Company Details
iron-mountain
23,332
769,055
5415
ironmountain.com
0
IRO_3283853
In-progress


Iron Mountain Vendor Cyber Rating & Cyber Score
ironmountain.comIn the era of AI, your data is your advantage. Yet too often it remains untapped: disconnected from systems, underutilized, untrained, and exposed to risk. Iron Mountain is the trusted partner for organizations of all sizes to unlock what’s possible, transforming information into intelligence and assets into advantage. How? By seamlessly managing digital and physical assets of all kinds across their lifecycle—making them visible, secure, accessible, and AI-ready. From payments to pathology, mortgages to media, fine art to IT, we’ve helped more than 240,000 customers around the world, including 95% of the Fortune 1000, unlock more value from what’s already within reach. All with unparalleled security, governance, and sustainability at every step. What can we unlock together?
Company Details
iron-mountain
23,332
769,055
5415
ironmountain.com
0
IRO_3283853
In-progress
Between 800 and 849

Iron Mountain Global Score (TPRM)XXXX



No incidents recorded for Iron Mountain in 2026.
No incidents recorded for Iron Mountain in 2026.
No incidents recorded for Iron Mountain in 2026.
Iron Mountain cyber incidents detection timeline including parent company and subsidiaries

In the era of AI, your data is your advantage. Yet too often it remains untapped: disconnected from systems, underutilized, untrained, and exposed to risk. Iron Mountain is the trusted partner for organizations of all sizes to unlock what’s possible, transforming information into intelligence and assets into advantage. How? By seamlessly managing digital and physical assets of all kinds across their lifecycle—making them visible, secure, accessible, and AI-ready. From payments to pathology, mortgages to media, fine art to IT, we’ve helped more than 240,000 customers around the world, including 95% of the Fortune 1000, unlock more value from what’s already within reach. All with unparalleled security, governance, and sustainability at every step. What can we unlock together?

FPT Software, a subsidiary of FPT Corporation, is a global technology and IT services provider headquartered in Vietnam, with USD 1.22 billion in revenue (2024) and over 33,000 employees in 30 countries. Embracing an AI-first approach, FPT Software enables breakthrough speed, scalability and quali

Your digitalization partner with industry expertise With locations in more than 26 countries and over 26,000 employees (2024), T-Systems is one of the leading providers of digital services in Europe. The Deutsche Telekom subsidiary is headquartered in Germany and has a presence in Europe as well as

Accenture is a global professional services company with leading capabilities in digital, cloud and security. Combining unmatched experience and specialized skills across more than 40 industries, we offer Strategy and Consulting, Interactive, Technology and Operations services — all powered by the w

Part of the Capgemini Group, Sogeti makes business value through technology for organizations that need to implement innovation at speed and want a local partner with global scale. With a hands-on culture and close proximity to its clients, Sogeti implements solutions that will help organizations wo

NTT DATA, Inc. is a trusted global innovator of business and technology services. We're committed to helping clients innovate, optimize and transform for long-term success. Our R&D investments help organizations and society move confidently and sustainably into the digital future. As a Global Top Em

Insights you can act on. Founded in 1976, CGI is among the largest IT and business consulting services firms in the world. We are insights-driven and outcomes-focused to help accelerate returns on your investments. Across hundreds of locations worldwide, we provide comprehensive, scalable and susta

TIVIT is a Brazil-based multinational company that offers enterprise-level digital solutions, and operates in ten countries in Latin America. We help our clients develop their businesses by offering industry-leading digital solutions divided into four main categories: Digital Business, Cloud Solutio

A leading applied technology services company, we innovate to deliver service excellence and successful outcomes across sales, delivery and development. With our strategy to be agile, nimble and customer-centric, we anticipate the future of applied technology and predict tomorrow’s trends to keep ou

