Comparison Overview

Apollo Global Management, Inc.

VS

Franklin Templeton

Apollo Global Management, Inc.

9 West 57th Street, New York, New York, 10019, US
Last Update: 2025-12-09
Between 800 and 849

Apollo is a high-growth, global alternative asset manager. In our asset management business, we seek to provide our clients excess return at every point along the risk-reward spectrum from investment grade credit to private equity. For more than three decades, our investing expertise across our fully integrated platform has served the financial return needs of our clients and provided businesses with innovative capital solutions for growth. Through Athene, our retirement services business, we specialize in helping clients achieve financial security by providing a suite of retirement savings products and acting as a solutions provider to institutions. Our patient, creative, and knowledgeable approach to investing aligns our clients, businesses we invest in, our employees, and the communities we impact, to expand opportunity and achieve positive outcomes. To learn more, please visit www.apollo.com. Nothing herein constitutes an offer to sell, or a solicitation of an offer to buy, any security or product of Apollo or any Apollo-managed fund.

NAICS: 52
NAICS Definition: Finance and Insurance
Employees: 4,473
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

Franklin Templeton

Last Update: 2025-12-09

Franklin Resources, Inc. [NYSE:BEN] is a global investment management organization with subsidiaries operating as Franklin Templeton (www.franklinresources.com). The products, services, information and materials referenced in this site may not be available to residents in certain jurisdictions. Consult with an investment professional or contact your local Franklin Templeton office for more information. This site and the information contained herein is not intended to constitute an offer to sell or an invitation or solicitation of an offer to buy any product or service by Franklin Templeton. Nothing in this website should be construed as investment, tax, legal or other advice. All investments involve risks, including potential loss of principal. LinkedIn is owned by a third party unaffiliated with us. We are not responsible for LinkedIn’s privacy, security, or terms of use policies that control this service, nor their content, software, or tools (or those of any third party’s) that are available through links from this page. You use any third-party site/media, software and materials at your own risk. US readers: This material is being distributed in the U.S. by Franklin Distributors, LLC. Member FINRA/SIPC and only offers U.S. registered Franklin Templeton products. View our Terms and Conditions at: https://www.franklintempleton.com/help/social-media-guidelines/linkedin-guidelines Non-US readers: View our Terms and Conditions at https://www.franklinresources.com/resources/linkedin ©2022 Franklin Templeton. All rights reserved.

NAICS: 52
NAICS Definition: Finance and Insurance
Employees: 11,814
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/apollo-global-management-inc.jpeg
Apollo Global Management, Inc.
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/franklin-templeton.jpeg
Franklin Templeton
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Apollo Global Management, Inc.
100%
Compliance Rate
0/4 Standards Verified
Franklin Templeton
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for Apollo Global Management, Inc. in 2025.

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for Franklin Templeton in 2025.

Incident History — Apollo Global Management, Inc. (X = Date, Y = Severity)

Apollo Global Management, Inc. cyber incidents detection timeline including parent company and subsidiaries

Incident History — Franklin Templeton (X = Date, Y = Severity)

Franklin Templeton cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/apollo-global-management-inc.jpeg
Apollo Global Management, Inc.
Incidents

No Incident

https://images.rankiteo.com/companyimages/franklin-templeton.jpeg
Franklin Templeton
Incidents

No Incident

FAQ

Apollo Global Management, Inc. company demonstrates a stronger AI Cybersecurity Score compared to Franklin Templeton company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Franklin Templeton company has disclosed a higher number of cyber incidents compared to Apollo Global Management, Inc. company.

In the current year, Franklin Templeton company and Apollo Global Management, Inc. company have not reported any cyber incidents.

Neither Franklin Templeton company nor Apollo Global Management, Inc. company has reported experiencing a ransomware attack publicly.

Neither Franklin Templeton company nor Apollo Global Management, Inc. company has reported experiencing a data breach publicly.

Neither Franklin Templeton company nor Apollo Global Management, Inc. company has reported experiencing targeted cyberattacks publicly.

Neither Apollo Global Management, Inc. company nor Franklin Templeton company has reported experiencing or disclosing vulnerabilities publicly.

Neither Apollo Global Management, Inc. nor Franklin Templeton holds any compliance certifications.

Neither company holds any compliance certifications.

Both Franklin Templeton company and Apollo Global Management, Inc. company have a similar number of subsidiaries worldwide.

Franklin Templeton company employs more people globally than Apollo Global Management, Inc. company, reflecting its scale as a Financial Services.

Neither Apollo Global Management, Inc. nor Franklin Templeton holds SOC 2 Type 1 certification.

Neither Apollo Global Management, Inc. nor Franklin Templeton holds SOC 2 Type 2 certification.

Neither Apollo Global Management, Inc. nor Franklin Templeton holds ISO 27001 certification.

Neither Apollo Global Management, Inc. nor Franklin Templeton holds PCI DSS certification.

Neither Apollo Global Management, Inc. nor Franklin Templeton holds HIPAA certification.

Neither Apollo Global Management, Inc. nor Franklin Templeton holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X