Company Details
1token
58
2,458
541511
1token.tech
0
1TO_1015893
In-progress


1Token Vendor Cyber Rating & Cyber Score
1token.tech1Token is a global technology provider for digital asset investment managers, operating in major financial centers such as London, New York, Miami, Hong Kong, and Singapore, managing over $20 billion in assets for more than 80 clients worldwide, with SOC2 certificate. The award-winning product CAM system serves portfolio managers, risk managers, treasury managers and fund operations and accountants. With automated API connections to CeFi and DeFi venues, and analytics to high frequency trading, derivatives, DeFi activities. 1Token CAM system supports - Front office (portfolio managers and traders) to view live position and exposure, calculate trading PnL and historical performance - Middle office (ops and risk) to maintain portfolios and API accounts, book OTC trades, monitor risk metrics and analyze VaR/STV, generate shadow NAV with investor subscription/redemption/dividend - Back office (admin and auditors) to collect and reconcile trades, generate valuation and PnL reporting under FIFO/WAC tax strategy
Company Details
1token
58
2,458
541511
1token.tech
0
1TO_1015893
In-progress
Between 750 and 799

1Token Global Score (TPRM)XXXX



No incidents recorded for 1Token in 2026.
No incidents recorded for 1Token in 2026.
No incidents recorded for 1Token in 2026.
1Token cyber incidents detection timeline including parent company and subsidiaries

1Token is a global technology provider for digital asset investment managers, operating in major financial centers such as London, New York, Miami, Hong Kong, and Singapore, managing over $20 billion in assets for more than 80 clients worldwide, with SOC2 certificate. The award-winning product CAM system serves portfolio managers, risk managers, treasury managers and fund operations and accountants. With automated API connections to CeFi and DeFi venues, and analytics to high frequency trading, derivatives, DeFi activities. 1Token CAM system supports - Front office (portfolio managers and traders) to view live position and exposure, calculate trading PnL and historical performance - Middle office (ops and risk) to maintain portfolios and API accounts, book OTC trades, monitor risk metrics and analyze VaR/STV, generate shadow NAV with investor subscription/redemption/dividend - Back office (admin and auditors) to collect and reconcile trades, generate valuation and PnL reporting under FIFO/WAC tax strategy


INNOVATION. TECHNOLOGY. IMPACT. For over 25 years, Integrated Digital Solutions has been a trusted technology consulting partner from rapidly growing startups to Fortune 500 enterprises across 17 countries. We empower businesses to thrive and deliver excellence, bringing a top global team of develo

CARFAC - driving on experience - For 33 years CARFAC has been an established name in the automotive sector. The company, which developed the dealer management system (DMS) named Carfac, tailored to car dealers, body shops and other (agricultural) machinery distributors. For these respective group

Our 20+ team members partner with many types of businesses and strive to eliminate IT issues before they cause expensive downtime, so you can continue to drive your business forward. We provide a full range of IT services including: • Computer & Network Services • Data Backup & Disaster Recovery •

Find your formula for digital success. Wasting time on manual tasks? Struggling with disconnected systems that slow you down? Have a great idea but lack the software to bring it to life? The right formula can change everything. At Formulate, we believe technology shouldn’t be hard work, it should
Founded in 2009, Alibaba Cloud is a leading cloud computing and artificial intelligence company. Leveraging its proprietary Apsara Cloud operating system, Alibaba Cloud offers a comprehensive suite of cloud services based on a three-tiered architecture of Infrastructure-as-a-Service (IaaS), Platform

GrupoGBI is a multinational digital innovation provider headquartered in Lisbon, Portugal, with operations extending across Europe and the Americas. With service hubs in São Paulo, Brazil, and Philadelphia, USA, we are committed to guiding global B2C companies through their digital transformation jo

Coreveillance is a cloud-based surveillance software solutions. Our advanced technologies enhance safety and make businesses smarter. A better connected world with our next generation video surveillance software creates opportunities to transform how we live, work and play. We offer unique solution

AGIL f(x) builds bespoke AI-powered business systems for enterprise teams in the Life Sciences industry. From Quality and Compliance to Regulatory, Clinical, and Commercial operations — we help organizations automate complex workflows, improve decision-making, and ensure compliance. We design intel

Welcome to Sungrove Tech Vietnam, a wholly-owned subsidiary of Sungrove Inc., launched in December 2023. We specialize in creating cutting-edge software solutions, web design, and programming, as well as the development, testing, and maintenance of web system infrastructures. Our mission is to dr
.png)
City leaders ultimately rejected a National Guard cybersecurity partnership as concerns mounted over data access and federal involvement.
AI attack trends reshape cybersecurity as RSAC highlights autonomous threats, agentic defense and quantum risks as enterprises build new...
Harvard is monitoring an ongoing cybersecurity threat involving individuals impersonating University information technology staff to gain...
Three-year coordinated collaboration aims to automate incident detection, response, certification, and secure updates.
The new Exam Guidance for Artificial Intelligence maps AI concepts across more than 50 core cybersecurity exam domains.
A LinkedIn post from ZeroFox highlights commentary by company expert Adam Darrah in SC Media on how ransomware groups often resemble...
AI company Anthropic warned that the next wave of AI would pose a new type of cybersecurity threat in a leaked blog post.
According to a recent LinkedIn post from Tines, the company used its presence at the RSA Conference in San Francisco to deepen engagement...
Cybersecurity roles will grow 10-15% in 2026, with long-term growth forecasts reaching 30% over five years.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of 1Token is https://1token.tech/.
According to Rankiteo, 1Token’s AI-generated cybersecurity score is 750, reflecting their Fair security posture.
According to Rankiteo, 1Token currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, 1Token has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, 1Token is not certified under SOC 2 Type 1.
According to Rankiteo, 1Token does not hold a SOC 2 Type 2 certification.
According to Rankiteo, 1Token is not listed as GDPR compliant.
According to Rankiteo, 1Token does not currently maintain PCI DSS compliance.
According to Rankiteo, 1Token is not compliant with HIPAA regulations.
According to Rankiteo,1Token is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
1Token operates primarily in the IT System Custom Software Development industry.
1Token employs approximately 58 people worldwide.
1Token presently has no subsidiaries across any sectors.
1Token’s official LinkedIn profile has approximately 2,458 followers.
1Token is classified under the NAICS code 541511, which corresponds to Custom Computer Programming Services.
Yes, 1Token has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/1token.
Yes, 1Token maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/1token.
As of April 03, 2026, Rankiteo reports that 1Token has not experienced any cybersecurity incidents.
1Token has an estimated 285 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, 1Token has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Hirschmann EagleSDV version 05.4.01 prior to 05.4.02 contains a denial-of-service vulnerability that causes the device to crash during session establishment when using TLS 1.0 or TLS 1.1. Attackers can trigger a crash by initiating TLS connections with these protocol versions to disrupt service availability.
The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.
XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services
Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.
A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.