Comparison Overview

Ruby

VS

Globe Telecom

Ruby

555 SE Martin Luther King Jr Blvd, #105, Portland, Oregon, US, 97214
Last Update: 2025-12-01
Between 750 and 799

Ruby supports more than 10,000 businesses with live virtual receptionists and 24/7 chat services. But the big thing we do is a hundred little things that help owners cultivate great relationships with clients—from first impressions to lasting loyalty. We’re like the modern version of a handwritten thank you note. Something you do because it’s the right thing to do, not because you have to. We give your clients the personalized service and interactions they deserve, making meaningful connections that help your business grow and thrive. From virtual receptionists that greet callers, transfer calls, take messages, book appointments and perform intake to 24/7 live chat specialists that engage website visitors, answer FAQs and transfer leads to your team—Ruby is the dedicated teammate that makes each conversation better for you and your clients. Try Ruby risk-free. Visit www.ruby.com to get started.

NAICS: 517
NAICS Definition: Telecommunications
Employees: 679
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

Globe Telecom

undefined, undefined, undefined, undefined, PH
Last Update: 2025-12-01
Between 750 and 799

Globe is a leading full-service telecommunications company in the Philippines and publicly listed in the PSE with the stock symbol GLO. The company serves the telecommunications and technology needs of consumers and businesses across an entire suite of products and services including mobile, fixed, broadband, data connectivity, internet and managed services. It has major interests in financial technology, digital marketing solutions, venture capital funding for startups, and virtual healthcare. In 2019, Globe became a signatory to the United Nations Global Compact, committing to implement universal sustainability principles. Its principals are Ayala Corporation and Singtel, acknowledged industry leaders in the country and in the region. VISION We see a Philippines where Families'​ dreams come true, Businesses flourish, and the Nation is admired. MISSION To do our part, we create Wonderful Experiences for people to have choices, Overcome Challenges, and discover new ways to Enjoy Life. OUR VALUES We put our customers first. We value People & together we make the difference. We act with integrity. We care like an owner. We keep things simple. We move Fast, We are Better Everyday.

NAICS: 517
NAICS Definition: Telecommunications
Employees: 13,888
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/callruby.jpeg
Ruby
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/globe-telecom.jpeg
Globe Telecom
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Ruby
100%
Compliance Rate
0/4 Standards Verified
Globe Telecom
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Telecommunications Industry Average (This Year)

No incidents recorded for Ruby in 2025.

Incidents vs Telecommunications Industry Average (This Year)

No incidents recorded for Globe Telecom in 2025.

Incident History — Ruby (X = Date, Y = Severity)

Ruby cyber incidents detection timeline including parent company and subsidiaries

Incident History — Globe Telecom (X = Date, Y = Severity)

Globe Telecom cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/callruby.jpeg
Ruby
Incidents

Date Detected: 05/2022
Type:Cyber Attack
Blog: Blog

Date Detected: 6/2019
Type:Cyber Attack
Blog: Blog
https://images.rankiteo.com/companyimages/globe-telecom.jpeg
Globe Telecom
Incidents

No Incident

FAQ

Globe Telecom company demonstrates a stronger AI Cybersecurity Score compared to Ruby company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Ruby company has historically faced a number of disclosed cyber incidents, whereas Globe Telecom company has not reported any.

In the current year, Globe Telecom company and Ruby company have not reported any cyber incidents.

Neither Globe Telecom company nor Ruby company has reported experiencing a ransomware attack publicly.

Neither Globe Telecom company nor Ruby company has reported experiencing a data breach publicly.

Ruby company has reported targeted cyberattacks, while Globe Telecom company has not reported such incidents publicly.

Neither Ruby company nor Globe Telecom company has reported experiencing or disclosing vulnerabilities publicly.

Neither Ruby nor Globe Telecom holds any compliance certifications.

Neither company holds any compliance certifications.

Globe Telecom company has more subsidiaries worldwide compared to Ruby company.

Globe Telecom company employs more people globally than Ruby company, reflecting its scale as a Telecommunications.

Neither Ruby nor Globe Telecom holds SOC 2 Type 1 certification.

Neither Ruby nor Globe Telecom holds SOC 2 Type 2 certification.

Neither Ruby nor Globe Telecom holds ISO 27001 certification.

Neither Ruby nor Globe Telecom holds PCI DSS certification.

Neither Ruby nor Globe Telecom holds HIPAA certification.

Neither Ruby nor Globe Telecom holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.

Risk Information
cvss3
Base: 6.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Description

XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.

Description

An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Risk Information
cvss4
Base: 9.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Risk Information
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X