Home - Horangi

There is
no off switch on a tiger.

Horangi means cyber security Try our products for free
img-description
devices
Security at your service

The power of tigers at work for you.

Horangi builds security products that effectively deliver incident response and threat detection for thriving businesses, who are limited by time, expertise, and resources.

Already have an account? Sign-in to your client area

Have a question? Visit the Support Center

Still deciding?

TRY OUR PRODUCTS
FOR FREE

Sign Up For Free
Free Level 0 Features
Web-Scanning 1 free host
OSINT Analysis
Market Comparison
Security Report Card

Join the family and be protected by tigers

Which plan is right for you?

Startup Get in touch Feature Details Level 1 Features
Web-Scanning Up to 3 hosts
OSINT Analysis
Market Comparison
Security Report Card
Github Integration
Multi-User Account
Security Consulting
Most people start here and eventually upgrade to Premium
Premium Get in touch Feature Details Level 2 Features
Web-Scanning Up to 10 hosts
OSINT Analysis
Market Comparison
Security Report Card
Github Integration
Multi-User Account
Security Consulting 40 hours / year
Hunter
(Endpoint Detection & Response)
Business Get in touch Feature Details Level 3 Features
Web-Scanning Up to 25 hosts
OSINT Analysis
Market Comparison
Security Report Card
Github Integration
Multi-User Account
Security Consulting 160 hours / year
Hunter
(Endpoint Detection & Response)
Enterprise Get in touch Feature Details Level 4 Features
Need a custom solution for your business?
Horangi provides bespoke security strategies comprising products and services that are tailored to the size of the business.

Click to speak with us!
CREST approved member company. Read more
Standard Technology Partner with   Read more

Already have an account? Sign-in to your client area

Have a question? Visit the Support Center

Want Horangi tigers working for you? Get in touch to get started

  • 24.7.365 Vulnerability scanning
  • 25 Years of expertise
  • 100k Issues detected
  • 7 Global offices
  • 90k+ Hours of uptime
Rile a tiger and you’ll get the claws

Security Platform features

All the features you need...
  • Cost Effective

    Save on the long-term financial and reputational repercussions with the help of our Tigers who are able to identify and remediate vulnerabilities early.

  • Unique

    Cybersecurity threats are made easy to understand and even easier to mitigate, through our creative and innovative solutions.

  • Timely

    We work efficiently with our clients in locating and rectifying security issues effectively.

Our security experts conduct a special training at the KITRI BoB center
...with the protection of a dedicated tiger team.
  • Reliable

    We work 24/7 to keep our services running at optimal, with minimal downtime.

  • Relational

    Our loyal Tigers are dedicated to supporting and standing alongside our customers from beginning to end.

  • Quality

    We provide robust solutions that have been rigorously tested, as we strongly believe in delivering excellence in all that we do. Our customers deserve the best and nothing less.

First Forensic Capture the Flag tournament on our platform in Seoul
Horangi Cyber Security
Products and Services

DOWNLOAD AND SHARE OUR ONE-PAGERS

OVERVIEW
SCANNER
HUNTER
STORYFIER
CRYPTO
WARDEN
TRAINING
overview preview

Company Overview

Learn about Horangi, our unique approach to cybersecurity, and meet our leadership. Find out why we’re different from the rest.

overview preview

Horangi Scanner

Horangi Scanner is designed to enable your organization's secure software development lifecycle and improve your overall security posture. Web, Network and Code scanners ensure all your vulnerabilities are discovered.

overview preview

Horangi Hunter

Horangi Hunter is built to hunt for advanced persistent threats and smoothly runs on Windows, OSX and Linux systems. Hunter collects forensic data which is reviewed by our team of world-class cyber security experts.

overview preview

Horangi Storyfier

Horangi Storyfier is your always-on command center helping you to understand and respond to vulnerabilities. Storyfier bridges our automated products and human driven analysis into one easy to use interface.

overview preview

Horangi Cryptocurrency and ICO Security

  • Smart Contract Audits
  • Incidence Response
  • Hot / Cold Wallet Security
  • Digital Forensics
  • For Exchanges, ICOs, VC Funds
overview preview

Horangi Warden

Horangi Warden is a cloud monitoring tool that detects configuration vulnerabilities and suspicious activities in your cloud infrastructures.

overview preview

Horangi Training

  • Mobile Bite-Sized Learning
  • Performance Tracking and Summary Reports
  • Topical Customization Opportunities
  • Classroom experiences with opportunities for added live demos
  • Phishing Exercises

Tigers make the best pen pals

News, tips, special offers and ways to protect yourself online. You know, stuff Tigers like.
devices
Tiger Listens

BUG BOUNTY PROGRAM

To ensure that Horangi’s platform, products and services are secure, we are establishing a Bug Bounty Program (BBP) that allows the wider cybersecurity community to submit any vulnerabilities that they may have identified on our online portals and or website.

