Comparison Overview

Kimberly-Clark

VS

ITC Limited

Kimberly-Clark

351 Phelps Dr, Irving, TX, US, 75038
Last Update: 2026-04-03
Between 800 and 849

At Kimberly-Clark, everything we do begins with care — for people, for communities, and for the planet we share. For more than 150 years, our brands have created essentials that make life better for billions of people every day. Better Care for a Better World is more than our purpose; it’s how we lead. Through our trusted brands, including Huggies®. Kleenex®. Andrex®. Scott®. Kotex®. Poise®. Depend®, we’re building a future where innovation and sustainability work hand in hand. Our 38,000+ employees around the world share a spirit of invention and responsibility that continues to redefine what care means. We’re proud to be recognized among the world’s top employers and sustainability leaders year after year, but our greatest achievement is our people. Their care moves the world forward. Because when care leads, impact follows. Learn more at kimberly-clark.com. To make Kimberly-Clark's social media channels an engaging, respectful environment, here are our Community Guidelines: https://www.kimberly-clark.com/en-us/company/community-guidelines

NAICS: 30
NAICS Definition: Manufacturing
Employees: 34,955
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
1

ITC Limited

Virginia House, 37 J L Nehru Road, Kolkata, West Bengal, IN, 700071
Last Update: 2026-04-03
Between 800 and 849

ITC is one of India's foremost private sector companies with a Gross Revenue of ₹ 73,465 crores and EBITDA of ₹ 24,025 crores (as on 31.03.2025). ITC has a diversified presence in FMCG, Packaging, Paperboards & Specialty Papers and Agri-Business. ITC's aspiration to be an exemplar in sustainability practices is manifest in its status as the only company in the world, of its size and diversity, to be carbon, water and solid waste recycling positive. In addition, ITC's businesses and value chains create sustainable livelihoods for nearly 9 million people, a majority of whom represent the poorest in rural India.

NAICS: 30
NAICS Definition: Manufacturing
Employees: 59,071
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/kimberly-clark.jpeg
Kimberly-Clark
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/itc-limited.jpeg
ITC Limited
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Kimberly-Clark
100%
Compliance Rate
0/4 Standards Verified
ITC Limited
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Manufacturing Industry Average (This Year)

No incidents recorded for Kimberly-Clark in 2026.

Incidents vs Manufacturing Industry Average (This Year)

No incidents recorded for ITC Limited in 2026.

Incident History — Kimberly-Clark (X = Date, Y = Severity)

Kimberly-Clark cyber incidents detection timeline including parent company and subsidiaries

Incident History — ITC Limited (X = Date, Y = Severity)

ITC Limited cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/kimberly-clark.jpeg
Kimberly-Clark
Incidents

Date Detected: 10/2017
Type:Breach
Attack Vector: Compromised Credentials
Motivation: Unknown
Blog: Blog
https://images.rankiteo.com/companyimages/itc-limited.jpeg
ITC Limited
Incidents

No Incident

FAQ

ITC Limited company demonstrates a stronger AI Cybersecurity Score compared to Kimberly-Clark company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Kimberly-Clark company has historically faced a number of disclosed cyber incidents, whereas ITC Limited company has not reported any.

In the current year, ITC Limited company and Kimberly-Clark company have not reported any cyber incidents.

Neither ITC Limited company nor Kimberly-Clark company has reported experiencing a ransomware attack publicly.

Kimberly-Clark company has disclosed at least one data breach, while the other ITC Limited company has not reported such incidents publicly.

Neither ITC Limited company nor Kimberly-Clark company has reported experiencing targeted cyberattacks publicly.

Neither Kimberly-Clark company nor ITC Limited company has reported experiencing or disclosing vulnerabilities publicly.

Neither Kimberly-Clark nor ITC Limited holds any compliance certifications.

Neither company holds any compliance certifications.

ITC Limited company has more subsidiaries worldwide compared to Kimberly-Clark company.

ITC Limited company employs more people globally than Kimberly-Clark company, reflecting its scale as a Manufacturing.

Neither Kimberly-Clark nor ITC Limited holds SOC 2 Type 1 certification.

Neither Kimberly-Clark nor ITC Limited holds SOC 2 Type 2 certification.

Neither Kimberly-Clark nor ITC Limited holds ISO 27001 certification.

Neither Kimberly-Clark nor ITC Limited holds PCI DSS certification.

Neither Kimberly-Clark nor ITC Limited holds HIPAA certification.

Neither Kimberly-Clark nor ITC Limited holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X