Comparison Overview

VOIS

VS

Dimension Data

VOIS

London, GB
Last Update: 2026-03-22

VOIS (Vodafone Intelligent Solutions) is a strategic arm of Vodafone Group Plc, creating value for customers by delivering intelligent solutions through Talent, Technology & Transformation. As the largest shared services organisation in the global telco industry, our portfolio of next-generation solutions and services are designed in partnership with customers across Vodafone Group, local markets, and partner markets to simplify and drive growth. We are pioneering a new Partnership model for the Telco industry, where the sharing of ideas, innovation, platforms and services will unlock opportunities for our people and value for our customers. With our strategic partner Accenture, we work alongside our Vodafone customers, other Telco and tech companies to drive transformation, meet the challenges of our industry and ensure we stay relevant and resilient. This partnership is a unique, industry-first model which brings together the best of in-house and 3rd party capability. We deliver value and results at scale by leveraging technology, data and our talented international team of 30K professionals in the following services: Technology, Business, B2B, Corporate Services, Customer Care. Our commercial model creates clear, benchmarked and competitively-priced services so that we can offer guaranteed outcomes for customers with flexibility and optionality. Bringing together our combined strengths with our strategic partner Accenture our strategy is to: Commercialise: Create cost transparency and foster trust and growth for our customers Re-platform: To simplify, streamline and scale our business Extend beyond our borders: deepening our relationships, growing our services and expanding our customer base across new customers & new geographies We work with customers across 28 countries from 10 VOIS locations: Albania, Egypt, Hungary, India, Romania, Spain, Turkey, UK, Germany, Ireland, and with a network of teams in Czech Republic, Italy, Greece, and Portugal.

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 20,303
Subsidiaries: 20
12-month incidents
0
Known data breaches
4
Attack type number
4

Dimension Data

​The Campus, 57 Sloane Street Cnr Sloane Street and Main Road, Bryanston, 2021, ZA
Last Update: 2026-03-26

Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including systems integration, managed services infrastructure, cloud solutions, business applications, customer experience, and intelligent security solutions. We provide innovative solutions that optimise today’s evolving technology environments, enabling clients to leverage data in a digital age. Founded in 1983, and headquartered in Johannesburg, Dimension Data is a proud member of the NTT Group, one of the world’s leading information communication technology (ICT) companies, comprising a group of global technology companies. In 2020, Dimension Data completed its transition to operate as one entity consolidating all its subsidiaries under a single Dimension Data brand employing over 10 000 employees across 15 countries. We continue to invest heavily in innovation bringing together the world’s best technologies, from consulting, technical and support services to a fully managed service. Dimension Data is currently a level 2 BBBEE contributor after successfully concluding a significant BBBEE transaction in 2019. Dimension Data will continue to implement strategies to ensure it contributes meaningfully to transformation towards an inclusive society.

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 12,291
Subsidiaries: 35
12-month incidents
0
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/vois.jpeg
VOIS
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/dimension-data.jpeg
Dimension Data
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
VOIS
100%
Compliance Rate
0/4 Standards Verified
Dimension Data
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for VOIS in 2026.

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Dimension Data in 2026.

Incident History — VOIS (X = Date, Y = Severity)

VOIS cyber incidents detection timeline including parent company and subsidiaries

Incident History — Dimension Data (X = Date, Y = Severity)

Dimension Data cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/vois.jpeg
VOIS
Incidents

Date Detected: 06/2023
Type:Breach
Attack Vector: Data Breach
Motivation: Unauthorized Access to Sensitive Data
Blog: Blog

Date Detected: 04/2023
Type:Ransomware
Blog: Blog

Date Detected: 09/2022
Type:Breach
Blog: Blog
https://images.rankiteo.com/companyimages/dimension-data.jpeg
Dimension Data
Incidents

Date Detected: 6/2022
Type:Cyber Attack
Attack Vector: Exploiting exposed/hard-coded credentials in cloud/source code repositories (AWS, Bitbucket, GitHub), Insider-assisted access, Weak network segmentation, Third-party vendor compromises (e.g., TMS, WMS, EDI systems), Staged data leaks for extortion pressure
Motivation: Financial Gain (Extortion), Reputational Damage, Operational Disruption (via data leaks)
Blog: Blog

FAQ

VOIS company demonstrates a stronger AI Cybersecurity Score compared to Dimension Data company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

VOIS company has faced a higher number of disclosed cyber incidents historically compared to Dimension Data company.

