ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

At Enterprise Mobility™ we are paving a new way forward by creating better experiences for how we move. We give people around the world the ability to connect in ways that suit their unique needs. It’s a bold idea that has defined our purpose-led, people-first organization for over 65 years, and it’s one that we continue to strive toward with every journey. Through our trusted brands and our portfolio of offerings, we aim to reach the highest levels of customer service with each interaction. And we invest in — and care about — each other, our communities and every journey. It’s a point of pride and distinction, rooted in our origins. It’s how we grew from a pioneer with a fleet of seven cars to a global mobility leader with more than 90,000 team members around the world. And it’s what will continue to drive the future of the organization and mobility itself. Over the years, we’ve learned moving forward isn’t a simple matter of going from point A to B. Today, mobility is the movement of people and goods. It goes beyond the vehicles we drive to encompass an integrated way of travel that meets every individual’s unique needs and preferences. That is why it’s our vision to be the world’s best and most trusted mobility company. As mobility continues to evolve, we'll continue to innovate to work toward a reimagined mobility future that is more accessible, efficient and sustainable for all.

Enterprise Mobility A.I CyberSecurity Scoring

Enterprise Mobility

Company Details

Linkedin ID:

enterprise-holdings-inc-

Employees number:

64,778

Number of followers:

144,975

NAICS:

5615

Industry Type:

Travel Arrangements

Homepage:

enterprisemobility.com

IP Addresses:

0

Company ID:

ENT_3331854

Scan Status:

In-progress

AI scoreEnterprise Mobility Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/enterprise-holdings-inc-.jpeg
Enterprise Mobility Travel Arrangements
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreEnterprise Mobility Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/enterprise-holdings-inc-.jpeg
Enterprise Mobility Travel Arrangements
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Enterprise Mobility Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

Enterprise Mobility Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Enterprise Mobility

Incidents vs Travel Arrangements Industry Average (This Year)

No incidents recorded for Enterprise Mobility in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Enterprise Mobility in 2025.

Incident Types Enterprise Mobility vs Travel Arrangements Industry Avg (This Year)

No incidents recorded for Enterprise Mobility in 2025.

Incident History — Enterprise Mobility (X = Date, Y = Severity)

Enterprise Mobility cyber incidents detection timeline including parent company and subsidiaries

Enterprise Mobility Company Subsidiaries

SubsidiaryImage

At Enterprise Mobility™ we are paving a new way forward by creating better experiences for how we move. We give people around the world the ability to connect in ways that suit their unique needs. It’s a bold idea that has defined our purpose-led, people-first organization for over 65 years, and it’s one that we continue to strive toward with every journey. Through our trusted brands and our portfolio of offerings, we aim to reach the highest levels of customer service with each interaction. And we invest in — and care about — each other, our communities and every journey. It’s a point of pride and distinction, rooted in our origins. It’s how we grew from a pioneer with a fleet of seven cars to a global mobility leader with more than 90,000 team members around the world. And it’s what will continue to drive the future of the organization and mobility itself. Over the years, we’ve learned moving forward isn’t a simple matter of going from point A to B. Today, mobility is the movement of people and goods. It goes beyond the vehicles we drive to encompass an integrated way of travel that meets every individual’s unique needs and preferences. That is why it’s our vision to be the world’s best and most trusted mobility company. As mobility continues to evolve, we'll continue to innovate to work toward a reimagined mobility future that is more accessible, efficient and sustainable for all.

Loading...
similarCompanies

Enterprise Mobility Similar Companies

MSC Cruises

Headquartered in Geneva, Switzerland, MSC Cruises is the world’s third largest cruise lines and the market leader in Europe, South America, the Middle East and Southern Africa, with a strong and growing presence in North America and the Far East. The MSC Cruises fleet consists of 22 modern ships wi

Royal Caribbean Group

At Royal Caribbean Group, we deliver unforgettable vacations to guests who trust us with life’s greatest moments. We build the best ships, and even better careers, all while doing the right thing. We are passionate. We are innovative. We are unstoppable. We open the world to our employees. Your jour

Hertz

Hertz is one of the world’s largest mobility companies, and through its indirect subsidiary, The Hertz Corporation, operates the Hertz, Dollar, and Thrifty vehicle rental brands throughout North America, Europe, the Caribbean, Latin America, Africa, the Middle East, Asia, Australia, and New Zealand.

Carnival Cruise Line

Since our founding in 1972, Carnival Cruise Line — "The World’s Most Popular Cruise Line®” — carries millions of passengers every year. We offer a fun and unique career destination for a wide range of professionals in Marketing, IT, Accounting/Audit, Finance, Marine Operations and Human Resources, j

DER Touristik vormals REWE Touristik GmbH

DER TOURISTIK GROUP AUF WACHSTUMSKURS Die DER Touristik Group gehört heute zu den führenden europäischen Reisekonzernen. Sie vereint unter ihrem Dach verschiedene Geschäftsfelder rund ums Thema Reisen und agiert seit 2018 strukturell als Holding mit vier Divisions. Durch den Zukauf der europäische

BCD Travel

BCD Travel helps companies travel smart and achieve more. We drive program adoption, cost savings and talent retention through digital experiences that simplify business travel. Our 15,000+ dedicated team members service clients in 170+ countries as we shape a sustainable future for business travel.

Norwegian Cruise Line Holdings Ltd.

