Comparison Overview

Commerzbank AG

VS

DenizBank

Commerzbank AG

Kaiserstraße 16, Frankfurt am Main, Hessen, DE, 60311
Last Update: 2025-12-09
Between 800 and 849

Commerzbank is the leading bank for the German Mittelstand and a strong partner for around 24,000 corporate client groups. In addition, it supports private and small-business customers in Germany with more than €400 billion assets under management. The Bank’s two Business Segments – Private and Small-Business Customers and Corporate Clients – offer a comprehensive portfolio of financial services. Commerzbank transacts approximately 30% of Germany’s foreign trade and is present internationally in more than 40 countries in the corporate clients’ business. The Bank focusses on the German Mittelstand, large corporates, and institutional clients. As part of its international business, Commerzbank supports clients with a business relationship to Germany, Austria, or Switzerland and companies operating in selected future-oriented industries. In the Private and Small-Business Customers segment, the Bank is at the side of its customers with its brands Commerzbank and comdirect: online and mobile, in the advisory centre, and personally in its branches. Its Polish subsidiary mBank S.A. is an innovative digital bank that serves approximately 5.7 million private and corporate customers, predominantly in Poland, as well as in the Czech Republic and Slovakia.

NAICS: 52211
NAICS Definition: Commercial Banking
Employees: 9,623
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

DenizBank

Büyükdere Caddesi 141, Esentepe, Istanbul, TR, 34394
Last Update: 2025-12-09
Between 750 and 799

In 1997, DenizBank was acquired by the Zorlu Holding in the form of a banking license from the Privatization Administration. Undergoing three shareholder changes and done public offering in its short history, the Bank was acquired in October 2006 by Dexia, one of the leading financial groups of Europe. Later on, being subject to the biggest one-time investment made by Russia in Turkey, DenizBank started to serve under the umbrella of Sberbank, one of the biggest banks in the world, as of September 28, 2012. Finally, the Bank’s shares were transferred to Emirates NBD as of August 2019, again one of the leading institutions in its region.

NAICS: 52211
NAICS Definition: Commercial Banking
Employees: 10,943
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/commerzbank-ag.jpeg
Commerzbank AG
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/denizbank.jpeg
DenizBank
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Commerzbank AG
100%
Compliance Rate
0/4 Standards Verified
DenizBank
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Banking Industry Average (This Year)

No incidents recorded for Commerzbank AG in 2025.

Incidents vs Banking Industry Average (This Year)

No incidents recorded for DenizBank in 2025.

Incident History — Commerzbank AG (X = Date, Y = Severity)

Commerzbank AG cyber incidents detection timeline including parent company and subsidiaries

Incident History — DenizBank (X = Date, Y = Severity)

DenizBank cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/commerzbank-ag.jpeg
Commerzbank AG
Incidents

No Incident

https://images.rankiteo.com/companyimages/denizbank.jpeg
DenizBank
Incidents

No Incident

FAQ

Commerzbank AG company demonstrates a stronger AI Cybersecurity Score compared to DenizBank company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, DenizBank company has disclosed a higher number of cyber incidents compared to Commerzbank AG company.

In the current year, DenizBank company and Commerzbank AG company have not reported any cyber incidents.

Neither DenizBank company nor Commerzbank AG company has reported experiencing a ransomware attack publicly.

Neither DenizBank company nor Commerzbank AG company has reported experiencing a data breach publicly.

Neither DenizBank company nor Commerzbank AG company has reported experiencing targeted cyberattacks publicly.

Neither Commerzbank AG company nor DenizBank company has reported experiencing or disclosing vulnerabilities publicly.

Neither Commerzbank AG nor DenizBank holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Commerzbank AG company nor DenizBank company has publicly disclosed detailed information about the number of their subsidiaries.

DenizBank company employs more people globally than Commerzbank AG company, reflecting its scale as a Banking.

Neither Commerzbank AG nor DenizBank holds SOC 2 Type 1 certification.

Neither Commerzbank AG nor DenizBank holds SOC 2 Type 2 certification.

Neither Commerzbank AG nor DenizBank holds ISO 27001 certification.

Neither Commerzbank AG nor DenizBank holds PCI DSS certification.

Neither Commerzbank AG nor DenizBank holds HIPAA certification.

Neither Commerzbank AG nor DenizBank holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X