In the current year, Dimension Data company and VOIS company have not reported any cyber incidents.

VOIS company has confirmed experiencing a ransomware attack, while Dimension Data company has not reported such incidents publicly.

VOIS company has disclosed at least one data breach, while the other Dimension Data company has not reported such incidents publicly.

Both Dimension Data company and VOIS company have reported experiencing targeted cyberattacks.

Neither VOIS company nor Dimension Data company has reported experiencing or disclosing vulnerabilities publicly.

Neither VOIS nor Dimension Data holds any compliance certifications.

Neither company holds any compliance certifications.

Dimension Data company has more subsidiaries worldwide compared to VOIS company.

VOIS company employs more people globally than Dimension Data company, reflecting its scale as a IT Services and IT Consulting.

Neither VOIS nor Dimension Data holds SOC 2 Type 1 certification.

Neither VOIS nor Dimension Data holds SOC 2 Type 2 certification.

Neither VOIS nor Dimension Data holds ISO 27001 certification.

Neither VOIS nor Dimension Data holds PCI DSS certification.

Neither VOIS nor Dimension Data holds HIPAA certification.

Neither VOIS nor Dimension Data holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A flaw has been found in wandb OpenUI up to 1.0. This affects the function create_share/get_share of the file backend/openui/server.py of the component HTMLAnnotator Component. Executing a manipulation of the argument ID can lead to HTML injection. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in QDOCS Smart School Management System up to 7.2. The impacted element is an unknown function of the file /admin/enquiry of the component Admission Enquiry Module. Performing a manipulation of the argument Note results in cross site scripting. The attack is possible to be carried out remotely.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

The Ultimate Member plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.2. This is due to the '{usermeta:password_reset_link}' template tag being processed within post content via the '[um_loggedin]' shortcode, which generates a valid password reset token for the currently logged-in user viewing the page. This makes it possible for authenticated attackers, with Contributor-level access and above, to craft a malicious pending post that, when previewed by an Administrator, generates a password reset token for the Administrator and exfiltrates it to an attacker-controlled server, leading to full account takeover.

Risk Information
cvss3
Base: 8.0
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Description

LibJWT is a C JSON Web Token Library. Starting in version 3.0.0 and prior to version 3.3.0, the JWK parsing for RSA-PSS did not protect against a NULL value when expecting to parse JSON string values. A specially crafted JWK file could exploit this behavior by using integers in places where the code expected a string. This was fixed in v3.3.0. A workaround is available. Users importing keys through a JWK file should not do so from untrusted sources. Use the `jwk2key` tool to check for validity of a JWK file. Likewise, if possible, do not use JWK files with RSA-PSS keys.

Risk Information
cvss4
Base: 5.8
Severity: HIGH
CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:A/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Starting in version 2.0.39 and prior to version 3.0.25, a prototype pollution vulnerability exists in the `parse_str` function of the npm package locutus. An attacker can pollute `Object.prototype` by overriding `RegExp.prototype.test` and then passing a crafted query string to `parse_str`, bypassing the prototype pollution guard. This vulnerability stems from an incomplete fix for CVE-2026-25521. The CVE-2026-25521 patch replaced the `String.prototype.includes()`-based guard with a `RegExp.prototype.test()`-based guard. However, `RegExp.prototype.test` is itself a writable prototype method that can be overridden, making the new guard bypassable in the same way as the original — trading one hijackable built-in for another. Version 3.0.25 contains an updated fix.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X