Home - Horangi

There is
no off switch on a tiger.

Horangi means cyber security Try our products for free
Security at your service

The power of tigers at work for you.

Horangi builds security products that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

Already have an account? Sign-in to your client area

Have a question? Visit the Support Center

Still deciding?


Sign Up For Free
Free Level 0 Features
Web-Scanning 1 free host
OSINT Analysis
Market Comparison
Security Report Card

Join the family and be protected by tigers

Which plan is right for you?

Startup Get in touch Feature Details Level 1 Features
Web-Scanning Up to 3 hosts
OSINT Analysis
Market Comparison
Security Report Card
Github Integration
Multi-User Account
Security Consulting
Most people start here and eventually upgrade to Premium
Premium Get in touch Feature Details Level 2 Features
Web-Scanning Up to 10 hosts
OSINT Analysis
Market Comparison
Security Report Card
Github Integration
Multi-User Account
Security Consulting 40 hours / year
(Endpoint Detection & Response)
Business Get in touch Feature Details Level 3 Features
Web-Scanning Up to 25 hosts
OSINT Analysis
Market Comparison
Security Report Card
Github Integration
Multi-User Account
Security Consulting 160 hours / year
(Endpoint Detection & Response)
Enterprise Get in touch Feature Details Level 4 Features
Need a custom solution for your business?
Horangi can provide a bespoke security strategy comprised of products & services for any sized business.

Discuss our services with a knowledgeable member of our Tiger Team by emailing us at hello@horangi.com
CREST approved member company. Read more
Standard Technology Partner with   Read more

Already have an account? Sign-in to your client area

Have a question? Visit the Support Center

Want Horangi tigers working for you? Get in touch to get started

  • 24.7.365 Vulnerability scanning
  • 25 Years of expertise
  • 100k Issues detected
  • 7 Global offices
  • 90k+ Hours of uptime
Rile a tiger and you’ll get the claws

Security Platform features

All the features you need...
  • Cost effectiveness

    Horangi helps save your company money by identifying vulnerabilities and offering assistance to remediate them.

  • Unique Ideas

    We want to make Cyber Security threats easy to understand and even easier to mitigate.

  • Timely Delivery

    We work with you and your team to identify and fix security issues as quickly as possible.

Our security experts conduct a special training at the KITRI BoB center
...with the protection of a dedicated tiger team.
  • Reliability

    We work 24/7 to keep our service up and running with minimal downtime.

  • Customer Relationship

    We support our customers from the very beginning and stand beside them through their security issues.

  • Quality Assurance

    We strive to provide our clients with quality and rigorously tested solutions that work the first time.

First Forensic Capture the Flag tournament on our platform in Seoul
Horangi Cyber Security
Products and Services


overview preview

Company Overview

Learn about Horangi, our Products and our unique approach to Cyber Security. Review our Services and meet our leadership. Dive into each of our Products with detailed one-pagers and learn how they are different from conventional offerings.

overview preview

Horangi Scanner

Horangi Scanner is designed to enable your organization's secure software development lifecycle and improve your overall security posture. Web, Network and Code scanners ensure all your vulnerabilities are discovered.

overview preview

Horangi Hunter

Horangi Hunter is built to hunt for advanced persistent threats and smoothly runs on Windows, OSX and Linux systems. Hunter collects forensic data which is reviewed by our team of world-class cyber security experts.

overview preview

Horangi Storyfier

Horangi Storyfier is your always-on command center helping you to understand and respond to vulnerabilities. Storyfier bridges our automated products and human driven analysis into one easy to use interface.

overview preview

Horangi Cryptocurrency and ICO Security

  • Smart Contract Audits
  • Incidence Response
  • Hot / Cold Wallet Security
  • Digital Forensics
  • For Exchanges, ICOs, VC Funds
overview preview

Horangi Warden

Horangi Warden is a cloud monitoring tool that detects configuration vulnerabilities and suspicious activities in your cloud infrastructures.

overview preview

Horangi Training

  • Mobile Bite-Sized Learning
  • Performance Tracking and Summary Reports
  • Topical Customization Opportunities
  • Classroom experiences with opportunities for added live demos
  • Phishing Exercises

Tigers make the best pen pals

News, tips, special offers and ways to protect yourself online. You know, stuff Tigers like.
Tiger Listens


To ensure that Horangi’s platform, products and services are secure, we are establishing a Bug Bounty Program (BBP) that allows the wider cybersecurity community to submit any vulnerabilities that they may have identified on our online portals and or website.

