Comparison Overview

Capcom

VS

Keywords Studios

Capcom

3-1-3 Uchihirano-machi, Chuo-ku,, Osaka, undefined, 540-0037, JP
Last Update: 2025-12-11
Between 750 and 799

Capcom began in Japan in 1979 as a manufacturer and distributor of electronic game machines. In 1983 Capcom Co., Ltd was founded and soon built a reputation for introducing cutting-edge technology and software to the video game market. Now an industry leader in the video game industry for 25 years, Capcom's legacy of historic franchises in home and arcade gaming are testaments to an unparalleled commitment to excellence. Building on its origins as a game machine manufacturer, Capcom is now involved in all areas of the video game industry and has offices in Tokyo, Osaka, California, England, Germany and Hong Kong.

NAICS: 51126
NAICS Definition: Software Publishers
Employees: 1,112
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

Keywords Studios

Whelan House, Dublin, Ireland, 18, IE
Last Update: 2025-12-09

We provide creative services to the global video games industry and beyond through our end-to-end platform, supercharged by our own technology. Our goal is to help you imagine more for your IP, bringing to life digital content that entertains, connects, and educates people worldwide.​ ​ Established in 1998, we are a team of over 13,000 based across more than 70 studios in 25+ countries. We provide game-ready art, marketing services, game development, functional and localization testing, text and audio localization, everything from casting to audio post production, community management, player support, content moderation, and everything else you need across your game's entire lifecycle.​ Talk to us about your external game development needs, no matter where you're at with your project. We have the experts to provide you with a bespoke solution tailored to your needs and budget.

NAICS: None
NAICS Definition:
Employees: 11,314
Subsidiaries: 33
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/capcom.jpeg
Capcom
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/keywordsstudios.jpeg
Keywords Studios
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Capcom
100%
Compliance Rate
0/4 Standards Verified
Keywords Studios
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Computer Games Industry Average (This Year)

No incidents recorded for Capcom in 2025.

Incidents vs Computer Games Industry Average (This Year)

No incidents recorded for Keywords Studios in 2025.

Incident History — Capcom (X = Date, Y = Severity)

Capcom cyber incidents detection timeline including parent company and subsidiaries

Incident History — Keywords Studios (X = Date, Y = Severity)

Keywords Studios cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/capcom.jpeg
Capcom
Incidents

Date Detected: 11/2020
Type:Cyber Attack
Motivation: Intellectual Property Theft, Future Game Release Plans
Blog: Blog
https://images.rankiteo.com/companyimages/keywordsstudios.jpeg
Keywords Studios
Incidents

No Incident

FAQ

Both Capcom company and Keywords Studios company demonstrate a comparable AI Cybersecurity Score, with strong governance and monitoring frameworks in place.

Capcom company has historically faced a number of disclosed cyber incidents, whereas Keywords Studios company has not reported any.

In the current year, Keywords Studios company and Capcom company have not reported any cyber incidents.

Neither Keywords Studios company nor Capcom company has reported experiencing a ransomware attack publicly.

Neither Keywords Studios company nor Capcom company has reported experiencing a data breach publicly.

Capcom company has reported targeted cyberattacks, while Keywords Studios company has not reported such incidents publicly.

Neither Capcom company nor Keywords Studios company has reported experiencing or disclosing vulnerabilities publicly.

Neither Capcom nor Keywords Studios holds any compliance certifications.

Neither company holds any compliance certifications.

Keywords Studios company has more subsidiaries worldwide compared to Capcom company.

Keywords Studios company employs more people globally than Capcom company, reflecting its scale as a Computer Games.

Neither Capcom nor Keywords Studios holds SOC 2 Type 1 certification.

Neither Capcom nor Keywords Studios holds SOC 2 Type 2 certification.

Neither Capcom nor Keywords Studios holds ISO 27001 certification.

Neither Capcom nor Keywords Studios holds PCI DSS certification.

Neither Capcom nor Keywords Studios holds HIPAA certification.

Neither Capcom nor Keywords Studios holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X