Comparison Overview

Q-Free

VS

Inetum

Q-Free

Strindfjordveien 1, Trondheim, 7053, NO
Last Update: 2026-03-25
Between 750 and 799

THE PRIME MOVER IN INTELLIGENT TRAFFIC SOLUTIONS Q-Free is a global innovator in intelligent transportation systems that improve traffic flow, road safety, and air quality. With an open, collaborative approach to tolling, traffic, and active transportation management, Q-Free works with customers and partners on every continent to digitize infrastructure and overcome modern mobility challenges for the greater good of society. Q-Free has annual revenues of approximately 1 billion NOK (100 million USD) and employs 400 transportation innovators, experts, and enthusiasts. To learn more about how Q-Free is changing the movements of life, visit www.q-free.com. #liveqfree

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 541
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Inetum

5, Rue Touzet Gaillard, St.-Ouen, Île-de-France, FR, 93400
Last Update: 2026-03-20
Between 750 and 799

Inetum is a European leader in digital services. Inetum’s team of 27,000 consultants and specialists strive every day to make a digital impact for businesses, public sector entities and society. Inetum’s solutions aim at contributing to its clients’ performance and innovation as well as the common good. Present in 19 countries with a dense network of sites, Inetum partners with major software publishers to meet the challenges of digital transformation with proximity and flexibility. Driven by its ambition for growth and scale, Inetum generated sales of 2.4 billion euros in 2024. 🏅 Top Employer Europe 2025

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 20,907
Subsidiaries: 12
12-month incidents
0
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/q-free.jpeg
Q-Free
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/inetum.jpeg
Inetum
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Q-Free
100%
Compliance Rate
0/4 Standards Verified
Inetum
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Q-Free in 2026.

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Inetum in 2026.

Incident History — Q-Free (X = Date, Y = Severity)

Q-Free cyber incidents detection timeline including parent company and subsidiaries

Incident History — Inetum (X = Date, Y = Severity)

Inetum cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/q-free.jpeg
Q-Free
Incidents

No Incident

https://images.rankiteo.com/companyimages/inetum.jpeg
Inetum
Incidents

Date Detected: 12/2021
Type:Ransomware
Blog: Blog

FAQ

Inetum company demonstrates a stronger AI Cybersecurity Score compared to Q-Free company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Inetum company has historically faced a number of disclosed cyber incidents, whereas Q-Free company has not reported any.

In the current year, Inetum company and Q-Free company have not reported any cyber incidents.

Inetum company has confirmed experiencing a ransomware attack, while Q-Free company has not reported such incidents publicly.

Neither Inetum company nor Q-Free company has reported experiencing a data breach publicly.

Neither Inetum company nor Q-Free company has reported experiencing targeted cyberattacks publicly.

Neither Q-Free company nor Inetum company has reported experiencing or disclosing vulnerabilities publicly.

Neither Q-Free nor Inetum holds any compliance certifications.

Neither company holds any compliance certifications.

Inetum company has more subsidiaries worldwide compared to Q-Free company.

Inetum company employs more people globally than Q-Free company, reflecting its scale as a IT Services and IT Consulting.

Neither Q-Free nor Inetum holds SOC 2 Type 1 certification.

Neither Q-Free nor Inetum holds SOC 2 Type 2 certification.

Neither Q-Free nor Inetum holds ISO 27001 certification.

Neither Q-Free nor Inetum holds PCI DSS certification.

Neither Q-Free nor Inetum holds HIPAA certification.

Neither Q-Free nor Inetum holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A flaw has been found in Tenda AC5 15.03.06.47. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex of the component POST Request Handler. This manipulation of the argument PPPOEPassword causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function fromAddressNat of the file /goform/addressNat of the component POST Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observe or manipulate the screen contents, or cause an application crash, because of incorrect permissions.

Risk Information
cvss3
Base: 8.5
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
Description

Incus is a system container and virtual machine manager. Prior to version 6.23.0, instance template files can be used to cause arbitrary read or writes as root on the host server. Incus allows for pongo2 templates within instances which can be used at various times in the instance lifecycle to template files inside of the instance. This particular implementation of pongo2 within Incus allowed for file read/write but with the expectation that the pongo2 chroot feature would isolate all such access to the instance's filesystem. This was allowed such that a template could theoretically read a file and then generate a new version of said file. Unfortunately the chroot isolation mechanism is entirely skipped by pongo2 leading to easy access to the entire system's filesystem with root privileges. Version 6.23.0 patches the issue.

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Incus is a system container and virtual machine manager. Prior to version 6.23.0, a specially crafted storage bucket backup can be used by an user with access to Incus' storage bucket feature to crash the Incus daemon. Repeated use of this attack can be used to keep the server offline causing a denial of service of the control plane API. This does not impact any running workload, existing containers and virtual machines will keep operating. Version 6.23.0 fixes the issue.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H