Become the tiger of your mountain

Full-Spectrum CybeR services

Incident response

When an organization discovers it has been the victim of a cyber attack, Horangi can send Incident Response Experts to identify the problem and help remove the attackers from the environment. In addition to assisting your organization's IT team, our experts can also navigate the business ramifications of an attack and will regularly consult with executive staff on each step of the response.

Security assessments

A full-scope security assessment is a one-time audit that includes internal and external examinations of your environment. This assessment often results in the discovery of security holes that Horangi is eager to help you plug. We use our software to help speed up the normal security overview process and ensure correct logging is in place.

Digital forensics

After an attack, our Tigers complete an analysis and submit a professional report detailing what happened, when and what information was potentially lost. From there we assess the steps necessary to mitigate the damage including retrieval of lost data, identification of additional systems that may have been compromised and reporting to law enforcement.

Policy and governance

Based on our vast industry experience we regularly provide advice to top management and can help structure comprehensive cyber security policy for your organization. By establishing proper polices and implementing monitoring and strengthening, we ensure the highest level of accountability and transparency and aim for broad-based employee participation.


We offer a variety of customized learning opportunities including Digital Forensics and Incident Response courses. Our Security Architecture course helps Chief Information Security Officers and IT staff to design a network security infrastructure that will help prevent and detect cyber attacks as well as facilitate a proper incident response. At its core, Cyber Security begins with our Digital Forensics and Incident Response courses which help organizations identify attacks, limit the damage and, most importantly, prevent an attack situation from worsening.

User-centered design

Horangi’s vision is simple, accessible and usable security. To support our commitment to user-centered design we employ research techniques, implement features that best serve our users and apply human-focused security principles. We recognize that good design supports not only our business efforts but also the goals of our clients and we place customer experience at the forefront of our priorities.

Cryptocurrency security

As the hype for cryptocurrency continues to grow, countless hackers have been eyeing for these valuable anonymized currency stored in the form of “bits”. At Horangi, our Tigers are able to provide you with technical solutions and security best practices on how to secure your cryptocurrency wallet, be it Bitcoin, Ethereum, Litecoin, Zcash, etc.

Cyber fraud

Cashless payments within web applications and mobile apps has become the critical revenue stream for many companies. If engineering teams don’t bake security into the the development process from the beginning, it often leaves their apps exposed to exploitation. Attackers frequently attempt adjusting price and quantity before a purchase, modify in-app purchases, and scrap data from their competitors databases to gain advantage. Horangi’s Tigers help our customers build anti-fraud strategies by detecting fraudsters and working with developers to implement a secure software development lifecycle.

Secure architecture review

Application and Network architecture are often designed for functionality, rather than for security. Poor design of architecture often expose the application and network to many security loopholes. Our Tigers from Horangi will help your organization to bridge that gap by performing security design review on your current or to-be architecture, and mitigate the risks by patching up the potential security flaws.

We’re always scouting for talent

Wanna join our team?

What’s in a name?

A tiger’s Life is bold and mysterious

image description

The word Horangi means tiger in Korean. In Asian cultures, especially Korean and Chinese, the tiger is a symbol of guardianship. Known for its protective nature, the tiger is constantly warding off evil spirits and disasters. In the modern world, cyberspace is a territory full of threats and attacks that are usually detected after the fact but we believe there is no “off” switch on a tiger. In other words, our team of professionals will tirelessly hunt for attackers and pro-actively pursue solutions that defend companies from potential attacks around the clock.

Visit our office pages to learn more about our global activities
The Lion City Singapore Office details Land of the Morning Calm Seoul, KR Office details The Pearl of the Orient Manila, PH Office details The Land of Fortune Taipei, TW Office details
The Fragrant Harbour Hong Kong Office details City of Magnificent Intentions Washington DC Office details The Emerald of the Equator Jakarta Office details
Contact Horangi

Get in touch with us

Please fill out the form below and one of our representatives will be in touch with you shortly.
Meet our investors


We're growing fast and making moves.