Company Details
galytix
165
46,314
541511
galytix.com
0
GAL_3348940
In-progress


Galytix Vendor Cyber Rating & Cyber Score
galytix.comFounded in 2015 by credit and insurance experts together with world class AI engineers, GX’s financial services specialised AI Agents empower credit and risk professionals with a trusted and personalised agent delivering a step change in productivity and decision-making. Built for Financial Institutions. With Financial Institutions. GX’s Agentic AI technology built in partnership with global FIs implements multi-model approach, combining industry specific data and domain knowledge with ‘human in the loop’ oversight delivering trustworthy outcomes. Our Specialised AI Agents deliver 30 hours work in 30 minutes. GX’s AI Agents are already helping banks and insurers gain new insights into their customers, reduce costs, automate workflows and transform teams’ day-to-day work experience. To learn more about our platform, the products, and how we help fuel better decision-making visit https://www.galytix.com
Company Details
galytix
165
46,314
541511
galytix.com
0
GAL_3348940
In-progress
Between 750 and 799

Galytix Global Score (TPRM)XXXX



No incidents recorded for Galytix in 2026.
No incidents recorded for Galytix in 2026.
No incidents recorded for Galytix in 2026.
Galytix cyber incidents detection timeline including parent company and subsidiaries

Founded in 2015 by credit and insurance experts together with world class AI engineers, GX’s financial services specialised AI Agents empower credit and risk professionals with a trusted and personalised agent delivering a step change in productivity and decision-making. Built for Financial Institutions. With Financial Institutions. GX’s Agentic AI technology built in partnership with global FIs implements multi-model approach, combining industry specific data and domain knowledge with ‘human in the loop’ oversight delivering trustworthy outcomes. Our Specialised AI Agents deliver 30 hours work in 30 minutes. GX’s AI Agents are already helping banks and insurers gain new insights into their customers, reduce costs, automate workflows and transform teams’ day-to-day work experience. To learn more about our platform, the products, and how we help fuel better decision-making visit https://www.galytix.com


With over 18 combined years of experience, Mozym is a team of passionate engineers who build enterprise custom software with your business goals in mind. Whether you want to develop a straightforward mobile app or invest in a complex platform that will serve your company for years to come, Mozym can

ComstarUSA gives optimizing management solutions for its clients globally. We made it possible with a group of designers, engineers, business experts, developers, and marketing specialists in Odoo customization & integration according to your business scope. We give an extensive variety of managemen

At Neeyat.ai, we bring the future of performance testing to your fingertips by seamlessly integrating Apache Jmeter with AI-powered intelligence. Our platform is designed to: ✔️ Simplify Test Design – Automate and reduce manual efforts for faster test creation. ✔️ Enhance Analysis – Gain deep insig

Find your formula for digital success. Wasting time on manual tasks? Struggling with disconnected systems that slow you down? Have a great idea but lack the software to bring it to life? The right formula can change everything. At Formulate, we believe technology shouldn’t be hard work, it should

We specialize in digital transformation that delivers smarter internal systems, and stronger customer experiences across your organization. Today’s Marketers are dealing with a dizzying combination of platform advancements, shifting technologies, and evolving customer expectations. Marketing depar

Fractalic AI is an open-source platform that turns natural-language specs into executable, parameterized, repeatable programs—deterministic runs, transparent logic, reproducible and human-readable traces. Documents become dynamic, context-managed knowledge trees where agents work together, each in

HYBRID IT is a source provider of Professional Business Services to corporate and government clients related to Information technology, both on domestic & and international levels. Founded in 2007, and Registered in Arizona, United States, it not only provides efficient solutions to businesses in th

Most real estate companies lose time and money because their data is scattered across spreadsheets, systems, and siloed workflows. Teams spend hours re-keying numbers, fixing errors, and chasing updates instead of managing assets and growing the portfolio. Refined Data fixes this. We provide the s

Unipro is a bespoke software studio that creates custom solutions to solve the most complex digital transformation challenges, giving our clients unparalleled control and lasting commercial advantage. We're an inquisitive team driven to understand and overcome challenging issues - like tackling leg
.png)
AI cybersecurity keynote speaker, IT defense and artificial intelligence thought leader, celebrity influencer and consulting expert Scott...
Recently approved legislation in West Virginia grants the state's chief information security officer greater authority to implement...
The fall of health tech company Theranos exposed how hype can outpace reality. In cybersecurity, similar pressures are emerging as vendors...
The national Small Business Development Center is taking a program that was started in Delaware and offering it through its full 1200-center...
City leaders ultimately rejected a National Guard cybersecurity partnership as concerns mounted over data access and federal involvement.
AI attack trends reshape cybersecurity as RSAC highlights autonomous threats, agentic defense and quantum risks as enterprises build new...
Harvard is monitoring an ongoing cybersecurity threat involving individuals impersonating University information technology staff to gain...
Three-year coordinated collaboration aims to automate incident detection, response, certification, and secure updates.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Galytix is https://galytix.com/.
According to Rankiteo, Galytix’s AI-generated cybersecurity score is 752, reflecting their Fair security posture.
According to Rankiteo, Galytix currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Galytix has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Galytix is not certified under SOC 2 Type 1.
According to Rankiteo, Galytix does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Galytix is not listed as GDPR compliant.
According to Rankiteo, Galytix does not currently maintain PCI DSS compliance.
According to Rankiteo, Galytix is not compliant with HIPAA regulations.
According to Rankiteo,Galytix is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Galytix operates primarily in the IT System Custom Software Development industry.
Galytix employs approximately 165 people worldwide.
Galytix presently has no subsidiaries across any sectors.
Galytix’s official LinkedIn profile has approximately 46,314 followers.
Galytix is classified under the NAICS code 541511, which corresponds to Custom Computer Programming Services.
Yes, Galytix has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/galytix.
Yes, Galytix maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/galytix.
As of April 03, 2026, Rankiteo reports that Galytix has not experienced any cybersecurity incidents.
Galytix has an estimated 285 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Galytix has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Hirschmann EagleSDV version 05.4.01 prior to 05.4.02 contains a denial-of-service vulnerability that causes the device to crash during session establishment when using TLS 1.0 or TLS 1.1. Attackers can trigger a crash by initiating TLS connections with these protocol versions to disrupt service availability.
The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.
XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services
Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.
A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.