Comparison Overview

Acronis

VS

Wolt

Acronis

Rheinweg 9, Schaffhausen, Switzerland, CH, 8200
Last Update: 2025-11-23
Between 700 and 749

Acronis unifies data protection and cybersecurity, delivering cyber protection that solves safety, accessibility, privacy, authenticity, and security (SAPAS) challenges. Acronis offers antivirus, backup, disaster recovery, endpoint protection management solutions, and award-winning AI-based antimalware and blockchain-based data authentication technologies through service provider and IT professional deployment models. These solutions protect data, applications, and systems in any environment. Founded in Singapore in 2003 and incorporated in Switzerland in 2008, over 5.5 million home users and 500,000 companies, including 100% of the Fortune 1,000, trust Acronis. Acronis products are available through 50,000 partners and service providers in over 150 countries and 40 languages. Community Rules: At Acronis, we value respectful, meaningful conversations. We welcome constructive feedback, questions and commentaries. We expect our community to be respectful of each other and share relevant information. We reserve the right to remove or edit any comments and posts that do not conform to these Community guidelines, including: • Profane, offensive, hateful, harassing, threatening, violent or obscene language • Discussions regarding race, ethnicity, religion, disability, sexual orientation or political beliefs • Personal attacks • Sexually explicit comments or links that contain such material • Spam or advertisements If you have a customer service issue, please visit https://www.acronis.com/support/. We will manage this page according to these guidelines and look forward to hearing from you.

NAICS: 5112
NAICS Definition: Software Publishers
Employees: 1,685
Subsidiaries: 14
12-month incidents
0
Known data breaches
1
Attack type number
1

Wolt

Pohjoinen Rautatiekatu 21, Helsinki, Uusimaa, FI, 00100
Last Update: 2025-11-22
Between 750 and 799

Wolt is a Helsinki-based technology company with a mission to bring joy, simplicity and earnings to the neighborhoods of the world. Wolt develops a local commerce platform that connects people looking to order food, groceries, and other goods with people interested in selling and delivering them. Wolt was founded in 2014 and joined forces with DoorDash (NASDAQ: DASH) in 2022. Together, we operate in more than 30 countries today.

NAICS: 5112
NAICS Definition: Software Publishers
Employees: 11,073
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/acronis.jpeg
Acronis
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/wolt-oy.jpeg
Wolt
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Acronis
100%
Compliance Rate
0/4 Standards Verified
Wolt
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for Acronis in 2025.

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for Wolt in 2025.

Incident History — Acronis (X = Date, Y = Severity)

Acronis cyber incidents detection timeline including parent company and subsidiaries

Incident History — Wolt (X = Date, Y = Severity)

Wolt cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/acronis.jpeg
Acronis
Incidents

Date Detected: 03/2023
Type:Breach
Attack Vector: Compromised Credentials
Blog: Blog
https://images.rankiteo.com/companyimages/wolt-oy.jpeg
Wolt
Incidents

No Incident

FAQ

Wolt company demonstrates a stronger AI Cybersecurity Score compared to Acronis company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Acronis company has historically faced a number of disclosed cyber incidents, whereas Wolt company has not reported any.

In the current year, Wolt company and Acronis company have not reported any cyber incidents.

Neither Wolt company nor Acronis company has reported experiencing a ransomware attack publicly.

Acronis company has disclosed at least one data breach, while the other Wolt company has not reported such incidents publicly.

Neither Wolt company nor Acronis company has reported experiencing targeted cyberattacks publicly.

Neither Acronis company nor Wolt company has reported experiencing or disclosing vulnerabilities publicly.

Neither Acronis nor Wolt holds any compliance certifications.

Neither company holds any compliance certifications.

Acronis company has more subsidiaries worldwide compared to Wolt company.

Wolt company employs more people globally than Acronis company, reflecting its scale as a Software Development.

Neither Acronis nor Wolt holds SOC 2 Type 1 certification.

Neither Acronis nor Wolt holds SOC 2 Type 2 certification.

Neither Acronis nor Wolt holds ISO 27001 certification.

Neither Acronis nor Wolt holds PCI DSS certification.

Neither Acronis nor Wolt holds HIPAA certification.

Neither Acronis nor Wolt holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.