Company Cyber Security Posture
NANA
NA Company Details
NA
NA
NA
NA
NA
NA
Scan still pending
NA
NA

Between 200 and 800
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 200 and 800 |
Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|
Company Subsidiaries

NA
Access Data Using Our API

Get company history
.png)
NA Cyber Security News
Board of Orient Technologies approves acquisition of majority stake in eProtect 360 Solutions
The acquisition is aligned with the company's strategic goal of expanding its cybersecurity portfolio, leveraging eProtect 360's expertise toย ...
Here's how Aurobindo Pharma adopted digital to streamline workforce
In an exclusive conversation with ETCIO, Gyan Pandey, Global and Group CIO, Aurobindo Pharma, highlights how going digital enabled theย ...
Cyber security agency cautions govt over engaging foreign IT audit firms
India's cyber security nodal agency Cert-in has issued an advisory to government organisations over the hiring of foreign companies forย ...

NA Similar Companies

Ipca Laboratories Limited
A consumer-led global pharmaceutical company, creating healthy doses of life since 1949. When you operate in an industry like pharmaceuticals, your work goes way beyond creating โproducts for customersโ. It is different from any other domain โ there lies a higher sense of responsibiliti and a need

Eli Lilly and Company
We're a medicine company turning science into healing to make life better for people around the world. It all started nearly 150 years ago with a clear vision from founder Colonel Eli Lilly: "Take what you find here and make it better and better." Harnessing the power of biotechnology, chemistry and

Celesio AG
On 12 September 2017, Celesio AG has officially announced its renaming to McKesson Europe AG, based on the shareholdersโ decision at the Annual General Meeting 2017. Documents of Celesio AG remain documents of McKesson Europe AG. More information can be found in the press release"Renaming: Celesio

Zydus Group
The Zydus Group with an overarching purpose of empowering people with freedom to live healthier and more fulfilled lives, is an innovative, global life-sciences company that discovers, develops, manufactures, and markets a broad range of healthcare therapies. The group employs over 27000 people worl

Sino Biopharmaceutical Limited
Sino Biopharmaceutical Limited and its subsidiaries are the leading innovative research and R&D-driven pharmaceutical group in China, with a business scope that covers the full industry chain of pharmaceutical R&D platforms, intelligent production and strong sales systems. Its product offerings incl

Glenmark Pharmaceuticals
Glenmark Pharmaceuticals Limited is a research-led, global organization committed to enriching lives. Innovation is deeply embedded in Glenmarkโs culture; it is how we differentiate ourselves in our key markets and create greater value for our stakeholders. In our journey of innovation over the pa

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
NA CyberSecurity History Information
How many cyber incidents has NA faced?
Total Incidents: According to Rankiteo, NA has faced 0 incidents in the past.
What types of cybersecurity incidents have occurred at NA?
Incident Types: The types of cybersecurity incidents that have occurred include .
Additional Questions
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
