Comparison Overview

Dataflexnet

VS

KPMG Africa

Dataflexnet

Priestly Court, Stafford, undefined, ST18 0LQ, GB
Last Update: 2025-03-05 (UTC)
Between 800 and 900

Strong

Dataflexnet is a commercial payments Fintech. Our clients, typically banks or schemes, see us as a centre of innovation, a technology provider, or financial processor, with the benefit they can focus on day to day business activities. Our clients are Mastercard, Diners Club International, Discover, along with an array of banks and card issuers across the world, and collaborate with the major travel management companies for corporate travel including Egencia (Expedia!) and Carson-Wagonlit.

NAICS: 52
NAICS Definition: Finance and Insurance
Employees: 17
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

KPMG Africa

85 Empire Rd Johannesburg, Gauteng 2193, ZA
Last Update: 2025-03-15 (UTC)

Strong

Between 800 and 900

Through helping other organizations mitigate risks and grasp opportunities, we can drive positive, sustainable change for clients, our people and society at large. KPMG member firms operate in 147 countries, collectively employing more than 219,000 people, serving the needs of business, governments, public-sector agencies, not-for-profits and through member firms' audit and assurance practices, the capital markets. KPMG is committed to quality and service excellence in all that we do, bringing our best to clients and earning the public's trust through our actions and behaviours both professionally and personally. We lead with a commitment to quality and consistency across our global network, bringing a passion for client success and a purpose to serve and improve the communities in which member firms operate. In a world where rapid change and unprecedented disruption are the new normal, we inspire confidence and empower change in all we do. No two African markets are the same and it is key to capture the business opportunities available while mitigating the risks. KPMG is the authoritative voice in Africa - unmatched in our ability to provide excellent service to our global, regional and local clients. KPMG in Africa's footprint ensures our forward-thinking, skilled professionals understand the complexities of doing business on this continent. Our deep expertise on Africaโ€šร„รดs contrasts and opportunities and long-standing relationships, means we can deliver informed perspectives, local knowledge and clear, value-adding solutions. KPMG in Africa's footprint is well established, with 30 member firms servicing 54 countries, allowing our member firms across the continent to work together to provide globally minded, forward-thinking solutions that are informed by deep-seated local expertise in each country.

NAICS: 52
NAICS Definition:
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/dataflexnetltd.jpeg
Dataflexnet
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/kpmg-africa.jpeg
KPMG Africa
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Dataflexnet
100%
Compliance Rate
0/4 Standards Verified
KPMG Africa
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for Dataflexnet in 2025.

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for KPMG Africa in 2025.

Incident History โ€” Dataflexnet (X = Date, Y = Severity)

Dataflexnet cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” KPMG Africa (X = Date, Y = Severity)

KPMG Africa cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/dataflexnetltd.jpeg
Dataflexnet
Incidents

No Incident

https://images.rankiteo.com/companyimages/kpmg-africa.jpeg
KPMG Africa
Incidents

No Incident

FAQ

Both Dataflexnet company and KPMG Africa company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, KPMG Africa company has disclosed a higher number of cyber incidents compared to Dataflexnet company.

In the current year, KPMG Africa company and Dataflexnet company have not reported any cyber incidents.

Neither KPMG Africa company nor Dataflexnet company has reported experiencing a ransomware attack publicly.

Neither KPMG Africa company nor Dataflexnet company has reported experiencing a data breach publicly.

Neither KPMG Africa company nor Dataflexnet company has reported experiencing targeted cyberattacks publicly.

Neither Dataflexnet company nor KPMG Africa company has reported experiencing or disclosing vulnerabilities publicly.

Neither Dataflexnet company nor KPMG Africa company has publicly disclosed detailed information about the number of their subsidiaries.

Dataflexnet company employs more people globally than KPMG Africa company, reflecting its scale as a Financial Services.

Latest Global CVEs (Not Company-Specific)

Description

An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.

Description

A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X