Comparison Overview

Q-Free

VS

Diebold Nixdorf

Q-Free

Strindfjordveien 1, Trondheim, 7053, NO
Last Update: 2026-03-25
Between 750 and 799

THE PRIME MOVER IN INTELLIGENT TRAFFIC SOLUTIONS Q-Free is a global innovator in intelligent transportation systems that improve traffic flow, road safety, and air quality. With an open, collaborative approach to tolling, traffic, and active transportation management, Q-Free works with customers and partners on every continent to digitize infrastructure and overcome modern mobility challenges for the greater good of society. Q-Free has annual revenues of approximately 1 billion NOK (100 million USD) and employs 400 transportation innovators, experts, and enthusiasts. To learn more about how Q-Free is changing the movements of life, visit www.q-free.com. #liveqfree

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 541
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Diebold Nixdorf

350 Orchard Ave NE, North Canton, 44720, US
Last Update: 2026-03-21
Between 650 and 699

Diebold Nixdorf automates, digitizes and transforms the way people bank and shop. Its integrated solutions connect digital and physical channels conveniently, securely and efficiently for millions of consumers every day. As an innovation partner for nearly all of the world's top 100 financial institutions and a majority of the top 25 global retailers, Diebold Nixdorf delivers unparalleled services and technology that power the daily operations and consumer experience of financial institutions and retailers around the world.

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 20,251
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
3

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/q-free.jpeg
Q-Free
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/diebold.jpeg
Diebold Nixdorf
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Q-Free
100%
Compliance Rate
0/4 Standards Verified
Diebold Nixdorf
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Q-Free in 2026.

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Diebold Nixdorf in 2026.

Incident History — Q-Free (X = Date, Y = Severity)

Q-Free cyber incidents detection timeline including parent company and subsidiaries

Incident History — Diebold Nixdorf (X = Date, Y = Severity)

Diebold Nixdorf cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/q-free.jpeg
Q-Free
Incidents

No Incident

https://images.rankiteo.com/companyimages/diebold.jpeg
Diebold Nixdorf
Incidents

Date Detected: 4/2025
Type:Ransomware
Motivation: Financial gain
Blog: Blog

Date Detected: 8/2024
Type:Vulnerability
Attack Vector: Hard Drive Encryption Bypass
Motivation: Financial Data Breach, Unauthorized Cash Withdrawals
Blog: Blog

Date Detected: 05/2020
Type:Cyber Attack
Blog: Blog

FAQ

Q-Free company demonstrates a stronger AI Cybersecurity Score compared to Diebold Nixdorf company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Diebold Nixdorf company has historically faced a number of disclosed cyber incidents, whereas Q-Free company has not reported any.

In the current year, Diebold Nixdorf company and Q-Free company have not reported any cyber incidents.

Diebold Nixdorf company has confirmed experiencing a ransomware attack, while Q-Free company has not reported such incidents publicly.

Neither Diebold Nixdorf company nor Q-Free company has reported experiencing a data breach publicly.

Diebold Nixdorf company has reported targeted cyberattacks, while Q-Free company has not reported such incidents publicly.

Diebold Nixdorf company has disclosed at least one vulnerability, while Q-Free company has not reported such incidents publicly.

Neither Q-Free nor Diebold Nixdorf holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Q-Free company nor Diebold Nixdorf company has publicly disclosed detailed information about the number of their subsidiaries.

Diebold Nixdorf company employs more people globally than Q-Free company, reflecting its scale as a IT Services and IT Consulting.

Neither Q-Free nor Diebold Nixdorf holds SOC 2 Type 1 certification.

Neither Q-Free nor Diebold Nixdorf holds SOC 2 Type 2 certification.

Neither Q-Free nor Diebold Nixdorf holds ISO 27001 certification.

Neither Q-Free nor Diebold Nixdorf holds PCI DSS certification.

Neither Q-Free nor Diebold Nixdorf holds HIPAA certification.

Neither Q-Free nor Diebold Nixdorf holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A flaw has been found in Tenda AC5 15.03.06.47. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex of the component POST Request Handler. This manipulation of the argument PPPOEPassword causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function fromAddressNat of the file /goform/addressNat of the component POST Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observe or manipulate the screen contents, or cause an application crash, because of incorrect permissions.

Risk Information
cvss3
Base: 8.5
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
Description

Incus is a system container and virtual machine manager. Prior to version 6.23.0, instance template files can be used to cause arbitrary read or writes as root on the host server. Incus allows for pongo2 templates within instances which can be used at various times in the instance lifecycle to template files inside of the instance. This particular implementation of pongo2 within Incus allowed for file read/write but with the expectation that the pongo2 chroot feature would isolate all such access to the instance's filesystem. This was allowed such that a template could theoretically read a file and then generate a new version of said file. Unfortunately the chroot isolation mechanism is entirely skipped by pongo2 leading to easy access to the entire system's filesystem with root privileges. Version 6.23.0 patches the issue.

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Incus is a system container and virtual machine manager. Prior to version 6.23.0, a specially crafted storage bucket backup can be used by an user with access to Incus' storage bucket feature to crash the Incus daemon. Repeated use of this attack can be used to keep the server offline causing a denial of service of the control plane API. This does not impact any running workload, existing containers and virtual machines will keep operating. Version 6.23.0 fixes the issue.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H