Comparison Overview

Stefanini Group

VS

Xerox

Stefanini Group

Avenida Eusébio Matoso 1375, São Paulo, 05423-905, BR
Last Update: 2026-04-02
Between 750 and 799

Global Tech Consulting Company All in One. Stefanini is a Brazilian multinational company with 37 years of experience and presence in 41 countries. With more than 35,000 employees, we co-create solutions for a better future, driving digital transformation with a focus on real results. We operate in an integrated way through 7 specialized business units: Consulting (Technology and Business Agility), Analytics & AI, Banking & Payments, Cybersecurity, Manufacturing 4.0, and Digital Marketing. Recognized as the most internationalized technology company in Brazil, according to the Fundação Dom Cabral (FDC) ranking, Stefanini is global by essence, collaborative by nature, and strategic by vocation. It is also a pioneer in applying Artificial Intelligence to transform businesses through an end-to-end AI-First approach.

NAICS: 5416
NAICS Definition: Management, Scientific, and Technical Consulting Services
Employees: 22,655
Subsidiaries: 3
12-month incidents
0
Known data breaches
0
Attack type number
0

Xerox

201 Merritt 7, Norwalk, Connecticut, US
Last Update: 2026-04-01
Between 600 and 649

Xerox has been redefining the workplace experience for over a century. As a services-led, software-enabled company, we power today’s hybrid workplace through advanced print, digital, and AI-driven technologies. In 2025, Xerox acquired Lexmark—expanding our global footprint, strengthening service capabilities, and equipping us to deliver an even broader portfolio of workplace technologies to our clients. Today, we continue our legacy of innovation to deliver client-centric, digitally driven solutions that meet the needs of a global, distributed workforce. Whether in offices, classrooms, or hospitals, we help our clients thrive in a constantly evolving business landscape.

NAICS: 5416
NAICS Definition: Management, Scientific, and Technical Consulting Services
Employees: 54,786
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
2

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/stefanini.jpeg
Stefanini Group
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/xerox.jpeg
Xerox
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Stefanini Group
100%
Compliance Rate
0/4 Standards Verified
Xerox
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Business Consulting and Services Industry Average (This Year)

No incidents recorded for Stefanini Group in 2026.

Incidents vs Business Consulting and Services Industry Average (This Year)

No incidents recorded for Xerox in 2026.

Incident History — Stefanini Group (X = Date, Y = Severity)

Stefanini Group cyber incidents detection timeline including parent company and subsidiaries

Incident History — Xerox (X = Date, Y = Severity)

Xerox cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/stefanini.jpeg
Stefanini Group
Incidents

No Incident

https://images.rankiteo.com/companyimages/xerox.jpeg
Xerox
Incidents

Date Detected: 12/2023
Type:Breach
Attack Vector: Hacking
Blog: Blog

Date Detected: 11/2023
Type:Ransomware
Attack Vector: PerfLogs directory (Windows-created folder abused for staging)
Motivation: Financial gain (Ransomware-as-a-Service)
Blog: Blog

FAQ

Stefanini Group company demonstrates a stronger AI Cybersecurity Score compared to Xerox company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Xerox company has historically faced a number of disclosed cyber incidents, whereas Stefanini Group company has not reported any.

In the current year, Xerox company and Stefanini Group company have not reported any cyber incidents.

Xerox company has confirmed experiencing a ransomware attack, while Stefanini Group company has not reported such incidents publicly.

Xerox company has disclosed at least one data breach, while Stefanini Group company has not reported such incidents publicly.

Neither Xerox company nor Stefanini Group company has reported experiencing targeted cyberattacks publicly.

Neither Stefanini Group company nor Xerox company has reported experiencing or disclosing vulnerabilities publicly.

Neither Stefanini Group nor Xerox holds any compliance certifications.

Neither company holds any compliance certifications.

Stefanini Group company has more subsidiaries worldwide compared to Xerox company.

Xerox company employs more people globally than Stefanini Group company, reflecting its scale as a Business Consulting and Services.

Neither Stefanini Group nor Xerox holds SOC 2 Type 1 certification.

Neither Stefanini Group nor Xerox holds SOC 2 Type 2 certification.

Neither Stefanini Group nor Xerox holds ISO 27001 certification.

Neither Stefanini Group nor Xerox holds PCI DSS certification.

Neither Stefanini Group nor Xerox holds HIPAA certification.

Neither Stefanini Group nor Xerox holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X