Comparison Overview

eClinicalWorks

VS

Just Eat Takeaway.com

eClinicalWorks

2 Technology Drive, Westborough, MA, 01581, US
Last Update: 2025-05-06 (UTC)

Strong

eClinicalWorks is a privately held leader in healthcare IT, providing comprehensive Electronic Health Record (EHR) and Practice Management (PM) solutions used by more than 850,000 medical professionals in more than 20 countries. We develop innovative, customizable tools for documentation, Population Health, Patient Engagement, and Revenue Cycle Management. Through leading-edge technology and putting the needs of clients first, we help medical professionals improve the quality of care, reduce costs, and meet regulatory requirements.

NAICS: 5112
NAICS Definition: Software Publishers
Employees: 5,049
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Just Eat Takeaway.com

Piet Heinkade 61, Amsterdam, North Holland, 1019 GM, NL
Last Update: 2025-03-04 (UTC)

Strong

Just Eat Take​away​.com is a lead­ing glob­al online deliv­ery mar­ket­place, con­nect­ing con­sumers and restau­rants through our plat­form in 17 coun­tries. Like a dinner table, working at JET brings our office employees and couriers together. From coding to customer service to couriers, JET is a fun, fast-paced and supportive place where you can be yourself. No day is the same. Our days are filled with new experiences. We see every challenge that comes our way as a chance to grow, both the business, and ourselves. We’re connected to millions of food-lovers, hundreds of thousands of connected partners and some of the best-known brands of the planet. When you take your seat here, you’ll find that a simple scribble on a napkin can turn into something seen by millions. Together we transform, create, reinvent and empower every food moment. As a leading online food tech company, JET brings together the stability of a global business, with the agility of a start-up. We got here by always staying one step ahead of the competition. So load up your plate with ideas that get you excited, because at JET everything is on the table. https://careers.justeattakeaway.com

NAICS: 5112
NAICS Definition: Software Publishers
Employees: 12,476
Subsidiaries: 11
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/eclinicalworks.jpeg
eClinicalWorks
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/just-eat-group.jpeg
Just Eat Takeaway.com
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
Compliance Summary
eClinicalWorks
100%
Compliance Rate
0/4 Standards Verified
Just Eat Takeaway.com
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for eClinicalWorks in 2025.

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for Just Eat Takeaway.com in 2025.

Incident History — eClinicalWorks (X = Date, Y = Severity)

eClinicalWorks cyber incidents detection timeline including parent company and subsidiaries

Incident History — Just Eat Takeaway.com (X = Date, Y = Severity)

Just Eat Takeaway.com cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/eclinicalworks.jpeg
eClinicalWorks
Incidents

No Incident

https://images.rankiteo.com/companyimages/just-eat-group.jpeg
Just Eat Takeaway.com
Incidents

No Incident

FAQ

Both eClinicalWorks company and Just Eat Takeaway.com company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Just Eat Takeaway.com company has disclosed a higher number of cyber incidents compared to eClinicalWorks company.

In the current year, Just Eat Takeaway.com company and eClinicalWorks company have not reported any cyber incidents.

Neither Just Eat Takeaway.com company nor eClinicalWorks company has reported experiencing a ransomware attack publicly.

Neither Just Eat Takeaway.com company nor eClinicalWorks company has reported experiencing a data breach publicly.

Neither Just Eat Takeaway.com company nor eClinicalWorks company has reported experiencing targeted cyberattacks publicly.

Neither eClinicalWorks company nor Just Eat Takeaway.com company has reported experiencing or disclosing vulnerabilities publicly.

Just Eat Takeaway.com company has more subsidiaries worldwide compared to eClinicalWorks company.

Just Eat Takeaway.com company employs more people globally than eClinicalWorks company, reflecting its scale as a Software Development.

Latest Global CVEs (Not Company-Specific)

Description

Formbricks is an open source qualtrics alternative. Prior to version 4.0.1, Formbricks is missing JWT signature verification. This vulnerability stems from a token validation routine that only decodes JWTs (jwt.decode) without verifying their signatures. Both the email verification token login path and the password reset server action use the same validator, which does not check the token’s signature, expiration, issuer, or audience. If an attacker learns the victim’s actual user.id, they can craft an arbitrary JWT with an alg: "none" header and use it to authenticate and reset the victim’s password. This issue has been patched in version 4.0.1.

Risk Information
cvss3
Base: 9.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Description

Apollo Studio Embeddable Explorer & Embeddable Sandbox are website embeddable software solutions from Apollo GraphQL. Prior to Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3, a cross-site request forgery (CSRF) vulnerability was identified. The vulnerability arises from missing origin validation in the client-side code that handles window.postMessage events. A malicious website can send forged messages to the embedding page, causing the victim’s browser to execute arbitrary GraphQL queries or mutations against their GraphQL server while authenticated with the victim’s cookies. This issue has been patched in Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3.

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N
Description

A security vulnerability has been detected in Portabilis i-Educar up to 2.10. Affected by this vulnerability is an unknown functionality of the file /consulta-dispensas. Such manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in Portabilis i-Educar up to 2.10. Affected is an unknown function of the file /module/Api/aluno. This manipulation of the argument aluno_id causes improper authorization. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tencent WeKnora 0.1.0. This impacts the function testEmbeddingModel of the file /api/v1/initialization/embedding/test. The manipulation of the argument baseUrl results in server-side request forgery. The attack can be launched remotely. The exploit has been released to the public and may be exploited. It is advisable to upgrade the affected component. The vendor responds: "We have confirmed that the issue mentioned in the report does not exist in the latest releases".

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X