Comparison Overview

Banco do Brasil

VS

PT Bank Danamon Indonesia Tbk

Banco do Brasil

undefined, undefined, undefined, undefined, BR
Last Update: 2025-12-09
Between 750 and 799

Eu experimentei um novo jeito de me comunicar com você. Você usa o mundo digital para criar um universo totalmente seu e nesse novo universo eu acompanho você. Eu sei… Você é muito mais que digital. Eu olho para você e me vejo. Este é um dos motivos de eu estar aqui para conversar com você. Eu sou brasileiro como você. Eu sou um banco de mercado para manter a sustentabilidade da minha atuação. Eu fomento a produção agropecuária e a indústria nacional. Sou o maior parceiro das micro e pequenas empresas. Invisto há décadas no esporte brasileiro porque acredito na sua competência e garra. Eu tenho espírito público para criar valor para cada um dos brasileiros. Persigo a eficiência, com determinação, para otimizar os recursos disponíveis pensando nesta e em futuras gerações. Acredito no potencial de todas as pessoas e tenho como objetivo de vida ser uma referência de comportamento pessoal e profissional. Inovo a cada passo que dou para garantir que você e todos os brasileiros possam contar comigo sempre. Eu sou mais que digital. Estou aqui no LinkedIn para conversar com você sobre como podemos fazer um presente e um futuro melhores. Me encontre também nos outros canais: Facebook: www.facebook.com/bancodobrasil Twitter: www.twitter.com/bancodobrasil Instagram: www.instagram.com/bancodobrasil

NAICS: 52211
NAICS Definition: Commercial Banking
Employees: 67,891
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
0

PT Bank Danamon Indonesia Tbk

Jl. HR. Rasuna Said Blok C No. 10, Karet Setiabudi, JAKARTA, DKI Jakarta, ID, 12940
Last Update: 2025-12-10
Between 750 and 799

PT Bank Danamon Indonesia Tbk (BEI: BDMN) didirikan pada tahun 1956. Per 31 Desember 2024, Danamon mengelola aset konsolidasian sebesar Rp242 triliun dengan anak perusahannya, Adira Finance. Dalam hal kepemilikan saham, 92,47% saham Danamon dimiliki oleh MUFG, dan 7,53% lainnya dimiliki oleh publik. Dalam melayani nasabah dari semua lini bisnis yaitu Retail, Usaha Kecil dan Menengah, serta Korporasi, Danamon didukung oleh 865* kantor cabang konvensional dan unit Syariah, serta kantor cabang dan kantor perwakilan grup perusahaan Danamon di Indonesia. Sebagai anak perusahaan dari MUFG yang merupakan salah satu grup jasa keuangan terbesar di dunia, Danamon didukung oleh jaringan global MUFG dan bank mitranya: Krungsri Bank di Thailand, Security Bank di Filipina, dan VietinBank di Vietnam. Danamon juga diperkuat oleh jaringan lokal dari grup perusahaannya yaitu Adira Finance, Home Credit Indonesia, Mandala Finance, dan Zurich Asuransi Indonesia, serta mitra strategisnya. Bersama MUFG, grup perusahaan serta mitra strategisnya, Danamon berkomitmen untuk terus bertransformasi sebagai Satu Grup Finansial, guna menjadi mitra keuangan terpercaya yang berorientasi pada pelanggan dan selalu berinovasi, demi memenuhi kebutuhan pemegang saham, nasabah, karyawan, dan regulator dengan menghadirkan solusi finansial menyeluruh agar dapat tumbuh bersama. Danamon dan grup perusahaan serta mitra strategisnya juga menyadari pentingnya aspek keberlanjutan sebagai bagian tak terpisahkan dari pertumbuhan dan kesejahteraan masyarakat. Selain itu, dalam menjalankan bisnis serta untuk mencapai tujuan sesuai dengan visi dan misinya, Danamon menjunjung tinggi nilai perusahaan “BISA”, yang harus diterapkan oleh seluruh karyawan, manajemen, direksi, dan komisaris Danamon. Nilai-nilai tersebut meliputi Berkolaborasi, Intergritas, Sigap Melayani, dan Adaptif.

NAICS: 52211
NAICS Definition: Commercial Banking
Employees: 10,500
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/bancodobrasil.jpeg
Banco do Brasil
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/bank-danamon-indonesia.jpeg
PT Bank Danamon Indonesia Tbk
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Banco do Brasil
100%
Compliance Rate
0/4 Standards Verified
PT Bank Danamon Indonesia Tbk
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Banking Industry Average (This Year)

No incidents recorded for Banco do Brasil in 2025.

Incidents vs Banking Industry Average (This Year)

No incidents recorded for PT Bank Danamon Indonesia Tbk in 2025.

Incident History — Banco do Brasil (X = Date, Y = Severity)

Banco do Brasil cyber incidents detection timeline including parent company and subsidiaries

Incident History — PT Bank Danamon Indonesia Tbk (X = Date, Y = Severity)

PT Bank Danamon Indonesia Tbk cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/bancodobrasil.jpeg
Banco do Brasil
Incidents

No Incident

https://images.rankiteo.com/companyimages/bank-danamon-indonesia.jpeg
PT Bank Danamon Indonesia Tbk
Incidents

No Incident

FAQ

Banco do Brasil company demonstrates a stronger AI Cybersecurity Score compared to PT Bank Danamon Indonesia Tbk company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, PT Bank Danamon Indonesia Tbk company has disclosed a higher number of cyber incidents compared to Banco do Brasil company.

In the current year, PT Bank Danamon Indonesia Tbk company and Banco do Brasil company have not reported any cyber incidents.

Neither PT Bank Danamon Indonesia Tbk company nor Banco do Brasil company has reported experiencing a ransomware attack publicly.

Neither PT Bank Danamon Indonesia Tbk company nor Banco do Brasil company has reported experiencing a data breach publicly.

Neither PT Bank Danamon Indonesia Tbk company nor Banco do Brasil company has reported experiencing targeted cyberattacks publicly.

Neither Banco do Brasil company nor PT Bank Danamon Indonesia Tbk company has reported experiencing or disclosing vulnerabilities publicly.

Neither Banco do Brasil nor PT Bank Danamon Indonesia Tbk holds any compliance certifications.

Neither company holds any compliance certifications.

Banco do Brasil company has more subsidiaries worldwide compared to PT Bank Danamon Indonesia Tbk company.

Banco do Brasil company employs more people globally than PT Bank Danamon Indonesia Tbk company, reflecting its scale as a Banking.

Neither Banco do Brasil nor PT Bank Danamon Indonesia Tbk holds SOC 2 Type 1 certification.

Neither Banco do Brasil nor PT Bank Danamon Indonesia Tbk holds SOC 2 Type 2 certification.

Neither Banco do Brasil nor PT Bank Danamon Indonesia Tbk holds ISO 27001 certification.

Neither Banco do Brasil nor PT Bank Danamon Indonesia Tbk holds PCI DSS certification.

Neither Banco do Brasil nor PT Bank Danamon Indonesia Tbk holds HIPAA certification.

Neither Banco do Brasil nor PT Bank Danamon Indonesia Tbk holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X