Comparison Overview

AXA en France

VS

Porto

AXA en France

Last Update: 2024-08-12 (UTC)
Between 900 and 1000

Excellent

Parmi les leaders de l’assurance, AXA accompagne et protège 93 millions de clients dans le monde, qu’ils soient particuliers, professionnels ou entreprises, à chaque étape de leur vie. La protection de nos clients sur le long terme est notre cœur de métier. Nous proposons des produits et services d’assurance, de prévoyance, d’assistance, de banque, d’épargne et de protection juridique. Notre ambition est de devenir la société préférée de notre secteur d’activité. AXA en France compte plus de 37 000 collaborateurs. Nos équipes sont disponibles, attentionnées et fiables. Elles exercent leur métier dans le respect des valeurs de l’entreprise : le professionnalisme, l’innovation, le réalisme, l’esprit d’équipe et le respect de la parole donnée. Retrouvez nous également sur : -Twitter https://twitter.com/AXAJobs_fr -Facebook : https://www.facebook.com/discoverAXAfr/ -Instagram : https://www.instagram.com/axafrance/ -TikTok : https://www.tiktok.com/@axafrance Notre équipe RH se rend disponible rien que pour vous, par téléphone ou SMS. Contactez-nous sur notre hotline exclusive au +33 (0) 7 72 88 94 32, tous les lundis et mardis de 11h00 à 12h00 (service gratuit + prix d’un appel vers un mobile)

NAICS: 524
NAICS Definition: Insurance Carriers and Related Activities
Employees: 9,204
Subsidiaries: 50
12-month incidents
0
Known data breaches
0
Attack type number
1

Porto

Avenida Rio Branco, 1489, None, Sao Paulo, SP, BR, 01205-001
Last Update: 2025-09-07 (UTC)

Excellent

Between 900 and 1000

A Porto é mais que uma seguradora, é um ecossistema de soluções de serviços de proteção com tecnologia embarcada, para melhorar e facilitar a experiência do cliente. Com mais de 70 anos de mercado, a atuação da companhia se concentra hoje em quatro pilares estratégicos de negócio: Seguros, Saúde, Produtos Financeiros e Serviços. Além de 15.8 milhões de clientes únicos, 13 mil funcionários, 12 mil prestadores e 35 mil corretores parceiros, a empresa conta ainda com 101 sucursais e escritórios regionais em todo o Brasil. Ao todo 27 empresas fazem parte do universo Porto – entre elas: Porto Bank, Porto Saúde, Porto Seguro, Porto Serviço, Porto Seguro Uruguai, Azul Seguros, Itaú Seguros de Auto e Residência.

NAICS: 524
NAICS Definition: Insurance Carriers and Related Activities
Employees: 22,676
Subsidiaries: 1
12-month incidents
1
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/axa-france.jpeg
AXA en France
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/porto.jpeg
Porto
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
Compliance Summary
AXA en France
100%
Compliance Rate
0/4 Standards Verified
Porto
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Insurance Industry Average (This Year)

No incidents recorded for AXA en France in 2025.

Incidents vs Insurance Industry Average (This Year)

Porto has 44.93% more incidents than the average of same-industry companies with at least one recorded incident.

Incident History — AXA en France (X = Date, Y = Severity)

AXA en France cyber incidents detection timeline including parent company and subsidiaries

Incident History — Porto (X = Date, Y = Severity)

Porto cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/axa-france.jpeg
AXA en France
Incidents

Date Detected: 05/2021
Type:Ransomware
Motivation: Data Theft, Financial Gain
Blog: Blog
https://images.rankiteo.com/companyimages/porto.jpeg
Porto
Incidents

Date Detected: 9/2025
Type:Ransomware
Blog: Blog

FAQ

Both AXA en France company and Porto company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

AXA en France and Porto have experienced a similar number of publicly disclosed cyber incidents.

In the current year, Porto company has reported more cyber incidents than AXA en France company.

Both Porto company and AXA en France company have confirmed experiencing at least one ransomware attack.

Neither Porto company nor AXA en France company has reported experiencing a data breach publicly.

Neither Porto company nor AXA en France company has reported experiencing targeted cyberattacks publicly.

Neither AXA en France company nor Porto company has reported experiencing or disclosing vulnerabilities publicly.

AXA en France company has more subsidiaries worldwide compared to Porto company.

Porto company employs more people globally than AXA en France company, reflecting its scale as a Insurance.

Latest Global CVEs (Not Company-Specific)

Description

Volto is a ReactJS-based frontend for the Plone Content Management System. Versions 16.34.0 and below, 17.0.0 through 17.22.1, 18.0.0 through 18.27.1, and 19.0.0-alpha.1 through 19.0.0-alpha.5, an anonymous user could cause the NodeJS server part of Volto to quit with an error when visiting a specific URL. This issue is fixed in versions 16.34.1, 17.22.2, 18.27.2 and 19.0.0-alpha.6.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Traccar is an open source GPS tracking system. Default installs of Traccar on Windows between versions 6.1- 6.8.1 and non default installs between versions 5.8 - 6.0 are vulnerable to unauthenticated local file inclusion attacks which can lead to leakage of passwords or any file on the file system including the Traccar configuration file. Versions 5.8 - 6.0 are only vulnerable if <entry key='web.override'>./override</entry> is set in the configuration file. Versions 6.1 - 6.8.1 are vulnerable by default as the web override is enabled by default. The vulnerable code is removed in version 6.9.0.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Stalwart is a mail and collaboration server. Versions 0.13.3 and below contain an unbounded memory allocation vulnerability in the IMAP protocol parser which allows remote attackers to exhaust server memory, potentially triggering the system's out-of-memory (OOM) killer and causing a denial of service. The CommandParser implementation enforces size limits on its dynamic buffer in most parsing states, but several state handlers omit these validation checks. This issue is fixed in version 0.13.4. A workaround for this issue is to implement rate limiting and connection monitoring at the network level, however this does not provide complete protection.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain a Broken Access Control vulnerability, identified in the get_relatorios_socios.php endpoint. This vulnerability allows unauthenticated attackers to directly access sensitive personal and financial information of members without requiring authentication or authorization. This issue is fixed in version 3.5.0.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain an Open Redirect vulnerability, identified in the control.php endpoint, specifically in the nextPage parameter (metodo=listarUmnomeClasse=FuncionarioControle). This vulnerability allows attackers to redirect users to arbitrary external domains, enabling phishing campaigns, malicious payload distribution, or user credential theft. This issue is fixed in version 3.5.0.

Risk Information
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X