Horangi is the Korean word for Tiger

A SYMBOL OF GUARDIANSHIP, THE TIGER IS KNOWN FOR ITS PROTECTIVE NATURE AND ABILITY TO WARD OFF EVIL SPIRITS.

In the modern cyberspace, there is a seemingly endless onslaught of attacks and innumerable threats seeking to exploit victims, which is why at Horangi we believe there is no “off” switch on a tiger. Our team of professionals tirelessly hunt for attackers and pro-actively pursue solutions that defend companies from potential attacks around the clock.

OUR PRODUCTS

Scanner

Horangi Scanner

Designed to enable your organization's secure software development lifecycle and improve your overall security posture.
Web Scanner, Network Scanner and Code Scanner
Scanner

Horangi Hunter

Built to hunt for advanced persistent threats and smoothly runs on Windows, OSX and Linux systems.
Endpoint Detection
and Response
Scanner

Horangi Storyfier

Your always-on cyber security command center helping you to understand and respond to issues in your environment.
World-class experts ready to solve your issues on demand
Scanner
Horangi's Sniper Forensics Methodology
RECONNAISSANCE INFILTRATION PROPAGATION AGGREGATION EXFILTRATION

OUR SERVICES

Security Assessment

One-time audit that comprises internal and external examinations of your environment.

INCLUDES:
  • Manual Review
  • Software Review
  • Written Report
  • Briefing

Penetration Testing

Mitigating vulnerabilities in an organization’s system and reconfiguring network infrastructure.

ACTIVITIES:
  • Security Hardening
  • VAPT
  • Reconfiguration

Incident Response

Utilized to identify critical problems and help remove attackers from the environment.

ACTIVITIES:
  • Digital Forensics
  • On-site/Remote Response
  • Remediation Plan

Training

Available to strengthen your team’s security skills through our tailored courses.

COURSES:
  • Forensics & Incident Response
  • Security Architecture
  • Security Awareness
Horangi Scanner
SCANNER IS A SUITE OF AUTOMATED TOOLS USED TO DETECT VULNERABILITIES IN WEB APPLICATIONS, NETWORK ATTACHED SYSTEMS AND SOURCE CODE.
Product info
Horangi Scanner is designed to enable your organization's secure software development lifecycle and improve your overall security posture

WHAT DOES IT DO?

Scanner utilizes our constantly growing library of more than 50,000 threat signatures comprised of proprietary and open source data to enable Web Scanner, Network Scanner and Code Scanner to ensure all your vulnerabilities are discovered.

Web Scanner

Scans APIs and web applications for known vulnerabilities by efficiently spidering through links and ignoring pages linked outside the target domain.

Network Scanner

Reports on attackers, infrastructure breaches and vulnerabilities discovered on servers and network devices within your environment.

Code Scanner

Automatically reviews source code based on security best practices and helps prevent insecure code from being published to production environments.

HOW IS SCANNER DIFFERENT?

Scanner results complement the secure software development lifecycle by providing seamless integration solutions that are unavailable anywhere else in the cyber security market. Scanner will have a measureable impact on your organization's development cycle through quick detection of security vulnerabilities.
Compare your vulnerability results with other organizations through our market comparison report
Simplify remediation by tracking your project workflow directly within Horangi Storyfier
Import Scanner results into Jira or Github for immediate action by your development team
Horangi Hunter
HUNTER IS A BREACH DETECTION PLATFORM THAT ASSESSES AND INVESTIGATES ALL ENDPOINTS THROUGHOUT YOUR ENVIRONMENT.
Product info
Horangi Hunter is built to hunt for advanced persistent threats and smoothly runs on Windows, OSX and Linux systems.

WHAT DOES IT DO?

Hunter utilizes proprietary algorithms that screen findings and correlate data collected from all of our tools, which is then reviewed by our team of world-class cyber security experts.

Hunter collects forensic data including:


System Information
Running Processes
Open Network Connections
Timeline Data
Specified File Collection
Logs
Evidence Files
Malware Binaries

HOW IS HUNTER DIFFERENT?

Hunter is built around the Sniper Forensics Methodology that seeks to identify business risk and enable quick response. Once findings are validated, actionable items are displayed in Horangi Storyfier so our customers can make quick decisions. Action items from the Hunter workflow can be managed from within Storyfier and exported to Jira or Github for simplified task tracking.

HORANGI’S SNIPER FORENSICS METHODOLOGY

Reconnaissance • Infiltration • Propagation • Aggregation • Exfiltration
Horangi Storyfier
STORYFIER ILLUSTRATES YOUR SECURITY STORY SO THAT SENIOR LEADERS, IT DEPARTMENTS, DEVELOPERS AND SECURITY PROFESSIONALS CAN UNDERSTAND VULNERABILITIES AND TAKE ACTION.
Product info
Horangi Storyfier is your always-on cyber security command center helping you to understand and respond to the vulnerabilities in your environment.

WHAT DOES IT DO?

Security report card
and market comparison

Gain valuable insight into your current vulnerabilities and where you stand in comparison to other organizations.

Create and download
vulnerability reports

Create reports for dissemination within your organization so that all stakeholders can have actionable data.

Export issues to
Github and Jira

Integrates directly with Github and Jira so engineers and technical managers can send issues immediately to development teams.
Product info

Interact with our Cyber-Operations Team

Horangi Cyber-Operations Consultants are ready to solve any of your issues 24.7.365. Our world class experts can solve any problem big or small and are easily accessible through the cyber security command center.

HOW IS STORYFIER DIFFERENT?

Storyfier bridges our automated products and human driven analysis into one easy to use interface. CEOs understand their current cyber risk profile, technical managers can forecast their workload and engineers can interact with actionable data.
Simplify your internal cyber security decision-making process.
Interact with your organization's security data in one location.
Order penetration tests, download reports, and keep a history of your cyber security projects.
Initiate investigations and utilize Horangi Cyber-Operations Consultants for incident response and digital forensics.
Horangi Warden

Warden is a cloud monitoring tool that detects configuration
vulnerabilities and suspicious activities in your cloud
infrastructures.


As systems and information assets are being migrated to and managed in the cloud, it is
critical to detect malicious changes or discrepant behaviors in the cloud infrastructure.

Warden, the exclusive product of Horangi, offers end-to-end cloud monitoring solutions that
cover all cloud providers.
Real-time alerting of Configuration States
Real-time alerting of API Calls
Live Notification of Suspicious Actions
Horangi Training

Provide comprehensive and holistic awareness training that
covers best security practices, knowledge about common
security threats, and how to properly handle data.


Organizations need to ensure that their staff is equipped with a basic degree of security
awareness and proper data handling to be safe, secure and compliant.

Horangi provides practical security training and supporting assessments capable of advising
a company's cyber risk and readiness from a people perspective.
Mobile Bite-Sized Learning
Performance Tracking and Summary Reports
Topical Customization Opportunities
Classroom experiences with opportunities for added live demos
Phishing Exercises
Contact Horangi

Get in touch with us

Please fill out the form below and one of our representatives will be in touch with you shortly.
The Lion City Singapore Office details Land of the Morning Calm Seoul, KR Office details The Pearl of the Orient Manila, PH Office details The Land of Fortune Taipei, TW Office details
The Fragrant Harbour Hong Kong Office details City of Magnificent Intentions Washington DC Office details The Emerald of the Equator Jakarta Office details