
Datavant Company Cyber Security Posture
datavant.comDatavant makes the world's health data secure, accessible, and actionable. Datavant is a data platform company for healthcare whose products and solutions enable organizations to move and connect data securely. Through proprietary technology, the world's most robust health data network, and value-added services we protect, connect, and deliver the world's health data. Datavant enables more than 40 million healthcare records to move between thousands of organizations, including 75% of the 100 largest U.S. health systems, 100% of U.S. payers and an ecosystem of 300+ real-world data partners. To learn more about Datavant, visit datavant.com.
Datavant Company Details
datavant
6817 employees
58496.0
511
Software Development
datavant.com
Scan still pending
DAT_2566726
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Datavant Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Datavant Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Ciox Health, d/b/a Datavant Group | Breach | 85 | 4 | 5/2024 | DAT938072725 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: The Vermont Office of the Attorney General reported a data breach involving Ciox Health, doing business as Datavant Group, on December 6, 2024. The incident was a phishing email attack that allowed unauthorized access to certain Datavant data between May 8, 2024 and May 9, 2024, potentially impacting personal information such as names, addresses, and financial information; the exact number of individuals affected is unspecified. | |||||||
Ciox Health LLC, d/b/a Datavant Group | Breach | 60 | 3 | 5/2024 | DAT534072925 | Link | |
Rankiteo Explanation : Attack with significant impact with internal employee data leaksDescription: The Maine Attorney General's Office reported a data breach involving Ciox Health LLC, d/b/a Datavant Group, on February 11, 2025. The breach occurred between May 8 and May 9, 2024, due to a phishing email attack, affecting approximately 49,454 individuals, including 17 Maine residents. Datavant is offering 24 months of credit monitoring and identity theft protection services through Kroll. |
Datavant Company Subsidiaries

Datavant makes the world's health data secure, accessible, and actionable. Datavant is a data platform company for healthcare whose products and solutions enable organizations to move and connect data securely. Through proprietary technology, the world's most robust health data network, and value-added services we protect, connect, and deliver the world's health data. Datavant enables more than 40 million healthcare records to move between thousands of organizations, including 75% of the 100 largest U.S. health systems, 100% of U.S. payers and an ecosystem of 300+ real-world data partners. To learn more about Datavant, visit datavant.com.
Access Data Using Our API

Get company history
.png)
Datavant Cyber Security News
What Are the Cybersecurity Trends We Need To Follow?
We are awash in new tech. Where should we be paying attention to drive the security practice & the business forward?
Datavant, Boehringer Ingelheim partner to enhance clinical development
Data sharing technology company Datavant has expanded its collaboration with pharmaceutical company Boehringer Ingelheim to support Boehringer'sย ...
News - Health tech company Datavant Group says data breach impacted over 45,000 patients
Datavant group said that the data security incident it suffered last year compromised the sensitive personal information of almost 50000ย ...
Good Things Happen E2: The Cyber World
In the series finale of Good Things Happen, we joined Citi's 11th annual Digital Money Symposium in London which took place on 20th June, to beย ...
How tech is changing one of Irelandโs oldest industries
Technology is changing one of Ireland's oldest industries. The agriculture sector is going through digital change. Digitalisation has theย ...
AtlanTec Festival to Explore the Role of AI and Cybersecurity in Future Technology Innovation - Irish Tech
The AtlanTec Festival 2025 is officially underway, celebrating innovation and technology in the west of Ireland.
Over 30 Healthcare Providers Affected by CIOX Health Data Breach
The health information management services provider CIOX Health has suffered a data breach that has affected at least 32 healthcare providers.
Datavant Secures FedRAMPยฎ Authorization, Trusted by Federal Agencies Through Privacy-Preserving Infrastructure
The FedRAMP program helps federal agencies transition to using cloud services by defining the qualification standards for the safety, security,ย ...
The importance of security in the world of hybrid working
Anne Carrigy is the chief information officer at Logitech, a company that manufactures software and computer accessories.

Datavant Similar Companies

Bosch Global Software Technologies
With our unique ability to offer end-to-end solutions that connect the three pillars of IoT - Sensors, Software, and Services, we enable businesses to move from the traditional to the digital, or improve businesses by introducing a digital element in their products and processes. Now more than ever

Bosch
The Bosch Group is a leading global supplier of technology and services. It employs roughly 417,900 associates worldwide (as of December 31, 2024). According to preliminary figures, the company generated sales of 90.5 billion euros in 2024. Its operations are divided into four business sectors: Mobi

iFood
O iFood รฉ uma empresa brasileira de tecnologia, que aproxima clientes, restaurantes e entregadores de forma simples e prรกtica. O iFood tem o propรณsito de alimentar o futuro do Brasil e do mundo, transformando a sociedade por meio da educaรงรฃo e da tecnologia, da seguranรงa alimentar, da inclusรฃo e co

