Company Details
enterprise-technology-pvt-ltd
22
1,741
51125
enterprisetl.com
0
ENT_1510075
In-progress

Enterprise Technology (Pvt) Ltd Company CyberSecurity Posture
enterprisetl.comEnterprise Technology (Pvt) Ltd. is one of premier Network Systems Integrators in Sri Lanka with over ten years experience in providing innovative business-critical Information Communication Technology (ICT) solutions for major Sri Lankan corporations and institutions. We specializing in Next-Generation Network Solutions, IP Telephony/Unified Communications Technology, Wireless Networks, Information Security Solutions, Optical Fiber and Satellite Communication, Data Centers/Disaster Recovery Systems and Contact Centers. Among our clients are Internet Service Providers, Network Operators, Financial Institutions, Manufacturers and Universities.
Company Details
enterprise-technology-pvt-ltd
22
1,741
51125
enterprisetl.com
0
ENT_1510075
In-progress
Between 750 and 799

ETL Global Score (TPRM)XXXX



No incidents recorded for Enterprise Technology (Pvt) Ltd in 2025.
No incidents recorded for Enterprise Technology (Pvt) Ltd in 2025.
No incidents recorded for Enterprise Technology (Pvt) Ltd in 2025.
ETL cyber incidents detection timeline including parent company and subsidiaries

Enterprise Technology (Pvt) Ltd. is one of premier Network Systems Integrators in Sri Lanka with over ten years experience in providing innovative business-critical Information Communication Technology (ICT) solutions for major Sri Lankan corporations and institutions. We specializing in Next-Generation Network Solutions, IP Telephony/Unified Communications Technology, Wireless Networks, Information Security Solutions, Optical Fiber and Satellite Communication, Data Centers/Disaster Recovery Systems and Contact Centers. Among our clients are Internet Service Providers, Network Operators, Financial Institutions, Manufacturers and Universities.


Computer Network Service and IT Support. We provide dependable, and cost-effective outsourced IT help for small business. We serve clients in the greater Los Angeles area and beyond. With our Security Blanket Service Contracts and Maintenance Care packages, Dependable SafeSTOR backup solutions,
Communication, not computation, is now the main system level bottleneck in large-scale computing and A.I. applications. Quintessent is developing optical interconnect technology that can be integrated with compute chips to enable massively accelerated and power efficient communication across any dis

BIT Mining (NYSE: BTCM) is a leading technology-driven cryptocurrency mining company, with a long-term strategy to create value across the cryptocurrency industry. Its business covers cryptocurrency mining, mining pool, and data center operation. The Company owns the world's top blockchain browser B

New Frequency Inc. specializes in the development and commercialization of innovative, cost effective data-enabled wireless technologies or Telemetry to address real business needs. Telemetry is the automatic measurement and transmission of data by wire, radio, or other means from remote sources to

Tymor Technologies Inc. was formed in 1990 and has developed into a world-class technology services company with core strengths in diverse industries. We develop the robust, adaptable infrastructures that help companies respond quickly to opportunity, ensure the security of systems and data, and max

Started in 1991, NETiMAGE provides innovative, forward-thinking computer networking solutions and offers businesses and organizations a wide range of data and voice technology, consulting, and managed IT services. NETiMAGE follows emerging market trends and adopts the trends that offer the most cos
.png)
DC Infotech stock surges after partnering with Sangfor Technologies to distribute advanced cybersecurity and cloud solutions across the...
The global cybersecurity market size is projected to grow from $218.98 billion in 2025 to $562.77 billion by 2032, at a CAGR of 14.4% during...
PRNewswire/ -- Mindsprint, a technology firm offering purpose-built, AI-led solutions to modernize enterprise operations, has announced the...
New Delhi [India], October 13: The GV Kumar Group, a global technology organization with over 25 years of leadership in Telecom technologies...
These companies block online threats, assess industry vulnerabilities and increase education and awareness about cybersecurity.
Adani Enterprises has incorporated a new wholly owned subsidiary, Adani Cybersecurity Services Limited (ACSL), with an initial capital of Rs...
Technology has evolved from a business enabler to a critical driver of accelerating sustainable and inclusive growth. In the past, organizations often...
Deloitte uniquely understands your business and cybersecurity challenges and opportunities. Our powerful solutions simplify complexity,...
Larger attack surfaces, limited oversight of data use, AI-driven attacks and vulnerable enterprise technologies are among the security risks faced in remote...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Enterprise Technology (Pvt) Ltd is http://www.enterprisetl.com.
According to Rankiteo, Enterprise Technology (Pvt) Ltd’s AI-generated cybersecurity score is 750, reflecting their Fair security posture.
According to Rankiteo, Enterprise Technology (Pvt) Ltd currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Enterprise Technology (Pvt) Ltd is not certified under SOC 2 Type 1.
According to Rankiteo, Enterprise Technology (Pvt) Ltd does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Enterprise Technology (Pvt) Ltd is not listed as GDPR compliant.
According to Rankiteo, Enterprise Technology (Pvt) Ltd does not currently maintain PCI DSS compliance.
According to Rankiteo, Enterprise Technology (Pvt) Ltd is not compliant with HIPAA regulations.
According to Rankiteo,Enterprise Technology (Pvt) Ltd is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Enterprise Technology (Pvt) Ltd operates primarily in the Computer Networking Products industry.
Enterprise Technology (Pvt) Ltd employs approximately 22 people worldwide.
Enterprise Technology (Pvt) Ltd presently has no subsidiaries across any sectors.
Enterprise Technology (Pvt) Ltd’s official LinkedIn profile has approximately 1,741 followers.
Enterprise Technology (Pvt) Ltd is classified under the NAICS code 51125, which corresponds to Software Publishers.
No, Enterprise Technology (Pvt) Ltd does not have a profile on Crunchbase.
Yes, Enterprise Technology (Pvt) Ltd maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/enterprise-technology-pvt-ltd.
As of November 28, 2025, Rankiteo reports that Enterprise Technology (Pvt) Ltd has not experienced any cybersecurity incidents.
Enterprise Technology (Pvt) Ltd has an estimated 949 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Enterprise Technology (Pvt) Ltd has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.