Comparison Overview

WNS

VS

Devoteam

WNS

New York, US
Last Update: 2026-04-02
Between 800 and 849

WNS, part of Capgemini, is a global Agentic AI-powered intelligent operations and transformation company. WNS combines deep industry knowledge with technology, analytics, and process expertise to co-create innovative, digitally-led transformational solutions with over 700+ clients across various industries. WNS delivers an entire spectrum of transformative solutions that entail industry-specific offerings, customer experience services, finance and accounting, human resources, procurement, and data-led analytics solutions to solve operational challenges and drive strategic growth journeys for businesses. As of June 30, 2025, WNS has 66,000+ professionals across 64 delivery centers worldwide, including facilities in the United States, the United Kingdom, Canada, Turkey, Poland, Romania, China, Costa Rica, Malaysia, the Philippines, South Africa, Sri Lanka, and India.

NAICS: 5416
NAICS Definition: Management, Scientific, and Technical Consulting Services
Employees: 62,123
Subsidiaries: 6
12-month incidents
0
Known data breaches
0
Attack type number
0

Devoteam

73, rue Anatole France, Levallois-Perret, 92300, FR
Last Update: 2026-04-02
Between 750 and 799

Devoteam is a AI-driven tech consulting firm specialised in cloud platforms, cyber, data, and sustainability. Tech native for almost 30 years, Devoteam guides businesses through sustainable digital transformation to deliver value. With over 11,000 tech architects in more than 25 countries across Europe, the Middle East, and Africa, Devoteam is committed to using technology to serve people.

NAICS: 5416
NAICS Definition: Management, Scientific, and Technical Consulting Services
Employees: 10,286
Subsidiaries: 13
12-month incidents
0
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/wns-global-services.jpeg
WNS
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/devoteam.jpeg
Devoteam
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
WNS
100%
Compliance Rate
0/4 Standards Verified
Devoteam
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Business Consulting and Services Industry Average (This Year)

No incidents recorded for WNS in 2026.

Incidents vs Business Consulting and Services Industry Average (This Year)

No incidents recorded for Devoteam in 2026.

Incident History — WNS (X = Date, Y = Severity)

WNS cyber incidents detection timeline including parent company and subsidiaries

Incident History — Devoteam (X = Date, Y = Severity)

Devoteam cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/wns-global-services.jpeg
WNS
Incidents

No Incident

https://images.rankiteo.com/companyimages/devoteam.jpeg
Devoteam
Incidents

Date Detected: 11/2025
Type:Vulnerability
Attack Vector: Local (for CVE-2025-62215), Remote (for CVE-2025-60724, CVE-2025-62222), User Interaction Required (for CVE-2025-62199, CVE-2025-62222), Malicious Document (Metafile, Office File, GitHub Issue), Preview Pane (for CVE-2025-62199), Network-Based (for CVE-2025-62222)
Blog: Blog

FAQ

WNS company demonstrates a stronger AI Cybersecurity Score compared to Devoteam company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Devoteam company has historically faced a number of disclosed cyber incidents, whereas WNS company has not reported any.

In the current year, Devoteam company and WNS company have not reported any cyber incidents.

Neither Devoteam company nor WNS company has reported experiencing a ransomware attack publicly.

Neither Devoteam company nor WNS company has reported experiencing a data breach publicly.

Neither Devoteam company nor WNS company has reported experiencing targeted cyberattacks publicly.

Devoteam company has disclosed at least one vulnerability, while WNS company has not reported such incidents publicly.

Neither WNS nor Devoteam holds any compliance certifications.

Neither company holds any compliance certifications.

Devoteam company has more subsidiaries worldwide compared to WNS company.

WNS company employs more people globally than Devoteam company, reflecting its scale as a Business Consulting and Services.

Neither WNS nor Devoteam holds SOC 2 Type 1 certification.

Neither WNS nor Devoteam holds SOC 2 Type 2 certification.

Neither WNS nor Devoteam holds ISO 27001 certification.

Neither WNS nor Devoteam holds PCI DSS certification.

Neither WNS nor Devoteam holds HIPAA certification.

Neither WNS nor Devoteam holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X