Comparison Overview

Gallagher

VS

Intact

Gallagher

2850 Golf Road, None, Rolling Meadows, IL, US, 60008
Last Update: 2025-12-09

Gallagher, a global insurance brokerage, risk management, and consulting firm, serves communities around the globe, helping clients address risk, protecting assets, and recovering from losses. The products and services we provide keep businesses and institutions running, and enable individuals and families to face their future with confidence. Gallagher provides retail and wholesale property and casualty brokerage, alternative risk transfer services, employee benefit consulting, and actuarial services. Gallagher also offers claims and information management, risk control consulting and appraisal services, human resource consulting, and retirement services. Follow us on social: Instagram: http://instagram.com/gallagherglobal Facebook: http://www.facebook.com/GallagherGlobal Twitter: https://twitter.com/GallagherGlobal YouTube: https://www.youtube.com/GallagherGlobal

NAICS: 524
NAICS Definition: Insurance Carriers and Related Activities
Employees: 43,519
Subsidiaries: 22
12-month incidents
0
Known data breaches
5
Attack type number
1

Intact

700 University Avenue, Toronto, Ontario, CA, M5G 0A1
Last Update: 2025-12-09

We created a purpose-driven company based on Values and a belief that insurance is about people, not things. This is the foundation on which we have built Intact and it lives every day through our purpose, Values, what we aim to achieve and how. ___ Nous sommes là pour aider les gens, les entreprises et la société à aller de l’avant dans les bons moments et à être résilients dans le moments difficiles. Notre entreprise est basée sur des valeurs et la conviction que l’assurance doit d’abord s’intéresser aux personnes, et non aux choses. C’est dans cette optique que nous avons bâti Intact et ça se reflète chaque jour dans notre raison d’être, nos valeurs, nos facteurs de succès en leadership, notre promesse aux employés, nos objectifs et notre stratégie.

NAICS: 524
NAICS Definition: Insurance Carriers and Related Activities
Employees: 20,361
Subsidiaries: 6
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/gallagher-global.jpeg
Gallagher
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/intact.jpeg
Intact
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Gallagher
100%
Compliance Rate
0/4 Standards Verified
Intact
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Insurance Industry Average (This Year)

No incidents recorded for Gallagher in 2025.

Incidents vs Insurance Industry Average (This Year)

No incidents recorded for Intact in 2025.

Incident History — Gallagher (X = Date, Y = Severity)

Gallagher cyber incidents detection timeline including parent company and subsidiaries

Incident History — Intact (X = Date, Y = Severity)

Intact cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/gallagher-global.jpeg
Gallagher
Incidents

Date Detected: 07/2022
Type:Breach
Attack Vector: Ransomware
Blog: Blog

Date Detected: 7/2020
Type:Breach
Attack Vector: Unauthorized Access
Blog: Blog

Date Detected: 6/2020
Type:Breach
Attack Vector: Hacking
Blog: Blog
https://images.rankiteo.com/companyimages/intact.jpeg
Intact
Incidents

No Incident

FAQ

Intact company demonstrates a stronger AI Cybersecurity Score compared to Gallagher company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Gallagher company has historically faced a number of disclosed cyber incidents, whereas Intact company has not reported any.

In the current year, Intact company and Gallagher company have not reported any cyber incidents.

Neither Intact company nor Gallagher company has reported experiencing a ransomware attack publicly.

Gallagher company has disclosed at least one data breach, while the other Intact company has not reported such incidents publicly.

Neither Intact company nor Gallagher company has reported experiencing targeted cyberattacks publicly.

Neither Gallagher company nor Intact company has reported experiencing or disclosing vulnerabilities publicly.

Neither Gallagher nor Intact holds any compliance certifications.

Neither company holds any compliance certifications.

Gallagher company has more subsidiaries worldwide compared to Intact company.

Gallagher company employs more people globally than Intact company, reflecting its scale as a Insurance.

Neither Gallagher nor Intact holds SOC 2 Type 1 certification.

Neither Gallagher nor Intact holds SOC 2 Type 2 certification.

Neither Gallagher nor Intact holds ISO 27001 certification.

Neither Gallagher nor Intact holds PCI DSS certification.

Neither Gallagher nor Intact holds HIPAA certification.

Neither Gallagher nor Intact holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X