The Facebook company is now Meta. Meta builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps like Messenger, Instagram and WhatsApp further empowered billions around the world. Now, Meta is moving

Just Eat Takeaway.com
Just Eat Takeโawayโ.com is a leadยญing globยญal online delivยญery marยญketยญplace, conยญnectยญing conยญsumers and restauยญrants through our platยญform in 17 counยญtries. Like a dinner table, working at JET brings our office employees and couriers together. From coding to customer service to couriers, JET is a

CPAN
CPAN, the Comprehensive Perl Archive Network, is an archive of software written in Perl containing over 134,000 modules in over 29,700 distributions, as well as documentation for it. It has a presence on the World Wide Web at www.cpan.org and is mirrored world The Comprehensive Perl Archive Network

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Datavant CyberSecurity History Information
How many cyber incidents has Datavant faced?
Total Incidents: According to Rankiteo, Datavant has faced 2 incidents in the past.
What types of cybersecurity incidents have occurred at Datavant?
Incident Types: The types of cybersecurity incidents that have occurred incidents Breach.
How does Datavant detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through third party assistance with Kroll and remediation measures with 24 months of credit monitoring and identity theft protection services.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Data Breach at Ciox Health LLC, d/b/a Datavant Group
Description: The Maine Attorney General's Office reported a data breach involving Ciox Health LLC, d/b/a Datavant Group, on February 11, 2025. The breach occurred between May 8 and May 9, 2024, due to a phishing email attack, affecting approximately 49,454 individuals, including 17 Maine residents. Datavant is offering 24 months of credit monitoring and identity theft protection services through Kroll.
Date Detected: 2025-02-11
Date Publicly Disclosed: 2025-02-11
Type: Data Breach
Attack Vector: Phishing Email

Incident : Data Breach
Title: Data Breach at Datavant Group
Description: A phishing email attack allowed unauthorized access to certain Datavant data, potentially impacting personal information such as names, addresses, and financial information.
Date Detected: 2024-12-06
Date Publicly Disclosed: 2024-12-06
Type: Data Breach
Attack Vector: Phishing Email
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
How does the company identify the attack vectors used in incidents?
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing Email.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach DAT534072925
Data Compromised: Personally Identifiable Information
Identity Theft Risk: High

Incident : Data Breach DAT938072725
Data Compromised: names, addresses, financial information
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information, names, addresses and financial information.
Which entities were affected by each incident?

Incident : Data Breach DAT534072925
Entity Type: Healthcare
Industry: Healthcare
Customers Affected: 49454
Response to the Incidents
What measures were taken in response to each incident?

Incident : Data Breach DAT534072925
Third Party Assistance: Kroll
Remediation Measures: 24 months of credit monitoring and identity theft protection services
How does the company involve third-party assistance in incident response?
Third-Party Assistance: The company involves third-party assistance in incident response through Kroll.
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach DAT534072925
Type of Data Compromised: Personally Identifiable Information
Number of Records Exposed: 49454
Sensitivity of Data: High
Personally Identifiable Information: True

Incident : Data Breach DAT938072725
Type of Data Compromised: names, addresses, financial information
What measures does the company take to prevent data exfiltration?
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: 24 months of credit monitoring and identity theft protection services.
References
Where can I find more information about each incident?

Incident : Data Breach DAT938072725
Source: Vermont Office of the Attorney General
Date Accessed: 2024-12-06
Where can stakeholders find additional resources on cybersecurity best practices?
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Attorney General's OfficeDate Accessed: 2025-02-11, and Source: Vermont Office of the Attorney GeneralDate Accessed: 2024-12-06.
Initial Access Broker
How did the initial access broker gain entry for each incident?

Incident : Data Breach DAT534072925
Entry Point: Phishing Email
Post-Incident Analysis
What is the company's process for conducting post-incident analysis?
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Kroll.
Additional Questions
Incident Details
What was the most recent incident detected?
Most Recent Incident Detected: The most recent incident detected was on 2025-02-11.
What was the most recent incident publicly disclosed?
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-02-11.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Personally Identifiable Information, names, addresses and financial information.
Response to the Incidents
What third-party assistance was involved in the most recent incident?
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Kroll.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personally Identifiable Information, names, addresses and financial information.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 548.0.
References
What is the most recent source of information about an incident?
Most Recent Source: The most recent source of information about an incident are Maine Attorney General's Office and Vermont Office of the Attorney General.
Initial Access Broker
What was the most recent entry point used by an initial access broker?
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Phishing Email.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
