Comparison Overview

Ascom

VS

Swisscom

Ascom

Ascom Holding AG, Zugerstrasse 32, Baar, ZG, CH, 6340
Last Update: 2025-12-11
Between 650 and 699

Our vision is a world where the right information moves people forward. Our mission is to put the right information in the right hands at the right time so that people can make the best possible decisions. We are a global provider of communication and collaboration solutions for the acute care, long-term care and enterprise sectors. Our solutions are based on intelligent integrations with software and hardware that are open source and compatible with third party solutions. Every single second, our systems generate large amounts of data, which we then turn into useful and actionable information. This helps us to bring data to life for people in the toughest operational environments, ensuring smooth, complete, and efficient workflows. Ascom is headquartered in Baar (Switzerland), has operating businesses in 19 countries and employs around 1,400 people worldwide. Ascom registered shares (ASCN) are listed on the SIX Swiss Exchange in Zurich.

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 1,549
Subsidiaries: 0
12-month incidents
1
Known data breaches
1
Attack type number
1

Swisscom

Last Update: 2025-12-09
Between 750 and 799

As No. 1, we inspire people in the connected world. With the latest technologies and innovations, together we have the opportunity to shape the future. To do this, we are and act trustworthy, committed and curious. Are you with us? Join us on this exciting journey and work with us or in one of the DevOps Centres in Riga or Rotterdam in different business areas on the latest technological trends. Find out more about us and our vacancies on our careers page: www.swisscom.ch/career We look forward to hearing from you!

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 15,427
Subsidiaries: 11
12-month incidents
0
Known data breaches
1
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/ascom.jpeg
Ascom
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/swisscom.jpeg
Swisscom
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Ascom
100%
Compliance Rate
0/4 Standards Verified
Swisscom
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT Services and IT Consulting Industry Average (This Year)

Ascom has 36.99% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Swisscom in 2025.

Incident History — Ascom (X = Date, Y = Severity)

Ascom cyber incidents detection timeline including parent company and subsidiaries

Incident History — Swisscom (X = Date, Y = Severity)

Swisscom cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/ascom.jpeg
Ascom
Incidents

Date Detected: 3/2025
Type:Breach
Attack Vector: Server Breach
Blog: Blog
https://images.rankiteo.com/companyimages/swisscom.jpeg
Swisscom
Incidents

Date Detected: 02/2018
Type:Breach
Blog: Blog

FAQ

Swisscom company demonstrates a stronger AI Cybersecurity Score compared to Ascom company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Ascom and Swisscom have experienced a similar number of publicly disclosed cyber incidents.

In the current year, Ascom company has reported more cyber incidents than Swisscom company.

Neither Swisscom company nor Ascom company has reported experiencing a ransomware attack publicly.

Both Swisscom company and Ascom company have disclosed experiencing at least one data breach.

Neither Swisscom company nor Ascom company has reported experiencing targeted cyberattacks publicly.

Neither Ascom company nor Swisscom company has reported experiencing or disclosing vulnerabilities publicly.

Neither Ascom nor Swisscom holds any compliance certifications.

Neither company holds any compliance certifications.

Swisscom company has more subsidiaries worldwide compared to Ascom company.

Swisscom company employs more people globally than Ascom company, reflecting its scale as a IT Services and IT Consulting.

Neither Ascom nor Swisscom holds SOC 2 Type 1 certification.

Neither Ascom nor Swisscom holds SOC 2 Type 2 certification.

Neither Ascom nor Swisscom holds ISO 27001 certification.

Neither Ascom nor Swisscom holds PCI DSS certification.

Neither Ascom nor Swisscom holds HIPAA certification.

Neither Ascom nor Swisscom holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.

Risk Information
cvss3
Base: 8.1
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Description

uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.

Risk Information
cvss3
Base: 2.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.

Risk Information
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L
Description

A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Risk Information
cvss3
Base: 5.8
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N