Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

In the era of AI, your data is your advantage. Yet too often it remains untapped: disconnected from systems, underutilized, untrained, and exposed to risk. Iron Mountain is the trusted partner for organizations of all sizes to unlock what’s possible, transforming information into intelligence and assets into advantage. How? By seamlessly managing digital and physical assets of all kinds across their lifecycle—making them visible, secure, accessible, and AI-ready. From payments to pathology, mortgages to media, fine art to IT, we’ve helped more than 240,000 customers around the world, including 95% of the Fortune 1000, unlock more value from what’s already within reach. All with unparalleled security, governance, and sustainability at every step. What can we unlock together?

Iron Mountain A.I CyberSecurity Scoring

Iron Mountain

Company Details

Linkedin ID:

iron-mountain

Employees number:

23,332

Number of followers:

769,055

NAICS:

5415

Industry Type:

IT Services and IT Consulting

Homepage:

ironmountain.com

IP Addresses:

0

Company ID:

IRO_3283853

Scan Status:

In-progress

AI scoreIron Mountain Risk Score (AI oriented)

Between 800 and 849

https://images.rankiteo.com/companyimages/iron-mountain.jpeg
Iron Mountain IT Services and IT Consulting
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreIron Mountain Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/iron-mountain.jpeg
Iron Mountain IT Services and IT Consulting
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Iron Mountain Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

Iron Mountain Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Iron Mountain

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Iron Mountain in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Iron Mountain in 2026.

Incident Types Iron Mountain vs IT Services and IT Consulting Industry Avg (This Year)

No incidents recorded for Iron Mountain in 2026.

Incident History — Iron Mountain (X = Date, Y = Severity)

Iron Mountain cyber incidents detection timeline including parent company and subsidiaries

Iron Mountain Company Subsidiaries

SubsidiaryImage

In the era of AI, your data is your advantage. Yet too often it remains untapped: disconnected from systems, underutilized, untrained, and exposed to risk. Iron Mountain is the trusted partner for organizations of all sizes to unlock what’s possible, transforming information into intelligence and assets into advantage. How? By seamlessly managing digital and physical assets of all kinds across their lifecycle—making them visible, secure, accessible, and AI-ready. From payments to pathology, mortgages to media, fine art to IT, we’ve helped more than 240,000 customers around the world, including 95% of the Fortune 1000, unlock more value from what’s already within reach. All with unparalleled security, governance, and sustainability at every step. What can we unlock together?

Loading...
similarCompanies

Iron Mountain Similar Companies

FPT Software

FPT Software, a subsidiary of FPT Corporation, is a global technology and IT services provider headquartered in Vietnam, with USD 1.22 billion in revenue (2024) and over 33,000 employees in 30 countries. Embracing an AI-first approach, FPT Software enables breakthrough speed, scalability and quali

T-Systems International

Your digitalization partner with industry expertise With locations in more than 26 countries and over 26,000 employees (2024), T-Systems is one of the leading providers of digital services in Europe. The Deutsche Telekom subsidiary is headquartered in Germany and has a presence in Europe as well as

Accenture in India

Accenture is a global professional services company with leading capabilities in digital, cloud and security. Combining unmatched experience and specialized skills across more than 40 industries, we offer Strategy and Consulting, Interactive, Technology and Operations services — all powered by the w

Sogeti

Part of the Capgemini Group, Sogeti makes business value through technology for organizations that need to implement innovation at speed and want a local partner with global scale. With a hands-on culture and close proximity to its clients, Sogeti implements solutions that will help organizations wo

NTT DATA North America

NTT DATA, Inc. is a trusted global innovator of business and technology services. We're committed to helping clients innovate, optimize and transform for long-term success. Our R&D investments help organizations and society move confidently and sustainably into the digital future. As a Global Top Em

Insights you can act on. Founded in 1976, CGI is among the largest IT and business consulting services firms in the world. We are insights-driven and outcomes-focused to help accelerate returns on your investments. Across hundreds of locations worldwide, we provide comprehensive, scalable and susta

