Company Details
enedis
21,476
163,052
22
enedis.fr
0
ENE_2921647
In-progress

Enedis Company CyberSecurity Posture
enedis.frEnedis est le gestionnaire du réseau public de distribution d’électricité sur 95 % du territoire français continental. Ses 38 859 collaborateurs assurent chaque jour l’exploitation, l’entretien et le développement de près de 1,3 million de kilomètres de réseau. Raccordement, mise en service, dépannage, changement de fournisseur... Autant d’opérations assurées quotidiennement par Enedis. En tant que gestionnaire du réseau public de distribution d’électricité, Enedis réalise chaque année de nombreuses interventions : plus de 11 millions en 2014. La nature des prestations diffère selon les clients : clients finaux, fournisseurs ou producteurs d’électricité.
Company Details
enedis
21,476
163,052
22
enedis.fr
0
ENE_2921647
In-progress
Between 750 and 799

Enedis Global Score (TPRM)XXXX



No incidents recorded for Enedis in 2025.
No incidents recorded for Enedis in 2025.
No incidents recorded for Enedis in 2025.
Enedis cyber incidents detection timeline including parent company and subsidiaries

Enedis est le gestionnaire du réseau public de distribution d’électricité sur 95 % du territoire français continental. Ses 38 859 collaborateurs assurent chaque jour l’exploitation, l’entretien et le développement de près de 1,3 million de kilomètres de réseau. Raccordement, mise en service, dépannage, changement de fournisseur... Autant d’opérations assurées quotidiennement par Enedis. En tant que gestionnaire du réseau public de distribution d’électricité, Enedis réalise chaque année de nombreuses interventions : plus de 11 millions en 2014. La nature des prestations diffère selon les clients : clients finaux, fournisseurs ou producteurs d’électricité.

RWE is leading the way to a green energy world. With its investment and growth strategy Growing Green, RWE is contributing significantly to the success of the energy transition and the decarbonisation of the energy system. Around 20,000 employees work for the company in almost 30 countries worldwide
NTPC Limited is India’s largest power generation utility with roots planted way back in 1975 to accelerate power development in India. Since then it has established itself as the dominant power major with a presence in the entire value chain of the power generation business. From fossil fuels, it ha

Indonesia State Electricity Corporation PLN has a long history in electricity industry of Indonesia. As the sole provider of electricity in Indonesia, PLN is striving to increase quality of services to all Indonesian. In 1972, in accordance with Government Regulation No.17, the State-owned Electric
ACCIONA champions a different way of doing business: Business as Unusual, delivering benefits far beyond the corporate realm. Driven by the ambition to leave a positive legacy for society and design a better planet, we lead in developing solutions in renewable energy, sustainable water management,

The Government of West Bengal has restructured the erstwhile WBSEB into two successor entities, namely West Bengal State Electricity Distribution Company Limited (WBSEDCL) and West Bengal State Electricity Transmission Company Limited (WBSETCL), under the ownership of the State Government. The two C
Duke Energy, a Fortune 150 company headquartered in Charlotte, N.C., is one of America’s largest energy holding companies. The company’s electric utilities serve 8.4 million customers in North Carolina, South Carolina, Florida, Indiana, Ohio and Kentucky, and collectively own 54,800 megawatts of ene

Tata Power is one of India’s largest integrated power companies and together with its subsidiaries and jointly controlled entities, has an installed/managed capacity of 14,294 MW. The Company has a presence across the entire power value chain - generation of renewable as well as conventional power i

Dominion Energy (NYSE: D), headquartered in Richmond, Va., provides regulated electricity service to 3.6 million homes and businesses in Virginia, North Carolina, and South Carolina, and regulated natural gas service to 500,000 customers in South Carolina. The company is one of the nation’s leading

Company profile Eskom Holdings generates, transports and distributes approximately 95% of South Africa’s electricity – making up 60% of the total electricity consumed on the African continent. Eskom is the world’s eleventh-largest power utility in terms of generating capacity, ranks ninth in term
.png)
Our electric infrastructure is aging; our current grid was built to support a one-way flow (from centralized generation to consumers) and is being pushed...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Enedis is https://www.enedis.fr/.
According to Rankiteo, Enedis’s AI-generated cybersecurity score is 782, reflecting their Fair security posture.
According to Rankiteo, Enedis currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Enedis is not certified under SOC 2 Type 1.
According to Rankiteo, Enedis does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Enedis is not listed as GDPR compliant.
According to Rankiteo, Enedis does not currently maintain PCI DSS compliance.
According to Rankiteo, Enedis is not compliant with HIPAA regulations.
According to Rankiteo,Enedis is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Enedis operates primarily in the Utilities industry.
Enedis employs approximately 21,476 people worldwide.
Enedis presently has no subsidiaries across any sectors.
Enedis’s official LinkedIn profile has approximately 163,052 followers.
Enedis is classified under the NAICS code 22, which corresponds to Utilities.
No, Enedis does not have a profile on Crunchbase.
Yes, Enedis maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/enedis.
As of December 19, 2025, Rankiteo reports that Enedis has not experienced any cybersecurity incidents.
Enedis has an estimated 4,200 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Enedis has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Improper Authorization (CWE-285) in Kibana can lead to privilege escalation (CAPEC-233) by allowing an authenticated user to bypass intended permission restrictions via a crafted HTTP request. This allows an attacker who lacks the live queries - read permission to successfully retrieve the list of live queries.
Weblate is a web based localization tool. In versions prior to 5.15.1, it was possible to overwrite Git configuration remotely and override some of its behavior. Version 5.15.1 fixes the issue.
Allocation of Resources Without Limits or Throttling (CWE-770) in Elasticsearch can allow an authenticated user with snapshot restore privileges to cause Excessive Allocation (CAPEC-130) of memory and a denial of service (DoS) via crafted HTTP request.
Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana can allow a low-privileged authenticated user to cause Excessive Allocation (CAPEC-130) of computing resources and a denial of service (DoS) of the Kibana process via a crafted HTTP request.
Improper neutralization of input during web page generation ('Cross-site Scripting') (CWE-79) allows an unauthenticated user to embed a malicious script in content that will be served to web browsers causing cross-site scripting (XSS) (CAPEC-63) via a vulnerability a function handler in the Vega AST evaluator.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.