's IT team, our experts can also navigate the business ramifications of an attack and will regularly consult with executive staff on each step of the response.
A full-scope security assessment is a one-time audit that includes internal and external examinations of your environment. This assessment often results in the discovery of security holes that Horangi is eager to help you plug. We use our software to help speed up the normal security overview process and ensure correct logging is in place.
After an attack, our Tigers complete an analysis and submit a professional report detailing what happened, when and what information was potentially lost. From there we assess the steps necessary to mitigate the damage including retrieval of lost data, identification of additional systems that may have been compromised and reporting to law enforcement.
Policy and governance
Based on our vast industry experience we regularly provide advice to top management and can help structure comprehensive cyber security policy for your organization. By establishing proper polices and implementing monitoring and strengthening, we ensure the highest level of accountability and transparency and aim for broad-based employee participation.
We offer a variety of customized learning opportunities including Digital Forensics and Incident Response courses. Our Security Architecture course helps Chief Information Security Officers and IT staff to design a network security infrastructure that will help prevent and detect cyber attacks as well as facilitate a proper incident response. At its core, Cyber Security begins with our Digital Forensics and Incident Response courses which help organizations identify attacks, limit the damage and, most importantly, prevent an attack situation from worsening.
Horangi’s vision is simple, accessible and usable security. To support our commitment to user-centered design we employ research techniques, implement features that best serve our users and apply human-focused security principles. We recognize that good design supports not only our business efforts but also the goals of our clients and we place customer experience at the forefront of our priorities.
Meet The Tiger Crew
Lee SultCo-Founder and CTO
Nikolay AkatyevVP of Engineering
Brandon SchmittlingVP of Creative Design
Seung-gi JeongLead CyberOps Engineer
Alex ZaslavskySoftware Architect
Thomas MitchellDevOps Lead
Lim Quan HengCyberOps Consultant
Reg ReyesCybersercurity Software Engineer
Renate GouveiaCybersercurity Software Engineer
Jeffrey WongCybersecurity Software Engineer
Cyril QuitevisCybersercurity Software Engineer
Uyen PhamExecutive Assistant
Aung MyintJunior CyberOps Consultant
Sam CruzCyberOps Researcher
Jiyeon KongCustomer Success Manager
JingDa LeeCustomer Success Manager
Criselda DumlaoIT Executive
Rodel AuxilioIT Executive
Wanna join our team?
A tiger’s Life is bold and mysterious
The word Horangi means tiger in Korean. In Asian cultures, especially Korean and Chinese, the tiger is a symbol of guardianship. Known for its protective nature, the tiger is constantly warding off evil spirits and disasters. In the modern world, cyberspace is a territory full of threats and attacks that are usually detected after the fact but we believe there is no “off” switch on a tiger. In other words, our team of professionals will tirelessly hunt for attackers and pro-actively pursue solutions that defend companies from potential attacks around the clock.