TIVIT

TIVIT is a Brazil-based multinational company that offers enterprise-level digital solutions, and operates in ten countries in Latin America. We help our clients develop their businesses by offering industry-leading digital solutions divided into four main categories: Digital Business, Cloud Solutio

Mphasis

A leading applied technology services company, we innovate to deliver service excellence and successful outcomes across sales, delivery and development. With our strategy to be agile, nimble and customer-centric, we anticipate the future of applied technology and predict tomorrow’s trends to keep ou

Birlasoft

Navigating Change. Powering Progress. | Reimagining the Future with Birlasoft Birlasoft, a powerhouse where domain expertise, enterprise solutions, and digital technologies converge to redefine business processes. We take pride in our consultative and design thinking approach, driving societal pro

newsone

Iron Mountain CyberSecurity News

March 25, 2026 11:08 PM
Iron Mountain stock surges on AI data storage boom at NYSE amid explosive demand

The Iron Mountain stock (ISIN: US46284V1017) climbs on the NYSE, fueled by surging demand for data centers driven by AI applications.

March 24, 2026 08:34 PM
TSR, pay and governance on ballot at Iron Mountain (NYSE: IRM)

Iron Mountain's 2026 proxy outlines a virtual May 7 meeting, director elections, say-on-pay, auditor ratification, and record 2025 results...

March 21, 2026 06:03 PM
Iron Mountain Inc stock faces pressure on NYSE amid analyst upgrades and dividend appeal

Iron Mountain Inc (ISIN: US46284V1017) shares dipped on the NYSE recently, yet analysts maintain a Moderate Buy consensus with targets above...

March 17, 2026 10:45 AM
IRM SEC Filings - Iron Mountain 10-K, 10-Q, 8-K Forms

Review Iron Mountain (NYSE: IRM) SEC filings with AI summaries, covering 8-K events, debt offerings, credit amendments, earnings materials and key REIT...

March 07, 2026 08:00 AM
Carahsoft’s Partner Pavilion Showcases Healthcare, AI and Cybersecurity Solutions at HIMSS26 in Las Vegas, NV on March 9-12, 2026

RESTON, Va., March 06, 2026 (GLOBE NEWSWIRE) -- Carahsoft Technology Corp., The Trusted IT Solutions Provider for the Healthcare Industry™,...

February 05, 2026 08:00 AM
News - Iron Mountain Confirms Data Security Incident Following Everest Ransomware Claims

Iron Mountain, a data storage and recovery company, confirmed a data security incident after the Everest ransomware group claimed it had...

February 04, 2026 08:00 AM
Everest Ransomware breaches Iron Mountain only to exfiltrate data

The Everest ransomware group publicly claimed responsibility for the breach in the final week of January. The gang stated that it successfully...

February 04, 2026 08:00 AM
Iron Mountain reports limited impact from Everest gang breach

Data storage and recovery services company Iron Mountain has stated that a recent data breach claimed by the Everest extortion gang was...

February 04, 2026 08:00 AM
Cybersecurity News: Metro bug, more social bans, leaky Moltbook

Metro bug, more social bans, leaky Moltbook, Iron Mountain downplays recent breach impact, CISA is silently updating vulnerability notices.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Iron Mountain CyberSecurity History Information

Official Website of Iron Mountain

The official website of Iron Mountain is http://www.ironmountain.com.

Iron Mountain’s AI-Generated Cybersecurity Score

According to Rankiteo, Iron Mountain’s AI-generated cybersecurity score is 801, reflecting their Good security posture.

How many security badges does Iron Mountain’ have ?

According to Rankiteo, Iron Mountain currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Iron Mountain been affected by any supply chain cyber incidents ?

According to Rankiteo, Iron Mountain has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Iron Mountain have SOC 2 Type 1 certification ?

According to Rankiteo, Iron Mountain is not certified under SOC 2 Type 1.

Does Iron Mountain have SOC 2 Type 2 certification ?

