Comparison Overview

Longview Europe GmbH (formerly arcplan Information Services GmbH)

VS

Google

Longview Europe GmbH (formerly arcplan Information Services GmbH)

1265 Drummers Lane, Wayne, PA, 19087, US
Last Update: 2025-03-05 (UTC)
Between 800 and 900

Strong

Founded in 1994, Longview provides leading corporate performance management (CPM), tax, and business intelligence (BI) solutions to enterprises across industries worldwide. The companyโ€™s flagship product, Longview 7, is a unified, scalable platform that automates the following key processes: strategic planning, budgeting and forecasting, modeling, disclosure management/XBRL reporting, statutory consolidation, management reporting, profitability analytics, tax provision/reporting, task management, transparency or any combination thereof. Together with arcplan 8, the power behind its flexible BI solution, Longview has helped hundreds of Fortune 1000 and FTSE 100 companies create a single-source system to better manage their businesses and significantly improve data integrity, decision-making, and financial transparency. For more information visit www.arcplan.com.

NAICS: 5112
NAICS Definition: Software Publishers
Employees: 13
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Google

1600 Amphitheatre Parkway, None, Mountain View, CA, US, 94043
Last Update: 2025-08-10 (UTC)

Strong

Between 800 and 900

A problem isn't truly solved until it's solved for all. Googlers build products that help create opportunities for everyone, whether down the street or across the globe. Bring your insight, imagination and a healthy disregard for the impossible. Bring everything that makes you unique. Together, we can build for everyone. Check out our career opportunities at goo.gle/3DLEokh

NAICS: 5112
NAICS Definition: Software Publishers
Employees: 314,945
Subsidiaries: 52
12-month incidents
15
Known data breaches
5
Attack type number
5

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/arcplan.jpeg
Longview Europe GmbH (formerly arcplan Information Services GmbH)
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/google.jpeg
Google
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Longview Europe GmbH (formerly arcplan Information Services GmbH)
100%
Compliance Rate
0/4 Standards Verified
Google
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for Longview Europe GmbH (formerly arcplan Information Services GmbH) in 2025.

Incidents vs Software Development Industry Average (This Year)

Google has 3160.87% more incidents than the average of same-industry companies with at least one recorded incident.

Incident History โ€” Longview Europe GmbH (formerly arcplan Information Services GmbH) (X = Date, Y = Severity)

Longview Europe GmbH (formerly arcplan Information Services GmbH) cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Google (X = Date, Y = Severity)

Google cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/arcplan.jpeg
Longview Europe GmbH (formerly arcplan Information Services GmbH)
Incidents

No Incident

https://images.rankiteo.com/companyimages/google.jpeg
Google
Incidents

Date Detected: 8/2025
Type:Cyber Attack
Attack Vector: Email Spoofing, Messaging Platform (WhatsApp)
Motivation: Financial Gain (Fraudulent Services/Products) or Data Theft
Blog: Blog

Date Detected: 8/2025
Type:Vulnerability
Attack Vector: Memory Allocator Manipulation, Heap Spraying, Dangling Pointer Dereference, Function Pointer Overwrite, Virtual Function Table Corruption, Race Conditions in Multithreaded Code, Callback-Based Object Lifetime Exploitation, JavaScript Engine Manipulation (e.g., Chrome FileReader), Pointer Authentication Bypass
Motivation: Arbitrary Code Execution, Privilege Escalation, Data Corruption, Bypassing Security Mitigations (DEP, ASLR, CFI), Exploit Development for Malware Distribution, Targeted Attacks on Browsers/OS/Critical Infrastructure
Blog: Blog

Date Detected: 8/2025
Type:Vulnerability
Attack Vector: Use-After-Free (UAF) vulnerability in the Linux HFSC queuing discipline
Motivation: Security Research and Bounty
Blog: Blog

FAQ

Both Longview Europe GmbH (formerly arcplan Information Services GmbH) company and Google company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Google company has historically faced a number of disclosed cyber incidents, whereas Longview Europe GmbH (formerly arcplan Information Services GmbH) company has not reported any.

In the current year, Google company has reported more cyber incidents than Longview Europe GmbH (formerly arcplan Information Services GmbH) company.

Google company has confirmed experiencing a ransomware attack, while Longview Europe GmbH (formerly arcplan Information Services GmbH) company has not reported such incidents publicly.

Google company has disclosed at least one data breach, while Longview Europe GmbH (formerly arcplan Information Services GmbH) company has not reported such incidents publicly.

Google company has reported targeted cyberattacks, while Longview Europe GmbH (formerly arcplan Information Services GmbH) company has not reported such incidents publicly.

Google company has disclosed at least one vulnerability, while Longview Europe GmbH (formerly arcplan Information Services GmbH) company has not reported such incidents publicly.

Google company has more subsidiaries worldwide compared to Longview Europe GmbH (formerly arcplan Information Services GmbH) company.

Google company employs more people globally than Longview Europe GmbH (formerly arcplan Information Services GmbH) company, reflecting its scale as a Software Development.

Latest Global CVEs (Not Company-Specific)

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in The Wikimedia Foundation MediaWiki Cargo extension allows SQL Injection.This issue affects MediaWiki Cargo extension: 1.39, 1.43, 1.44.

Risk Information
cvss4
Base: 2.1
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:U/V:C/RE:M/U:Amber
Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation MediaWiki QuizGame extension allows Stored XSS.This issue affects MediaWiki QuizGame extension: 1.39, 1.43, 1.44.

Risk Information
cvss4
Base: 2.0
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:C/RE:M/U:Amber
Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation MediaWiki PollNY extension allows Stored XSS.This issue affects MediaWiki PollNY extension: 1.39, 1.43, 1.44.

Risk Information
cvss4
Base: 2.0
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:C/RE:M/U:Amber
Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation MediaWiki WebAuthn extension allows Stored XSS.This issue affects MediaWiki WebAuthn extension: 1.39, 1.43, 1.44.

Risk Information
cvss4
Base: 5.8
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:L/U:Amber
Description

pyquokka is a framework for making data lakes work for time series. In versions 0.3.1 and prior, the FlightServer class directly uses pickle.loads() to deserialize action bodies received from Flight clients without any sanitization or validation in the do_action() method. The vulnerable code is located in pyquokka/flight.py at line 283 where arbitrary data from Flight clients is directly passed to pickle.loads(). When FlightServer is configured to listen on 0.0.0.0, this allows attackers across the entire network to perform arbitrary remote code execution by sending malicious pickled payloads through the set_configs action. Additional vulnerability points exist in the cache_garbage_collect, do_put, and do_get functions where pickle.loads is used to deserialize untrusted remote data.

Risk Information
cvss3
Base: 9.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H