Company Details
chillipharm
56
2,736
51122
chillipharm.com
0
CHI_2935244
In-progress

ChilliPharm Company CyberSecurity Posture
chillipharm.comChilliPharm pioneered the use of digital video for review of endpoint assessments, exercise tolerance tests, and other clinically significant events in rare neuromuscular disease clinical trials and other therapeutic areas, including novel surgical procedures for peer review. We are the trusted partner to many global Sponsors and CROs. ChilliPharm’s dedicated Project Managers help study teams understand the value of integrating video review into their protocols, improving endpoint quality, reducing site burden and supporting regulatory confidence. With over 20 years’ experience, we support everything needed to plan, record, review, and submit patient video assessments securely, compliantly and without disrupting trial flow. Whether you need our full video platform or standalone filming, de-identification and support services, with our intuitive filming kits, expert training and global deployment, we can fully support your trials. With filming kits and services deployed by trial teams in over 1,000+ hospitals across 40+ countries, our accredited compliance and end-to-end expertise help bring clarity and quality to every trial.
Company Details
chillipharm
56
2,736
51122
chillipharm.com
0
CHI_2935244
In-progress
Between 750 and 799

ChilliPharm Global Score (TPRM)XXXX



No incidents recorded for ChilliPharm in 2025.
No incidents recorded for ChilliPharm in 2025.
No incidents recorded for ChilliPharm in 2025.
ChilliPharm cyber incidents detection timeline including parent company and subsidiaries

ChilliPharm pioneered the use of digital video for review of endpoint assessments, exercise tolerance tests, and other clinically significant events in rare neuromuscular disease clinical trials and other therapeutic areas, including novel surgical procedures for peer review. We are the trusted partner to many global Sponsors and CROs. ChilliPharm’s dedicated Project Managers help study teams understand the value of integrating video review into their protocols, improving endpoint quality, reducing site burden and supporting regulatory confidence. With over 20 years’ experience, we support everything needed to plan, record, review, and submit patient video assessments securely, compliantly and without disrupting trial flow. Whether you need our full video platform or standalone filming, de-identification and support services, with our intuitive filming kits, expert training and global deployment, we can fully support your trials. With filming kits and services deployed by trial teams in over 1,000+ hospitals across 40+ countries, our accredited compliance and end-to-end expertise help bring clarity and quality to every trial.


VideoEngager is a next-generation platform that powers seamless and engaging real-time video conversations as a standalone solution or fully-integrated within your CCaaS / CRM solution of choice. Customers around the world use our platform to increase efficiency, productivity, and CSAT through

Die ACTIA IME GmbH - ein Tochterunternehmen der ACTIA Automotive SA Toulouse - mit Hauptsitz in Braunschweig, ist anerkannter Systemlieferant für namhafte Firmen aus dem Automotive-Bereich. Unser Produkt- und Dienstleistungsspektrum der ACTIA IME (Informatik- und Mikroelektronik) im Überblick: •

Compliance Solutions® es una plataforma utilizada para el cumplimiento Legal y Normativo. Supervisa y controla a través de inspecciones y auditorías el estado de los activos de tu empresa, reduciendo el riesgo en materia de SEGURIDAD INDUSTRIAL, SEGURIDAD OPERATIVA y MEDIO AMBIENTE, 100% configurabl

Aus dem kostenlosen APP VERORDNUNGSCENTER können Sie Ihren Patient*innen digitale Gesundheitsanwendungen, Gesundheits- und Präventions-Apps bequem und abrechnungskonform verordnen. In unserem Hörsaal Digital erfahren Sie in kostenlosen CME-Fortbildungen welche neuen Therapie- und Behandlungsmöglich
Call Loop is an all-in-one SMS, voice broadcast, and ringless voicemail software for businesses. https://www.CallLoop.com Better yet... test It out yourself, simply text the keyword "Loop" to 38470! Call Loop has more integration partners than other SMS marketing platform on the market. Here a

We are passionate and driven. We never shy away from challenges and we are creative. We are FEV Romania. We set upon our journey in 2016 and opened two development centers in Timisoara and Bucharest. Since then, a lot of projects have been successfully implemented, among which we mention AUTOSAR, Po
.png)
When Floridians pay their taxes, they expect that money to be spent wisely. Roads are paved and in good shape. Schools funded.
CHELMSFORD, Mass. — Global video surveillance products provider Axis Communications has signed the U.S. Cybersecurity & Infrastructure...
Wideum leans heavily into cybersecurity because remote-assistance software lives or dies on trust. The company rebuilt its stack around...
The Center will oversee implementation of South Carolina's first statewide cybersecurity strategic plan, developed through a multi-year...
South Carolina Gov. Henry McMaster and other officials announced Wednesday that the state will soon establish a cybersecurity hub.
District partners with Cybersecurity Coalition for Education to train educators on AI-powered phishing attacks and data protection as cyber...
Cybersecurity today is about a lot more than just firewalls and antivirus software. As organisations adopt cloud computing, remote work,...
All elementary and middle schools in Zion are closed for the third day in a row after Zion School District 6 was the target of a...
Florida. Tribal Gaming · Cybersecurity · Technology. Rege Behe, CDC Gaming. Email, LinkedIn, and more. Share this article.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of ChilliPharm is http://www.chillipharm.com.
According to Rankiteo, ChilliPharm’s AI-generated cybersecurity score is 751, reflecting their Fair security posture.
According to Rankiteo, ChilliPharm currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, ChilliPharm is not certified under SOC 2 Type 1.
According to Rankiteo, ChilliPharm does not hold a SOC 2 Type 2 certification.
According to Rankiteo, ChilliPharm is not listed as GDPR compliant.
According to Rankiteo, ChilliPharm does not currently maintain PCI DSS compliance.
According to Rankiteo, ChilliPharm is not compliant with HIPAA regulations.
According to Rankiteo,ChilliPharm is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
ChilliPharm operates primarily in the Embedded Software Products industry.
ChilliPharm employs approximately 56 people worldwide.
ChilliPharm presently has no subsidiaries across any sectors.
ChilliPharm’s official LinkedIn profile has approximately 2,736 followers.
ChilliPharm is classified under the NAICS code 51122, which corresponds to Software Publishers.
No, ChilliPharm does not have a profile on Crunchbase.
Yes, ChilliPharm maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/chillipharm.
As of December 03, 2025, Rankiteo reports that ChilliPharm has not experienced any cybersecurity incidents.
ChilliPharm has an estimated 69 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, ChilliPharm has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.
FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).
PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.
NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.
NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.