Comparison Overview

Ruby

VS

ZTE Corporation

Ruby

555 SE Martin Luther King Jr Blvd, #105, Portland, Oregon, US, 97214
Last Update: 2025-12-01
Between 750 and 799

Ruby supports more than 10,000 businesses with live virtual receptionists and 24/7 chat services. But the big thing we do is a hundred little things that help owners cultivate great relationships with clients—from first impressions to lasting loyalty. We’re like the modern version of a handwritten thank you note. Something you do because it’s the right thing to do, not because you have to. We give your clients the personalized service and interactions they deserve, making meaningful connections that help your business grow and thrive. From virtual receptionists that greet callers, transfer calls, take messages, book appointments and perform intake to 24/7 live chat specialists that engage website visitors, answer FAQs and transfer leads to your team—Ruby is the dedicated teammate that makes each conversation better for you and your clients. Try Ruby risk-free. Visit www.ruby.com to get started.

NAICS: 517
NAICS Definition: Telecommunications
Employees: 679
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

ZTE Corporation

ZTE Corporation Hi-Tech Road South, Nanshan District, Shenzhen, CN, 518057
Last Update: 2025-12-01
Between 800 and 849

ZTE connects the world with continuous innovation for a better future. The company provides innovative technologies and integrated solutions, and its portfolio spans communication networks, computing infrastructure, industry digital solutions, and personal and home smart terminals. Serving one third of the world's population, ZTE is dedicated to leading globally in connectivity and intelligent computing, enabling communication and trust everywhere. ZTE is listed on both the Hong Kong and Shenzhen Stock Exchanges. For enquiry about our mobile devices, please contact us via [email protected] For network services, please contact our 24/7 support hotline: 0086-755-26771900 or email: [email protected] https://twitter.com/ZTEPress https://www.facebook.com/ZTECorp https://youtube.com/@ZTECorporation

NAICS: 517
NAICS Definition: Telecommunications
Employees: 30,451
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/callruby.jpeg
Ruby
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/zte.jpeg
ZTE Corporation
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Ruby
100%
Compliance Rate
0/4 Standards Verified
ZTE Corporation
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Telecommunications Industry Average (This Year)

No incidents recorded for Ruby in 2025.

Incidents vs Telecommunications Industry Average (This Year)

No incidents recorded for ZTE Corporation in 2025.

Incident History — Ruby (X = Date, Y = Severity)

Ruby cyber incidents detection timeline including parent company and subsidiaries

Incident History — ZTE Corporation (X = Date, Y = Severity)

ZTE Corporation cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/callruby.jpeg
Ruby
Incidents

Date Detected: 05/2022
Type:Cyber Attack
Blog: Blog

Date Detected: 6/2019
Type:Cyber Attack
Blog: Blog
https://images.rankiteo.com/companyimages/zte.jpeg
ZTE Corporation
Incidents

No Incident

FAQ

ZTE Corporation company demonstrates a stronger AI Cybersecurity Score compared to Ruby company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Ruby company has historically faced a number of disclosed cyber incidents, whereas ZTE Corporation company has not reported any.

In the current year, ZTE Corporation company and Ruby company have not reported any cyber incidents.

Neither ZTE Corporation company nor Ruby company has reported experiencing a ransomware attack publicly.

Neither ZTE Corporation company nor Ruby company has reported experiencing a data breach publicly.

Ruby company has reported targeted cyberattacks, while ZTE Corporation company has not reported such incidents publicly.

Neither Ruby company nor ZTE Corporation company has reported experiencing or disclosing vulnerabilities publicly.

Neither Ruby nor ZTE Corporation holds any compliance certifications.

Neither company holds any compliance certifications.

ZTE Corporation company has more subsidiaries worldwide compared to Ruby company.

ZTE Corporation company employs more people globally than Ruby company, reflecting its scale as a Telecommunications.

Neither Ruby nor ZTE Corporation holds SOC 2 Type 1 certification.

Neither Ruby nor ZTE Corporation holds SOC 2 Type 2 certification.

Neither Ruby nor ZTE Corporation holds ISO 27001 certification.

Neither Ruby nor ZTE Corporation holds PCI DSS certification.

Neither Ruby nor ZTE Corporation holds HIPAA certification.

Neither Ruby nor ZTE Corporation holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.

Risk Information
cvss3
Base: 6.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Description

XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.

Description

An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Risk Information
cvss4
Base: 9.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Risk Information
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X