Comparison Overview

3DEO, Inc.

VS

Spirit Electronics

3DEO, Inc.

106 Access Rd, Suite 106, Norwood, Massachusetts, US, 02062
Last Update: 2025-08-28 (UTC)
Between 900 and 1000

Excellent

We are a hardware spin-out from MIT Lincoln Lab, commercializing advanced lidar systems for airborne 3D mapping. 3DEO designs, builds, qualifies, operates, and maintains lidar systems for government and commercial applications. Our engineers have designed and built the worldโ€™s most capable lidar sensors, integrated them into airplanes, flown with them, and gotten them to work reliably for operational use by the US Department of Defense. We love this stuff! Our engineers like that we are a โ€œyou build it, you fly itโ€ company.

NAICS: None
NAICS Definition: Others
Employees: 15
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Spirit Electronics

11202 N 24th Ave, Phoenix, Arizona, 85029, US
Last Update: 2025-03-14 (UTC)

Excellent

Spirit Electronics is a veteran-owned, woman-owned โ€‹value-added supplier of high reliability components and superior supply chain solutions. As an award-winning, full turnkey distributor, Spirit delivers authorized products from wafer sales through fully screened, radiation and environmentally qualified components. Our value-added services include SMI/VMI, Electrical and Environmental Testing, Design, Assembly, End-of-Life Management and more: โ€ข Electronic component distribution, including passive components, discrete semis, memory, interconnect, RF/Microwave and electro-mechanical devices โ€ข Fulfillment, material planning, material purchasing (full BOM), inventory management, just-in-time delivery, and supply-chain solutions โ€ข Wafer sort, assembly, test, qualification, radiation services, and simple and complex kitting Our engineers are experienced in high-speed digital, mixed signal, analog, RF and SOC test-program development. Our team will work seamlessly with you and your team to help meet your market challenges. We Own the Qualโ„ข Spirit Electronics performs in-house testing to qualify our components. We take full ownership of the product and any failures up until it is received on our customersโ€™ dock. This assures the parts received are 100% problem-free. Guaranteed. Spiritโ€™s History & Mission Spirit Electronics was founded by a Native American woman and continues today as a USAF Veteran, woman owned small business. Spiritโ€™s owner and CEO, Marti McCurdy, has served the military and space industries around the world throughout her career, starting with work on jamming radar systems for fighter jets, to being a Level 3 ultrasonic specialist performing ultrasonic inspections in more than 20 countries. Spirit strives to be a valued partner to key technology sectors, and our status as VOWOSB, SDB owned-company provides diversity requirement relief to Defense and Aerospace customers.

NAICS: None
NAICS Definition:
Employees: 35
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/3deo-inc.jpeg
3DEO, Inc.
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/spirit-electronics.jpeg
Spirit Electronics
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
3DEO, Inc.
100%
Compliance Rate
0/4 Standards Verified
Spirit Electronics
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Defense & Space Industry Average (This Year)

No incidents recorded for 3DEO, Inc. in 2025.

Incidents vs Defense & Space Industry Average (This Year)

No incidents recorded for Spirit Electronics in 2025.

Incident History โ€” 3DEO, Inc. (X = Date, Y = Severity)

3DEO, Inc. cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Spirit Electronics (X = Date, Y = Severity)

Spirit Electronics cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/3deo-inc.jpeg
3DEO, Inc.
Incidents

No Incident

https://images.rankiteo.com/companyimages/spirit-electronics.jpeg
Spirit Electronics
Incidents

No Incident

FAQ

Both 3DEO, Inc. company and Spirit Electronics company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Spirit Electronics company has disclosed a higher number of cyber incidents compared to 3DEO, Inc. company.

In the current year, Spirit Electronics company and 3DEO, Inc. company have not reported any cyber incidents.

Neither Spirit Electronics company nor 3DEO, Inc. company has reported experiencing a ransomware attack publicly.

Neither Spirit Electronics company nor 3DEO, Inc. company has reported experiencing a data breach publicly.

Neither Spirit Electronics company nor 3DEO, Inc. company has reported experiencing targeted cyberattacks publicly.

Neither 3DEO, Inc. company nor Spirit Electronics company has reported experiencing or disclosing vulnerabilities publicly.

Spirit Electronics company has more subsidiaries worldwide compared to 3DEO, Inc. company.

Spirit Electronics company employs more people globally than 3DEO, Inc. company, reflecting its scale as a Defense & Space.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in code-projects Project Monitoring System 1.0. Affected is an unknown function of the file /onlineJobSearchEngine/postjob.php. Such manipulation of the argument txtapplyto leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in Tenda AC18 15.03.05.19. This impacts an unknown function of the file /goform/saveAutoQos. This manipulation of the argument enable causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in Tenda AC18 15.03.05.19. This affects an unknown function of the file /goform/WizardHandle. The manipulation of the argument WANT/mtuvalue results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security vulnerability has been detected in Tenda AC18 15.03.05.19. The impacted element is an unknown function of the file /goform/AdvSetLanip. The manipulation of the argument lanIp leads to command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in Tenda AC8 16.03.34.06. The affected element is the function formSetServerConfig of the file /goform/SetServerConfig. Executing manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X