Comparison Overview

Q-Free

VS

FPT Software

Q-Free

Strindfjordveien 1, Trondheim, 7053, NO
Last Update: 2026-03-25
Between 750 and 799

THE PRIME MOVER IN INTELLIGENT TRAFFIC SOLUTIONS Q-Free is a global innovator in intelligent transportation systems that improve traffic flow, road safety, and air quality. With an open, collaborative approach to tolling, traffic, and active transportation management, Q-Free works with customers and partners on every continent to digitize infrastructure and overcome modern mobility challenges for the greater good of society. Q-Free has annual revenues of approximately 1 billion NOK (100 million USD) and employs 400 transportation innovators, experts, and enthusiasts. To learn more about how Q-Free is changing the movements of life, visit www.q-free.com. #liveqfree

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 541
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

FPT Software

FPT Bld., Duy Tan Str., Hanoi, 10xxx15xx, VN
Last Update: 2026-03-21
Between 750 and 799

FPT Software, a subsidiary of FPT Corporation, is a global technology and IT services provider headquartered in Vietnam, with USD 1.22 billion in revenue (2024) and over 33,000 employees in 30 countries. Embracing an AI-first approach, FPT Software enables breakthrough speed, scalability and quality through AI-powered services and solutions and an AI-augmented workforce. It has partnered with over 1,100 clients worldwide, more than 130 of which are Fortune Global 500 companies in Aviation, Automotive, Banking, Financial Services and Insurance, Healthcare, Logistics, Manufacturing, Utilities, and more. For more information, please visit https://fptsoftware.com/.

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 31,054
Subsidiaries: 12
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/q-free.jpeg
Q-Free
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/fpt-software.jpeg
FPT Software
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Q-Free
100%
Compliance Rate
0/4 Standards Verified
FPT Software
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Q-Free in 2026.

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for FPT Software in 2026.

Incident History — Q-Free (X = Date, Y = Severity)

Q-Free cyber incidents detection timeline including parent company and subsidiaries

Incident History — FPT Software (X = Date, Y = Severity)

FPT Software cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/q-free.jpeg
Q-Free
Incidents

No Incident

https://images.rankiteo.com/companyimages/fpt-software.jpeg
FPT Software
Incidents

No Incident

FAQ

FPT Software company demonstrates a stronger AI Cybersecurity Score compared to Q-Free company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, FPT Software company has disclosed a higher number of cyber incidents compared to Q-Free company.

In the current year, FPT Software company and Q-Free company have not reported any cyber incidents.

Neither FPT Software company nor Q-Free company has reported experiencing a ransomware attack publicly.

Neither FPT Software company nor Q-Free company has reported experiencing a data breach publicly.

Neither FPT Software company nor Q-Free company has reported experiencing targeted cyberattacks publicly.

Neither Q-Free company nor FPT Software company has reported experiencing or disclosing vulnerabilities publicly.

Neither Q-Free nor FPT Software holds any compliance certifications.

Neither company holds any compliance certifications.

FPT Software company has more subsidiaries worldwide compared to Q-Free company.

FPT Software company employs more people globally than Q-Free company, reflecting its scale as a IT Services and IT Consulting.

Neither Q-Free nor FPT Software holds SOC 2 Type 1 certification.

Neither Q-Free nor FPT Software holds SOC 2 Type 2 certification.

Neither Q-Free nor FPT Software holds ISO 27001 certification.

Neither Q-Free nor FPT Software holds PCI DSS certification.

Neither Q-Free nor FPT Software holds HIPAA certification.

Neither Q-Free nor FPT Software holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A flaw has been found in Tenda AC5 15.03.06.47. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex of the component POST Request Handler. This manipulation of the argument PPPOEPassword causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function fromAddressNat of the file /goform/addressNat of the component POST Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observe or manipulate the screen contents, or cause an application crash, because of incorrect permissions.

Risk Information
cvss3
Base: 8.5
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
Description

Incus is a system container and virtual machine manager. Prior to version 6.23.0, instance template files can be used to cause arbitrary read or writes as root on the host server. Incus allows for pongo2 templates within instances which can be used at various times in the instance lifecycle to template files inside of the instance. This particular implementation of pongo2 within Incus allowed for file read/write but with the expectation that the pongo2 chroot feature would isolate all such access to the instance's filesystem. This was allowed such that a template could theoretically read a file and then generate a new version of said file. Unfortunately the chroot isolation mechanism is entirely skipped by pongo2 leading to easy access to the entire system's filesystem with root privileges. Version 6.23.0 patches the issue.

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Incus is a system container and virtual machine manager. Prior to version 6.23.0, a specially crafted storage bucket backup can be used by an user with access to Incus' storage bucket feature to crash the Incus daemon. Repeated use of this attack can be used to keep the server offline causing a denial of service of the control plane API. This does not impact any running workload, existing containers and virtual machines will keep operating. Version 6.23.0 fixes the issue.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H