Company Details
agio-international
35
506
337
agio-usa.com
0
AGI_8479375
In-progress

Agio USA Company CyberSecurity Posture
agio-usa.comThe distinctive designs by Agio are a merger of beauty, exceptional quality, and affordability for homeowners who seek out the pure enjoyment of the company of friends and family in their outdoor rooms. Derived from the Italian word for “leisure,” Agio embodies the art of living well and offers innovative outdoor designs. The quality and durability of Agio stems from years of mastering the perfect balance of craftsmanship and innovative materials. One of the world's largest manufacturers of outdoor furniture. Agio designs, engineers, merchandises and sells outdoor products for the residential market. Our customers include the largest warehouse clubs, mass merchants, home improvement centers, department stores, indoor furniture stores, and numerous large and small specialty retailers.
Company Details
agio-international
35
506
337
agio-usa.com
0
AGI_8479375
In-progress
Between 750 and 799

Agio USA Global Score (TPRM)XXXX



No incidents recorded for Agio USA in 2025.
No incidents recorded for Agio USA in 2025.
No incidents recorded for Agio USA in 2025.
Agio USA cyber incidents detection timeline including parent company and subsidiaries

The distinctive designs by Agio are a merger of beauty, exceptional quality, and affordability for homeowners who seek out the pure enjoyment of the company of friends and family in their outdoor rooms. Derived from the Italian word for “leisure,” Agio embodies the art of living well and offers innovative outdoor designs. The quality and durability of Agio stems from years of mastering the perfect balance of craftsmanship and innovative materials. One of the world's largest manufacturers of outdoor furniture. Agio designs, engineers, merchandises and sells outdoor products for the residential market. Our customers include the largest warehouse clubs, mass merchants, home improvement centers, department stores, indoor furniture stores, and numerous large and small specialty retailers.


Primo is a Top 10 Canadian importer of fine quality leather upholstery, fabric upholstery, mattresses, futons, casual dining, youth furniture and more. The company's headquaters are in Montreal. Additionally, Primo utilizes independantly owned stocking facilities in California and Virginia to effe

For over 45 years, Anderson Interiors has been transforming everyday work places into functional and fashionable work spaces! As a Pittsburgh-based, family-owned and operated company, Anderson Interiors services businesses all over the country. Whether you are expanding to a new facillity, or

JLF collections is a family of imaginative manufacturing companies focused solely on the hospitality industry. The go-to for inspired designers, our brands offer innovative seating, brilliant lighting, and unique outdoor pieces completely customized to designer specifications. Known for US-based man

About GlobeWest Founded in 2004 in Melbourne, Australia, GlobeWest enables the creation of beautiful and distinctly personal living spaces for style-conscious Australians. Our goal is to inspire passion for creativity & interior design with the exquisite textures, colour and forms of our contemp

At Fitted Wardrobe World, we believe that the highest quality fitted bedroom furniture shouldn't necessarily be the one with the highest price tag. We strive to work with our suppliers to get you the the best quality fitted wardrobes and bedroom furniture at the best price. We cut out the middle

Concepts Office Furnishings, Inc. was incorporated in May 1973. Since its inception, the company has grown from a three-person office staff to a staff of forty, all with substantial backgrounds of performance in the field of office furnishings and related support. Today COFI represents 297 lines
.png)
Agio is establishing a new technology centre in Belfast.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Agio USA is http://www.agio-usa.com.
According to Rankiteo, Agio USA’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.
According to Rankiteo, Agio USA currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Agio USA is not certified under SOC 2 Type 1.
According to Rankiteo, Agio USA does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Agio USA is not listed as GDPR compliant.
According to Rankiteo, Agio USA does not currently maintain PCI DSS compliance.
According to Rankiteo, Agio USA is not compliant with HIPAA regulations.
According to Rankiteo,Agio USA is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Agio USA operates primarily in the Furniture and Home Furnishings Manufacturing industry.
Agio USA employs approximately 35 people worldwide.
Agio USA presently has no subsidiaries across any sectors.
Agio USA’s official LinkedIn profile has approximately 506 followers.
No, Agio USA does not have a profile on Crunchbase.
Yes, Agio USA maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/agio-international.
As of November 28, 2025, Rankiteo reports that Agio USA has not experienced any cybersecurity incidents.
Agio USA has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Agio USA has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.