According to Rankiteo, Iron Mountain does not hold a SOC 2 Type 2 certification.

Does Iron Mountain comply with GDPR ?

According to Rankiteo, Iron Mountain is not listed as GDPR compliant.

Does Iron Mountain have PCI DSS certification ?

According to Rankiteo, Iron Mountain does not currently maintain PCI DSS compliance.

Does Iron Mountain comply with HIPAA ?

According to Rankiteo, Iron Mountain is not compliant with HIPAA regulations.

Does Iron Mountain have ISO 27001 certification ?

According to Rankiteo,Iron Mountain is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Iron Mountain

Iron Mountain operates primarily in the IT Services and IT Consulting industry.

Number of Employees at Iron Mountain

Iron Mountain employs approximately 23,332 people worldwide.

Subsidiaries Owned by Iron Mountain

Iron Mountain presently has no subsidiaries across any sectors.

Iron Mountain’s LinkedIn Followers

Iron Mountain’s official LinkedIn profile has approximately 769,055 followers.

NAICS Classification of Iron Mountain

Iron Mountain is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.

Iron Mountain’s Presence on Crunchbase

Yes, Iron Mountain has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/iron-mountain.

Iron Mountain’s Presence on LinkedIn

Yes, Iron Mountain maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/iron-mountain.

Cybersecurity Incidents Involving Iron Mountain

As of March 28, 2026, Rankiteo reports that Iron Mountain has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Iron Mountain has an estimated 39,816 peer or competitor companies worldwide.

Iron Mountain CyberSecurity History Information

How many cyber incidents has Iron Mountain faced ?

Total Incidents: According to Rankiteo, Iron Mountain has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Iron Mountain ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

A flaw has been found in wandb OpenUI up to 1.0. This affects the function create_share/get_share of the file backend/openui/server.py of the component HTMLAnnotator Component. Executing a manipulation of the argument ID can lead to HTML injection. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in QDOCS Smart School Management System up to 7.2. The impacted element is an unknown function of the file /admin/enquiry of the component Admission Enquiry Module. Performing a manipulation of the argument Note results in cross site scripting. The attack is possible to be carried out remotely.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

The Ultimate Member plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.2. This is due to the '{usermeta:password_reset_link}' template tag being processed within post content via the '[um_loggedin]' shortcode, which generates a valid password reset token for the currently logged-in user viewing the page. This makes it possible for authenticated attackers, with Contributor-level access and above, to craft a malicious pending post that, when previewed by an Administrator, generates a password reset token for the Administrator and exfiltrates it to an attacker-controlled server, leading to full account takeover.

Risk Information
cvss3
Base: 8.0
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Description

LibJWT is a C JSON Web Token Library. Starting in version 3.0.0 and prior to version 3.3.0, the JWK parsing for RSA-PSS did not protect against a NULL value when expecting to parse JSON string values. A specially crafted JWK file could exploit this behavior by using integers in places where the code expected a string. This was fixed in v3.3.0. A workaround is available. Users importing keys through a JWK file should not do so from untrusted sources. Use the `jwk2key` tool to check for validity of a JWK file. Likewise, if possible, do not use JWK files with RSA-PSS keys.

Risk Information
cvss4
Base: 5.8
Severity: HIGH
CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:A/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Starting in version 2.0.39 and prior to version 3.0.25, a prototype pollution vulnerability exists in the `parse_str` function of the npm package locutus. An attacker can pollute `Object.prototype` by overriding `RegExp.prototype.test` and then passing a crafted query string to `parse_str`, bypassing the prototype pollution guard. This vulnerability stems from an incomplete fix for CVE-2026-25521. The CVE-2026-25521 patch replaced the `String.prototype.includes()`-based guard with a `RegExp.prototype.test()`-based guard. However, `RegExp.prototype.test` is itself a writable prototype method that can be overridden, making the new guard bypassable in the same way as the original — trading one hijackable built-in for another. Version 3.0.25 contains an updated fix.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=iron-mountain' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge