There is
no off switch on a tiger.

Horangi means cyber security Learn more about horangi
img-description
devices
Security at your service

The power of tigers at work for you.

Horangi builds security products that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

Already have an account? Sign-in to your client area

Have a question? Visit the Support Center

  • 24.7.365 Vulnerability scanning
  • 25 Years of expertise
  • 100k Issues detected
  • 6 Global offices
  • 90k+ Hours of uptime
Rile a tiger and you’ll get the claws

Security Platform features

All the features you need...
  • Cost effectiveness

    Horangi helps save your company money by identifying vulnerabilities and offering assistance to remediate them.

  • Unique Ideas

    We want to make Cyber Security threats easy to understand and even easier to mitigate.

  • Timely Delivery

    We work with you and your team to identify and fix security issues as quickly as possible.

Our security experts conduct a special training at the KITRI BoB center
...with the protection of a dedicated tiger team.
  • Reliability

    We work 24/7 to keep our service up and running with minimal downtime.

  • Customer Relationship

    We support our customers from the very beginning and stand beside them through their security issues.

  • Quality Assurance

    We strive to provide our clients with quality and rigorously tested solutions that work the first time.

First Forensic Capture the Flag tournament on our platform in Seoul
Horangi Cyber Security

Join the family and be protected by tigers

Which plan is right for you?

Startup $50 USD monthly$500 USD yearly Get started Feature Details Level 1 Features
Web-Scanning Up to 3 hosts
($10/mo or $100/yr for additional)
OSINT Analysis
Market Comparison
Security Report Card
Github Integration
Remote Incident Response $100 USD / hour (min 10 hours)
Most people start here and eventually upgrade to Premium
Premium $500 USD monthly$5000 USD yearly Get started Feature Details Level 2 Features
Web-Scanning Up to 10 hosts
($10/mo or $100/yr for additional)
OSINT Analysis
Market Comparison
Security Report Card
Github Integration
Remote Incident Response / Infosec Consulting / Incident Preparedness 20 hours / year
Yearly Manual Assessment (Web or Network Pen Test) Up to 20 hours
Business $2000 USD monthly$20000 USD yearly Get started Feature Details Level 3 Features
Web-Scanning Up to 25 hosts
($10/mo or $100/yr for additional)
OSINT Analysis
Market Comparison
Security Report Card
Github Integration
Host-Based Scan
Remote Incident Response / Infosec Consulting / Incident Preparedness 80 hours / year
Yearly Manual Assessment (Web and Network Pen Test) Up to 80 hours
Enterprise image description Custom service pricingwith fluid resourcing Get in touch Feature Details Level 4 Features
Need a custom solution for your business?
Horangi can provide a bespoke security plan comprised of specially selected services for any sized business.

Discuss our services with a knowledgeable member of our Tiger Team by emailing us at hello@horangi.com

Already have an account? Sign-in to your client area

Have a question? Visit the Support Center

Want Horangi tigers working for you? Get in touch to get started

Tigers make the best pen pals

News, tips, special offers and ways to protect yourself online. You know, stuff Tigers like.
Become the tiger of your mountain

Full-Spectrum CybeR services

Incident response

When an organization discovers it has been the victim of a cyber attack, Horangi can send Incident Response Experts to identify the problem and help remove the attackers from the environment. In addition to assisting your organization's IT team, our experts can also navigate the business ramifications of an attack and will regularly consult with executive staff on each step of the response.

Security assessments

A full-scope security assessment is a one-time audit that includes internal and external examinations of your environment. This assessment often results in the discovery of security holes that Horangi is eager to help you plug. We use our software to help speed up the normal security overview process and ensure correct logging is in place.

Digital forensics

After an attack, our Tigers complete an analysis and submit a professional report detailing what happened, when and what information was potentially lost. From there we assess the steps necessary to mitigate the damage including retrieval of lost data, identification of additional systems that may have been compromised and reporting to law enforcement.

Policy and governance

Based on our vast industry experience we regularly provide advice to top management and can help structure comprehensive cyber security policy for your organization. By establishing proper polices and implementing monitoring and strengthening, we ensure the highest level of accountability and transparency and aim for broad-based employee participation.

Training

We offer a variety of customized learning opportunities including Digital Forensics and Incident Response courses. Our Security Architecture course helps Chief Information Security Officers and IT staff to design a network security infrastructure that will help prevent and detect cyber attacks as well as facilitate a proper incident response. At its core, Cyber Security begins with our Digital Forensics and Incident Response courses which help organizations identify attacks, limit the damage and, most importantly, prevent an attack situation from worsening.

User-centered design

Horangi’s vision is simple, accessible and usable security. To support our commitment to user-centered design we employ research techniques, implement features that best serve our users and apply human-focused security principles. We recognize that good design supports not only our business efforts but also the goals of our clients and we place customer experience at the forefront of our priorities.

We’re always scouting for talent

Wanna join our team?

What’s in a name?

A tiger’s Life is bold and mysterious

image description

The word Horangi means tiger in Korean. In Asian cultures, especially Korean and Chinese, the tiger is a symbol of guardianship. Known for its protective nature, the tiger is constantly warding off evil spirits and disasters. In the modern world, cyberspace is a territory full of threats and attacks that are usually detected after the fact but we believe there is no “off” switch on a tiger. In other words, our team of professionals will tirelessly hunt for attackers and pro-actively pursue solutions that defend companies from potential attacks around the clock.

Visit our office pages to learn more about our global activities
Contact Horangi

Get in touch with us

Please fill out the form below and one of our representatives will be in touch with you shortly.