Horangi Trust Center: Bug Bounty Program
Horangi provides a range of products and services, such as security assessment, security hardening, incident response, and security training.
Just as much as we work hard to help you secure and protect your data, we realize we need to look inwards too and bolster our defenses to protect ourselves, which in turn also protects your privacy.
To that end, Horangi instituted a bug bounty program to promote transparency and provide a channel for external security researchers to identify and report vulnerabilities and security concerns in our products and services.
We investigate all legitimate reports and do our best to fix the problems in the shortest possible time.
Exciting Update: Horangi Cyber Security joined forces with Bitdefender!
Exciting Update: Horangi Cyber Security joined forces with Bitdefender!
If you want to report a vulnerability on Horangi assets, please go to the Bitdefender Bug Bounty Program and follow the process described there.
More From Horangi Trust Center
Privacy Policy
Horangi ensures best practices for data security in our products and services with industry-standard data protection, secure infrastructure and rigorous third-party verification
Privacy Policy
Horangi ensures best practices for data security in our products and services with industry-standard data protection, secure infrastructure and rigorous third-party verification
Compliance
Horangi is one of the first cybersecurity companies in Asia to be SOC 2 Type II certified, validating our controls regarding security and confidentiality
Compliance
Horangi is one of the first cybersecurity companies in Asia to be SOC 2 Type II certified, validating our controls regarding security and confidentiality
Compliance
Horangi is one of the first cybersecurity companies in Asia to be SOC 2 Type II certified, validating our controls regarding security and confidentiality
Compliance
Horangi is one of the first cybersecurity companies in Asia to be SOC 2 Type II certified, validating our controls regarding security and confidentiality
Security
The CIA triad (Confidentiality, Integrity and Availability) are the core principles of Horangi’s security infrastructure, and forms the bedrock of our security
Security
The CIA triad (Confidentiality, Integrity and Availability) are the core principles of Horangi’s security infrastructure, and forms the bedrock of our security
Security
The CIA triad (Confidentiality, Integrity and Availability) are the core principles of Horangi’s security infrastructure, and forms the bedrock of our security
Security
The CIA triad (Confidentiality, Integrity and Availability) are the core principles of Horangi’s security infrastructure, and forms the bedrock of our security