Horangi Trust Center
Horangi is committed to the safety and privacy of your data, and we demonstrate this commitment through our Privacy Policy, Compliance, and Security measures. We spare no effort in implementing industry best practices and getting certified with internationally accepted compliance standards to safeguard your information.
The following sections represent our commitment:
Privacy Policy
Horangi ensures best practices for data security in our products and services with industry-standard data protection, secure infrastructure and rigorous third-party verification.
Privacy Policy
Horangi ensures best practices for data security in our products and services with industry-standard data protection, secure infrastructure and rigorous third-party verification.
Privacy Policy
Horangi ensures best practices for data security in our products and services with industry-standard data protection, secure infrastructure and rigorous third-party verification.
Privacy Policy
Horangi ensures best practices for data security in our products and services with industry-standard data protection, secure infrastructure and rigorous third-party verification.
Compliance
Horangi is one of the first cybersecurity companies in Asia to be SOC 2 Type II certified, validating our controls regarding security and confidentiality.
Compliance
Horangi is one of the first cybersecurity companies in Asia to be SOC 2 Type II certified, validating our controls regarding security and confidentiality.
Compliance
Horangi is one of the first cybersecurity companies in Asia to be SOC 2 Type II certified, validating our controls regarding security and confidentiality.
Compliance
Horangi is one of the first cybersecurity companies in Asia to be SOC 2 Type II certified, validating our controls regarding security and confidentiality.
Security
The CIA triad (Confidentiality, Integrity and Availability) are the core principles of Horangi’s security infrastructure, and forms the bedrock of our security.
Security
The CIA triad (Confidentiality, Integrity and Availability) are the core principles of Horangi’s security infrastructure, and forms the bedrock of our security.
Security
The CIA triad (Confidentiality, Integrity and Availability) are the core principles of Horangi’s security infrastructure, and forms the bedrock of our security.
Security
The CIA triad (Confidentiality, Integrity and Availability) are the core principles of Horangi’s security infrastructure, and forms the bedrock of our security.
Bug Bounty
Horangi has a bug bounty program to promote transparency and provides a channel for external security researchers to identify potential security concerns.
Bug Bounty
Horangi has a bug bounty program to promote transparency and provides a channel for external security researchers to identify potential security concerns.
Bug Bounty
Horangi has a bug bounty program to promote transparency and provides a channel for external security researchers to identify potential security concerns.
Bug Bounty
Horangi has a bug bounty program to promote transparency and provides a channel for external security researchers to identify potential security concerns.