Comparison Overview

GRUNDFOS

VS

Metso

GRUNDFOS

Poul Due Jensens Vej 7, Bjerringbro, Middle Jutland, DK, 8850
Last Update: 2026-04-01

We’re a global leader in water solutions. Every day, our intelligent, energy-saving pumps and water solutions help provide comfort, deliver drinking water, remove wastewater or sustain crops all over the world. We want to ensure water is accessible and reliable for all. Since 1945, we’ve proudly protected, respected and advanced the flow of water. Our global family of 20,000 innovators is driven by our purpose: to pioneer solutions to the world’s water and climate challenges and improve quality of life for people. Our pioneering drive has recently resulted in acquisitions which further strengthen our capabilities in Water Treatment. At Grundfos, we create possibilities together in a diverse, supportive environment where we succeed together by celebrating our differences. Join us as we take the lead in innovating newer, smarter methods to advance the flow of water and reduce the use of energy.

NAICS: 3332
NAICS Definition: Industrial Machinery Manufacturing
Employees: 13,941
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Metso

Rauhalanpuisto 9, P.O. Box 1000, Espoo, Uusimaa, FI, 02230
Last Update: 2026-03-29
Between 750 and 799

Metso is a frontrunner in sustainable technologies, end-to-end solutions and services for the aggregates, minerals processing and metals refining industries globally. By improving our customers’ energy and water efficiency, increasing their productivity, and reducing environmental risks with our product and process expertise, we are the partner for positive change. Metso is committed to limiting global warming to 1.5°C with Science Based Targets.

NAICS: 3332
NAICS Definition: Industrial Machinery Manufacturing
Employees: 20,240
Subsidiaries: 4
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/grundfos.jpeg
GRUNDFOS
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/metsoofficial.jpeg
Metso
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
GRUNDFOS
100%
Compliance Rate
0/4 Standards Verified
Metso
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Industrial Machinery Manufacturing Industry Average (This Year)

No incidents recorded for GRUNDFOS in 2026.

Incidents vs Industrial Machinery Manufacturing Industry Average (This Year)

No incidents recorded for Metso in 2026.

Incident History — GRUNDFOS (X = Date, Y = Severity)

GRUNDFOS cyber incidents detection timeline including parent company and subsidiaries

Incident History — Metso (X = Date, Y = Severity)

Metso cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/grundfos.jpeg
GRUNDFOS
Incidents

No Incident

https://images.rankiteo.com/companyimages/metsoofficial.jpeg
Metso
Incidents

No Incident

FAQ

Metso company demonstrates a stronger AI Cybersecurity Score compared to GRUNDFOS company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Metso company has disclosed a higher number of cyber incidents compared to GRUNDFOS company.

In the current year, Metso company and GRUNDFOS company have not reported any cyber incidents.

Neither Metso company nor GRUNDFOS company has reported experiencing a ransomware attack publicly.

Neither Metso company nor GRUNDFOS company has reported experiencing a data breach publicly.

Neither Metso company nor GRUNDFOS company has reported experiencing targeted cyberattacks publicly.

Neither GRUNDFOS company nor Metso company has reported experiencing or disclosing vulnerabilities publicly.

Neither GRUNDFOS nor Metso holds any compliance certifications.

Neither company holds any compliance certifications.

Metso company has more subsidiaries worldwide compared to GRUNDFOS company.

Metso company employs more people globally than GRUNDFOS company, reflecting its scale as a Industrial Machinery Manufacturing.

Neither GRUNDFOS nor Metso holds SOC 2 Type 1 certification.

Neither GRUNDFOS nor Metso holds SOC 2 Type 2 certification.

Neither GRUNDFOS nor Metso holds ISO 27001 certification.

Neither GRUNDFOS nor Metso holds PCI DSS certification.

Neither GRUNDFOS nor Metso holds HIPAA certification.

Neither GRUNDFOS nor Metso holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A security flaw has been discovered in itsourcecode Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /manage_user.php of the component Parameter Handler. Performing a manipulation of the argument ID results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in Axiomatic Bento4 up to 1.6.0-641. Affected is the function AP4_BitReader::SkipBits of the file Ap4Dac4Atom.cpp of the component DSI v1 Parser. Such manipulation of the argument n_presentations leads to heap-based buffer overflow. The attack needs to be performed locally. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in Axiomatic Bento4 up to 1.6.0-641. This impacts the function AP4_BitReader::ReadCache of the file Ap4Dac4Atom.cpp of the component MP4 File Parser. This manipulation causes heap-based buffer overflow. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a heap-buffer-overflow (HBO) in icAnsiToUtf8() in the XML conversion path. The issue is triggered by a crafted ICC profile which causes icAnsiToUtf8(std::string&, char const*) to treat an input buffer as a C-string and call operations that rely on strlen()/null-termination. AddressSanitizer reports an out-of-bounds READ of size 115 past a 114-byte heap allocation, with the failure observed while running the iccToXml tool. This issue has been patched in version 2.3.1.6.

Risk Information
cvss3
Base: 6.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a stack-buffer-overflow (SBO) in CIccTagFixedNum<>::GetValues() and a related bug chain. The primary crash is an AddressSanitizer-reported WRITE of size 4 that overflows a 4-byte stack variable (rv) via the call chain CIccTagFixedNum::GetValues() -> CIccTagStruct::GetElemNumberValue(). This issue has been patched in version 2.3.1.6.

Risk Information
cvss3
Base: 6.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H