Comparison Overview

Devoteam

VS

DKSH

Devoteam

73, rue Anatole France, Levallois-Perret, 92300, FR
Last Update: 2026-04-02
Between 750 and 799

Devoteam is a AI-driven tech consulting firm specialised in cloud platforms, cyber, data, and sustainability. Tech native for almost 30 years, Devoteam guides businesses through sustainable digital transformation to deliver value. With over 11,000 tech architects in more than 25 countries across Europe, the Middle East, and Africa, Devoteam is committed to using technology to serve people.

NAICS: 5416
NAICS Definition: Management, Scientific, and Technical Consulting Services
Employees: 10,286
Subsidiaries: 13
12-month incidents
0
Known data breaches
0
Attack type number
1

DKSH

Wiesenstrasse 8,, P.O. Box 888, Zurich, Zurich, CH, 8034
Last Update: 2026-03-30
Between 750 and 799

About DKSH DKSH’s purpose is to enrich people’s lives. For 160 years, we have been marketing, selling, and distributing high-quality products and brands for multinational and Fortune 500 companies. Through our Business Units Consumer Goods, Healthcare, Performance Materials, and Technology, we deliver sustainable growth for our partners. We contribute to improving the quality of life for our employees and people in the local communities in which we operate. Headquartered in Switzerland, DKSH is publicly listed and operates in 36 markets across Asia Pacific, Europe, and North America. We employ over 28,000 specialists and produced net sales of CHF 11.1 billion in 2024. Why it's great to work with us At DKSH, we are driven by a purpose that goes beyond the ordinary: enriching people's lives. Through the products and services we provide, DKSH positively impacts millions of lives everyday. Join our team where entrepreneurship meets flexible work arrangements. Take the leap and start a journey where you can grow and make a difference! Learn more about working at DKSH: https://bit.ly/dksh-careers View jobs now: https://bit.ly/dksh-jobs *We do not send job offers from free email services (Gmail, Yahoo mail, Hotmail, etc.), request money from candidates, or require personal documents like bank account details, tax forms, or credit card information from candidates before they are hired: https://bit.ly/dksh-recruitment-disclaimer.

NAICS: 5416
NAICS Definition: Management, Scientific, and Technical Consulting Services
Employees: 12,373
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/devoteam.jpeg
Devoteam
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/dksh.jpeg
DKSH
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Devoteam
100%
Compliance Rate
0/4 Standards Verified
DKSH
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Business Consulting and Services Industry Average (This Year)

No incidents recorded for Devoteam in 2026.

Incidents vs Business Consulting and Services Industry Average (This Year)

No incidents recorded for DKSH in 2026.

Incident History — Devoteam (X = Date, Y = Severity)

Devoteam cyber incidents detection timeline including parent company and subsidiaries

Incident History — DKSH (X = Date, Y = Severity)

DKSH cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/devoteam.jpeg
Devoteam
Incidents

Date Detected: 11/2025
Type:Vulnerability
Attack Vector: Local (for CVE-2025-62215), Remote (for CVE-2025-60724, CVE-2025-62222), User Interaction Required (for CVE-2025-62199, CVE-2025-62222), Malicious Document (Metafile, Office File, GitHub Issue), Preview Pane (for CVE-2025-62199), Network-Based (for CVE-2025-62222)
Blog: Blog
https://images.rankiteo.com/companyimages/dksh.jpeg
DKSH
Incidents

No Incident

FAQ

Devoteam company demonstrates a stronger AI Cybersecurity Score compared to DKSH company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Devoteam company has historically faced a number of disclosed cyber incidents, whereas DKSH company has not reported any.

In the current year, DKSH company and Devoteam company have not reported any cyber incidents.

Neither DKSH company nor Devoteam company has reported experiencing a ransomware attack publicly.

Neither DKSH company nor Devoteam company has reported experiencing a data breach publicly.

Neither DKSH company nor Devoteam company has reported experiencing targeted cyberattacks publicly.

Devoteam company has disclosed at least one vulnerability, while DKSH company has not reported such incidents publicly.

Neither Devoteam nor DKSH holds any compliance certifications.

Neither company holds any compliance certifications.

Devoteam company has more subsidiaries worldwide compared to DKSH company.

DKSH company employs more people globally than Devoteam company, reflecting its scale as a Business Consulting and Services.

Neither Devoteam nor DKSH holds SOC 2 Type 1 certification.

Neither Devoteam nor DKSH holds SOC 2 Type 2 certification.

Neither Devoteam nor DKSH holds ISO 27001 certification.

Neither Devoteam nor DKSH holds PCI DSS certification.

Neither Devoteam nor DKSH holds HIPAA certification.

Neither Devoteam nor DKSH holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X