Company Cyber Security Posture
NANA
NA Company Details
NA
NA
NA
NA
NA
NA
Scan still pending
NA
NA

Between 200 and 800
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 200 and 800 |
Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|
Company Subsidiaries

NA
Access Data Using Our API

Get company history
.png)
NA Cyber Security News
Indra enters into an agreement with the Katim cybersecurity company from the UAE to market ultra-secure mobile communications solutions | indra
Indra and Katim have formed a strategic partnership to provide NATO countries with state-of-the-art solutions to handle confidentialย ...
Indra signs an agreement with the UAE cybersecurity company Katim to market ultra-secure mobile communications solutions
Indra and Katim form a strategic alliance to offer NATO countries the most cutting-edge solutions for handling confidential information.
Indra Group appoints new CTO
Manuel Escalante has been appointed chief technology officer of Indra Group (CTO), replacing Miguel รngel Morell.
European cybersecurity dealmaking to benefit from increased defence spending
European cybersecurity deals boomed in 2024, with 172 transactions worth a combined EUR 12.6bn, according to Mergermarket data. The aggregateย ...
Indra leads groundbreaking European avionics project to boost defence sovereignty
Spanish defence technology leader Indra is heading the NG MIMA (Next Generation Military Integrated Modular Avionics) project, one of Europe'sย ...
Manuel Escalante appointed Chief Technology Officer of Indra Group
Indra es una de las principales empresas globales de consultorรญa y tecnologรญa y el socio tecnolรณgico de los negocios clave de sus clientesย ...
Indra develops core capabilities to manage autonomous AI agents in support of military operations in European cyberspace
Indra develops core capabilities to manage autonomous AI agents in support of military operations in European cyberspace ... Dajla consolidatesย ...
EU Cybersecurity Center to Receive Communication System From Indra
Indra will integrate a secure communication system into the European Commission's virtual cyber risk management center.
Indra furthers its Asia-Pacific ATM business with the contract to renew Vietnam's Air Traffic Management systems with cutting-edge technology | indra
Indra's system will bring together all the air traffic management (ATM) processes occurring during a flight in a single centralised suite andย ...

NA Similar Companies

Akkodis
Akkodis is a global digital engineering company and Smart Industry leader. We enable clients to advance in their digital transformation with Talent, Academy, Consulting, and Solutions services. Our 50,000 experts combine best-in-class technologies, R&D, and deep sector know-how for purposeful innova

GLobal Logica Software Tecnologies
A global leader in consulting, technology services and digital transformation, Capgemini is at the forefront of innovation to address the entire breadth of clientsโ opportunities in the evolving world of cloud, digital and platforms. Show more

GFT Technologies
GFT Technologies is an AI-centric global digital transformation company. We design advanced data and AI transformation solutions, modernize technology architectures and develop next-generation core systems for industry leaders in Banking, Insurance, Manufacturing and Robotics. Partnering closely wit

FPT Software
FPT Software, a subsidiary of FPT Corporation, is a global technology and IT services provider headquartered in Vietnam, with USD 1.22 billion in revenue (2024) and over 33,000 employees in 30 countries. The company champions complex business opportunities and challenges with its world-class servic

Ingram Micro
Ingram Micro is a leading technology company for the global information technology ecosystem. With the ability to reach nearly 90% of the global population, we play a vital role in the worldwide IT sales channel, bringing products and services from technology manufacturers and cloud providers to a h

Iron Mountain
For over 70 years, Iron Mountain Incorporated (NYSE: IRM) has been your strategic partner to care for your information and assets. A global leader in storage and information management services and trusted by more than 225,000 organizations around the world, including 95% of the Fortune 1000, we pro

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
NA CyberSecurity History Information
How many cyber incidents has NA faced?
Total Incidents: According to Rankiteo, NA has faced 0 incidents in the past.
What types of cybersecurity incidents have occurred at NA?
Incident Types: The types of cybersecurity incidents that have occurred include .
Additional Questions
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
