Comparison Overview

Q-Free

VS

Wipro

Q-Free

Strindfjordveien 1, Trondheim, 7053, NO
Last Update: 2026-03-25
Between 750 and 799

THE PRIME MOVER IN INTELLIGENT TRAFFIC SOLUTIONS Q-Free is a global innovator in intelligent transportation systems that improve traffic flow, road safety, and air quality. With an open, collaborative approach to tolling, traffic, and active transportation management, Q-Free works with customers and partners on every continent to digitize infrastructure and overcome modern mobility challenges for the greater good of society. Q-Free has annual revenues of approximately 1 billion NOK (100 million USD) and employs 400 transportation innovators, experts, and enthusiasts. To learn more about how Q-Free is changing the movements of life, visit www.q-free.com. #liveqfree

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 541
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Wipro

Doddakannelli, Sarjapur Road, Bangalore, Karnataka, IN, 560035
Last Update: 2026-03-26
Between 750 and 799

Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a leading AI-powered technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our consulting-led approach and the Wipro Intelligence™ unified suite of AI-powered platforms, solutions, and transformative offerings, we help clients realize their boldest ambitions and build intelligent, sustainable businesses. The Wipro Innovation Network—part of the Wipro Intelligence™ suite—underpins our commitment to client-centric co-innovation and co-creation by bringing together capabilities from the innovation labs and partner ecosystems, academia, and global tech communities. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world.

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 261,249
Subsidiaries: 6
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/q-free.jpeg
Q-Free
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/wipro.jpeg
Wipro
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Q-Free
100%
Compliance Rate
0/4 Standards Verified
Wipro
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Q-Free in 2026.

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Wipro in 2026.

Incident History — Q-Free (X = Date, Y = Severity)

Q-Free cyber incidents detection timeline including parent company and subsidiaries

Incident History — Wipro (X = Date, Y = Severity)

Wipro cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/q-free.jpeg
Q-Free
Incidents

No Incident

https://images.rankiteo.com/companyimages/wipro.jpeg
Wipro
Incidents

No Incident

FAQ

Wipro company demonstrates a stronger AI Cybersecurity Score compared to Q-Free company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Wipro company has disclosed a higher number of cyber incidents compared to Q-Free company.

In the current year, Wipro company and Q-Free company have not reported any cyber incidents.

Neither Wipro company nor Q-Free company has reported experiencing a ransomware attack publicly.

Neither Wipro company nor Q-Free company has reported experiencing a data breach publicly.

Neither Wipro company nor Q-Free company has reported experiencing targeted cyberattacks publicly.

Neither Q-Free company nor Wipro company has reported experiencing or disclosing vulnerabilities publicly.

Neither Q-Free nor Wipro holds any compliance certifications.

Neither company holds any compliance certifications.

Wipro company has more subsidiaries worldwide compared to Q-Free company.

Wipro company employs more people globally than Q-Free company, reflecting its scale as a IT Services and IT Consulting.

Neither Q-Free nor Wipro holds SOC 2 Type 1 certification.

Neither Q-Free nor Wipro holds SOC 2 Type 2 certification.

Neither Q-Free nor Wipro holds ISO 27001 certification.

Neither Q-Free nor Wipro holds PCI DSS certification.

Neither Q-Free nor Wipro holds HIPAA certification.

Neither Q-Free nor Wipro holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A flaw has been found in Tenda AC5 15.03.06.47. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex of the component POST Request Handler. This manipulation of the argument PPPOEPassword causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function fromAddressNat of the file /goform/addressNat of the component POST Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observe or manipulate the screen contents, or cause an application crash, because of incorrect permissions.

Risk Information
cvss3
Base: 8.5
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
Description

Incus is a system container and virtual machine manager. Prior to version 6.23.0, instance template files can be used to cause arbitrary read or writes as root on the host server. Incus allows for pongo2 templates within instances which can be used at various times in the instance lifecycle to template files inside of the instance. This particular implementation of pongo2 within Incus allowed for file read/write but with the expectation that the pongo2 chroot feature would isolate all such access to the instance's filesystem. This was allowed such that a template could theoretically read a file and then generate a new version of said file. Unfortunately the chroot isolation mechanism is entirely skipped by pongo2 leading to easy access to the entire system's filesystem with root privileges. Version 6.23.0 patches the issue.

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Incus is a system container and virtual machine manager. Prior to version 6.23.0, a specially crafted storage bucket backup can be used by an user with access to Incus' storage bucket feature to crash the Incus daemon. Repeated use of this attack can be used to keep the server offline causing a denial of service of the control plane API. This does not impact any running workload, existing containers and virtual machines will keep operating. Version 6.23.0 fixes the issue.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H