Comparison Overview

CVM

VS

Inetum

CVM

5 Westbrook Corporate Center, Westchester, IL, 60154, US
Last Update: 2025-05-04 (UTC)
Between 800 and 900

Strong

CVM, a supplier.io company, is the premier provider of global supplier data and supplier diversity solutions. CVM delivers data, services, and technology needed to manage supplier diversity initiatives.ย CVM has partnered with more than half of the Fortune 100 and half of the Billion Dollar Roundtable members, enabling our clients to meet their supplier diversity goals.

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 111
Subsidiaries: 12
12-month incidents
0
Known data breaches
1
Attack type number
2

Inetum

Last Update: 2024-06-30 (UTC)

Strong

Between 800 and 900

Inetum is a European leader in digital services. Inetumโ€™s team of 28,000 consultants and specialists strive every day to make a digital impact for businesses, public sector entities and society. Inetumโ€™s solutions aim at contributing to its clientsโ€™ performance and innovation as well as the common good. Present in 19 countries with a dense network of sites, Inetum partners with major software publishers to meet the challenges of digital transformation with proximity and flexibility. Driven by its ambition for growth and scale, Inetum generated sales of 2.5 billion euros in 2023. ๐Ÿ… Top Employer Europe 2024

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 19,805
Subsidiaries: 12
12-month incidents
0
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/cvm-solutions.jpeg
CVM
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/inetum.jpeg
Inetum
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
CVM
100%
Compliance Rate
0/4 Standards Verified
Inetum
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for CVM in 2025.

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Inetum in 2025.

Incident History โ€” CVM (X = Date, Y = Severity)

CVM cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Inetum (X = Date, Y = Severity)

Inetum cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/cvm-solutions.jpeg
CVM
Incidents

Date Detected: 08/2023
Type:Data Leak
Attack Vector: SIM-swapping
Motivation: Data Exfiltration
Blog: Blog

Date Detected: 3/2015
Type:Breach
Blog: Blog
https://images.rankiteo.com/companyimages/inetum.jpeg
Inetum
Incidents

Date Detected: 12/2021
Type:Ransomware
Blog: Blog

FAQ

Both CVM company and Inetum company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

CVM company has faced a higher number of disclosed cyber incidents historically compared to Inetum company.

In the current year, Inetum company and CVM company have not reported any cyber incidents.

Inetum company has confirmed experiencing a ransomware attack, while CVM company has not reported such incidents publicly.

CVM company has disclosed at least one data breach, while the other Inetum company has not reported such incidents publicly.

Neither Inetum company nor CVM company has reported experiencing targeted cyberattacks publicly.

Neither CVM company nor Inetum company has reported experiencing or disclosing vulnerabilities publicly.

Both Inetum company and CVM company have a similar number of subsidiaries worldwide.

Inetum company employs more people globally than CVM company, reflecting its scale as a IT Services and IT Consulting.

Latest Global CVEs (Not Company-Specific)

Description

A security flaw has been discovered in SourceCodester Best Salon Management System 1.0. This affects an unknown part of the file /panel/add_invoice.php. Performing manipulation of the argument ServiceId results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in SourceCodester Best Salon Management System 1.0. Affected by this issue is some unknown functionality of the file /panel/edit-appointment.php. Such manipulation of the argument editid leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was found in code-projects Simple Food Ordering System 1.0. Affected is an unknown function of the file /addcategory.php. The manipulation of the argument cname results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability has been found in code-projects Simple Food Ordering System 1.0. This impacts an unknown function of the file /addproduct.php. The manipulation of the argument Category leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in SourceCodester Simple Inventory System 1.0. Impacted is an unknown function of the file /user.php. This manipulation of the argument uemail causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X