Become the tiger of your mountain

Full-Spectrum CybeR services

Incident response

When an organization discovers that they have become a victim of a cyber attack, Horangi’s Incident Response Experts are promptly activated to identify the root problem and remove the attackers from the environment. In addition to assisting the organization’s IT team, our experts are able to navigate the business ramifications of an attack, and would regularly consult with executive staff on each step of the response.

Security assessments

A full-scope security assessment is a one-time audit that includes internal and external examinations of the organization’s environment. This assessment often results in the discovery of security holes that Horangi is able to plug, with our state-of-the-art software. Its capabilities include speeding up the normal security overview process, and ensures correct logging is in place.

Digital forensics

After an attack, our Tigers complete a thorough analysis and submit an extensive report of the incident, taking into account when and what information was potentially lost. Thereafter, there will be an assessment of the steps necessary to mitigate the damages. These steps usually consist of the retrieval of lost data, identification of additional systems that may have been compromised, and reporting to law enforcement.

Policy and governance

Equipped with decades of industry experience, our specialists are able to provide valuable advice to top management personnel, on a regular basis, regarding the structuring of a comprehensive cyber security policy for the organization. Horangi ensures the highest standard of accountability and transparency through the establishment, implementation, monitoring, and strengthening of proper policies, so as to achieve broad-based employee participation.

Training

Horangi offers an array of customized learning opportunities such as basic Security Awareness, Capture-The-Flag and Phishing courses. Other technical courses curated for developers and analysts, range from Secure Architecture to Digital Forensics, Strategy, and Policy.

User-centered design

Horangi’s vision is simple, accessible, and intuitive. In our commitment to put our users first, we employ research techniques and implement human-focused security principles. Good design supports not only our business efforts but also the goals of our customers, which is a top priority at Horangi.

Cryptocurrency security

As the hype for cryptocurrency continues to grow, hackers all over the world have been coveting for these valuable, anonymized currencies. Our Tigers have the knowledge and expertise to provide technical solutions and the best security practices on securing a cryptocurrency wallet.

Cyber fraud

Cashless payments within web applications and mobile apps have become the critical revenue stream for many businesses. If engineering teams overlook security during the development process, there is a higher risk of their apps getting exposed to exploitation. Attackers frequently attempt to modify in-app purchases, and scrap data from their competitors’ database to gain an advantage. This is where our Tigers can come in to help build anti-fraud strategies that detect fraudsters and work alongside developers to implement a secure software development lifecycle.

Secure architecture review

Application and network architecture are often designed for functionality, rather than for security. Poor design of architecture often exposes the application and network to many security loopholes. Our team of Tigers has the ability to help bridge that gap by performing security design reviews on the organization’s architecture and mitigate the risks by patching up the potential security flaws.

We’re always scouting for talent

Wanna join our team?

What’s in a name?

A tiger’s Life is bold and mysterious

image description

The term ‘Horangi’, means ‘Tiger’ in Korean. In most Asian cultures, the tiger is a symbol of guardianship, highly regarded as a protective creature; constantly warding off evil spirits and disasters. In the modern world, cyberspace is a territory constantly plagued with threats and attacks. Our 24/7 team of Tigers tirelessly hunt for attackers and proactively pursue solutions that defend entities from potential attacks.

Visit our office pages to learn more about our global activities
The Lion City Singapore Office details Land of the Morning Calm Seoul, KR Office details The Pearl of the Orient Manila, PH Office details The Land of Fortune Taipei, TW Office details
The Fragrant Harbour Hong Kong Office details City of Magnificent Intentions Washington DC Office details The Emerald of the Equator Jakarta Office details
Contact Horangi

Get in touch with us

Please fill out the form below and one of our representatives will be in touch with you shortly.
Meet our investors

WE'RE BACKED
BY THE BEST

We're growing fast and making moves.