Horangi Pte Ltd

Horangi Logo 1


Address: 118A Telok Ayer St
068587 Singapore
Telephone: +65 3158 2031
Email:  [email protected]
Website: https://horangi.com
Contact:  Mike Leyden

Horangi offers security assessment and builds security products that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.


Penetration Testing

Contact: Horangi Sales
+65 3165 4897
[email protected]

Penetration testing is the hacking of one’s own computer system, web application, mobile application, IoT Device or network to discover exploitable vulnerabilities. Horangi takes a consultative approach to penetration testing – not only do we provide detailed steps for remediation of the identified vulnerabilities, we also contextualise each vulnerability for your organisation so you are aware of the risks.

Finally, we evaluate your security maturity based on the responsiveness and competence of your security (or development) team relative to industry benchmarks.

Horangi recruits top security consultants from tech firms such as Palantir, Trustwave, Nuix, Apple, Grab, E&Y, Deloitte and PwC. We use our extensive field experience in penetration testing, incident response, and strategic consulting to solve tough security problems for our customers.

CREST Qualified Consultants:
Practitioner Security Analysts:  Yes
Registered Penetration Testers:  Yes
Certified Web Application Testers:  No
Certified Infrastructure Testers:  No
Wireless Specialists:  No

Simulated Target Attack & Response (STAR) Threat Intelligence

CREST Qualified Consultants:
Registered Threat Intelligence Analysts:  Yes

Cyber Security Incident Response

Contact: Horangi Sales
+65 3165 4897
[email protected]

Horangi’s incident response services provide clients both physical and remote response services on a global scale. Supported by a team of broadly certified security experts, we can provide clients crisis management services (both physically and remotely), assistance with remediation, and incident analyses to identify the root cause.

CREST Qualified Consultants:
Practitioner Intrusion Analysts:  Yes
Registered Intrusion Analysts:  No
Certified Network Intrusion Analysts:  No
Certified Host Intrusion Analysts:  No
Certified Malware Reverse Engineers:  No
Certified Incident Managers:  No