Navigating Change. Powering Progress. | Reimagining the Future with Birlasoft Birlasoft, a powerhouse where domain expertise, enterprise solutions, and digital technologies converge to redefine business processes. We take pride in our consultative and design thinking approach, driving societal pro
.png)
The Iron Mountain stock (ISIN: US46284V1017) climbs on the NYSE, fueled by surging demand for data centers driven by AI applications.
Iron Mountain's 2026 proxy outlines a virtual May 7 meeting, director elections, say-on-pay, auditor ratification, and record 2025 results...
Iron Mountain Inc (ISIN: US46284V1017) shares dipped on the NYSE recently, yet analysts maintain a Moderate Buy consensus with targets above...
Review Iron Mountain (NYSE: IRM) SEC filings with AI summaries, covering 8-K events, debt offerings, credit amendments, earnings materials and key REIT...
RESTON, Va., March 06, 2026 (GLOBE NEWSWIRE) -- Carahsoft Technology Corp., The Trusted IT Solutions Provider for the Healthcare Industry™,...
Iron Mountain, a data storage and recovery company, confirmed a data security incident after the Everest ransomware group claimed it had...
The Everest ransomware group publicly claimed responsibility for the breach in the final week of January. The gang stated that it successfully...
Data storage and recovery services company Iron Mountain has stated that a recent data breach claimed by the Everest extortion gang was...
Metro bug, more social bans, leaky Moltbook, Iron Mountain downplays recent breach impact, CISA is silently updating vulnerability notices.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Iron Mountain is http://www.ironmountain.com.
According to Rankiteo, Iron Mountain’s AI-generated cybersecurity score is 801, reflecting their Good security posture.
According to Rankiteo, Iron Mountain currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Iron Mountain has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Iron Mountain is not certified under SOC 2 Type 1.
According to Rankiteo, Iron Mountain does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Iron Mountain is not listed as GDPR compliant.
According to Rankiteo, Iron Mountain does not currently maintain PCI DSS compliance.
According to Rankiteo, Iron Mountain is not compliant with HIPAA regulations.
According to Rankiteo,Iron Mountain is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Iron Mountain operates primarily in the IT Services and IT Consulting industry.
Iron Mountain employs approximately 23,332 people worldwide.
Iron Mountain presently has no subsidiaries across any sectors.
Iron Mountain’s official LinkedIn profile has approximately 769,055 followers.
Iron Mountain is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
Yes, Iron Mountain has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/iron-mountain.
Yes, Iron Mountain maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/iron-mountain.
As of March 28, 2026, Rankiteo reports that Iron Mountain has not experienced any cybersecurity incidents.
Iron Mountain has an estimated 39,816 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Iron Mountain has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A flaw has been found in wandb OpenUI up to 1.0. This affects the function create_share/get_share of the file backend/openui/server.py of the component HTMLAnnotator Component. Executing a manipulation of the argument ID can lead to HTML injection. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was detected in QDOCS Smart School Management System up to 7.2. The impacted element is an unknown function of the file /admin/enquiry of the component Admission Enquiry Module. Performing a manipulation of the argument Note results in cross site scripting. The attack is possible to be carried out remotely.
The Ultimate Member plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.2. This is due to the '{usermeta:password_reset_link}' template tag being processed within post content via the '[um_loggedin]' shortcode, which generates a valid password reset token for the currently logged-in user viewing the page. This makes it possible for authenticated attackers, with Contributor-level access and above, to craft a malicious pending post that, when previewed by an Administrator, generates a password reset token for the Administrator and exfiltrates it to an attacker-controlled server, leading to full account takeover.
LibJWT is a C JSON Web Token Library. Starting in version 3.0.0 and prior to version 3.3.0, the JWK parsing for RSA-PSS did not protect against a NULL value when expecting to parse JSON string values. A specially crafted JWK file could exploit this behavior by using integers in places where the code expected a string. This was fixed in v3.3.0. A workaround is available. Users importing keys through a JWK file should not do so from untrusted sources. Use the `jwk2key` tool to check for validity of a JWK file. Likewise, if possible, do not use JWK files with RSA-PSS keys.
Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Starting in version 2.0.39 and prior to version 3.0.25, a prototype pollution vulnerability exists in the `parse_str` function of the npm package locutus. An attacker can pollute `Object.prototype` by overriding `RegExp.prototype.test` and then passing a crafted query string to `parse_str`, bypassing the prototype pollution guard. This vulnerability stems from an incomplete fix for CVE-2026-25521. The CVE-2026-25521 patch replaced the `String.prototype.includes()`-based guard with a `RegExp.prototype.test()`-based guard. However, `RegExp.prototype.test` is itself a writable prototype method that can be overridden, making the new guard bypassable in the same way as the original — trading one hijackable built-in for another. Version 3.0.25 contains an updated fix.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.