Norwegian Cruise Line Holdings Ltd. (NYSE: NCLH) is a leading global cruise company which operates Norwegian Cruise Line, Oceania Cruises and Regent Seven Seas Cruises. With a combined fleet of 32 ships and approximately 66,500 berths, NCLH offers itineraries to approximately 700 destinations worl

CWT is a global business travel and meetings specialist, with whom companies and governments partner to keep their people connected, in traditional business locations and some of the most remote and inaccessible parts of the globe. A private company – owned through funds managed by a group of leadin

Costa Crociere S.p.A.

Costa belongs to the Carnival Corporation & plc Group, listed on the London and New York stock exchanges, the largest cruise company in the world. Costa, the only Italian cruise company flying the Italian flag, has been sailing the world’s seas for more than 75 years, offering its guests a differe

newsone

Enterprise Mobility CyberSecurity News

November 19, 2025 08:00 AM
EY US - Home | Building a better working world

Our commitment to audit quality. At EY US, we are bringing our bold vision for the future of audit to life with quality at the center,...

November 04, 2025 08:00 AM
Why unified security matters in an AI-powered threat landscape

AI-powered attacks exploit gaps between security tools. Learn why small businesses need unified cybersecurity to defend against modern...

October 30, 2025 07:00 AM
Concordia research to strengthen cybersecurity for future air mobility and critical infrastructure

Professor Kash Khorasani's project receives $2 million from the National Cybersecurity Consortium.

October 11, 2025 07:00 AM
Best Cybersecurity Company in Ahmedabad

Amid the vibrant energy of Manek Chowk and the city's growing tech landscape, Ahmedabad represents the perfect harmony of tradition and...

October 03, 2025 07:00 AM
CMC Telecom pioneers proactive cybersecurity in AI era at CIO Summit 2025

CMC Telecom introduced its proactive cybersecurity ecosystem CCSP and CCSS at CIO Summit 2025, redefining digital defense in the AI era.

September 18, 2025 07:00 AM
Fescaro, TUV Nord join forces on auto cybersecurity compliance

South Korean mobility software solutions provider Fescaro said Wednesday that it had signed a memorandum of understanding with TUV Nord,...

August 25, 2025 07:00 AM
Cybersecurity incident affecting some Maryland Transit Administration services

The Maryland Transit Administration (MTA) said some of its services are unavailable due to a cybersecurity incident.

August 25, 2025 07:00 AM
MTA: ‘Cybersecurity incident’ affecting Mobility paratransit services, real-time tracking information

A “cybersecurity incident” is affecting Mobility paratransit services scheduling systems and real-time tracking information, the Maryland...

August 25, 2025 07:00 AM
MTA cybersecurity incident affecting Mobility scheduling systems, real-time tracking

UPDATE: The MTA has provided an update and reservation link as they continue to recover from the cyberattack.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Enterprise Mobility CyberSecurity History Information

Official Website of Enterprise Mobility

The official website of Enterprise Mobility is https://www.enterprisemobility.com.

Enterprise Mobility’s AI-Generated Cybersecurity Score

According to Rankiteo, Enterprise Mobility’s AI-generated cybersecurity score is 794, reflecting their Fair security posture.

How many security badges does Enterprise Mobility’ have ?

According to Rankiteo, Enterprise Mobility currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Enterprise Mobility have SOC 2 Type 1 certification ?

According to Rankiteo, Enterprise Mobility is not certified under SOC 2 Type 1.

Does Enterprise Mobility have SOC 2 Type 2 certification ?

According to Rankiteo, Enterprise Mobility does not hold a SOC 2 Type 2 certification.

Does Enterprise Mobility comply with GDPR ?

According to Rankiteo, Enterprise Mobility is not listed as GDPR compliant.

Does Enterprise Mobility have PCI DSS certification ?

According to Rankiteo, Enterprise Mobility does not currently maintain PCI DSS compliance.

Does Enterprise Mobility comply with HIPAA ?

According to Rankiteo, Enterprise Mobility is not compliant with HIPAA regulations.

Does Enterprise Mobility have ISO 27001 certification ?

According to Rankiteo,Enterprise Mobility is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Enterprise Mobility

Enterprise Mobility operates primarily in the Travel Arrangements industry.

Number of Employees at Enterprise Mobility

Enterprise Mobility employs approximately 64,778 people worldwide.

Subsidiaries Owned by Enterprise Mobility

Enterprise Mobility presently has no subsidiaries across any sectors.

Enterprise Mobility’s LinkedIn Followers

Enterprise Mobility’s official LinkedIn profile has approximately 144,975 followers.

NAICS Classification of Enterprise Mobility

Enterprise Mobility is classified under the NAICS code 5615, which corresponds to Travel Arrangement and Reservation Services.

Enterprise Mobility’s Presence on Crunchbase

No, Enterprise Mobility does not have a profile on Crunchbase.

Enterprise Mobility’s Presence on LinkedIn

Yes, Enterprise Mobility maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/enterprise-holdings-inc-.

Cybersecurity Incidents Involving Enterprise Mobility

As of November 27, 2025, Rankiteo reports that Enterprise Mobility has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Enterprise Mobility has an estimated 4,748 peer or competitor companies worldwide.

Enterprise Mobility CyberSecurity History Information

How many cyber incidents has Enterprise Mobility faced ?

Total Incidents: According to Rankiteo, Enterprise Mobility has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Enterprise Mobility ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=enterprise-holdings-inc-' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge