Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

Founded in 2015 by credit and insurance experts together with world class AI engineers, GX’s financial services specialised AI Agents empower credit and risk professionals with a trusted and personalised agent delivering a step change in productivity and decision-making.​ Built for Financial Institutions. With Financial Institutions.​ GX’s Agentic AI technology built in partnership with global FIs implements multi-model approach, combining industry specific data and domain knowledge with ‘human in the loop’ oversight delivering trustworthy outcomes.​ Our Specialised AI Agents deliver 30 hours work in 30 minutes.​ GX’s AI Agents are already helping banks and insurers gain new insights into their customers, reduce costs, automate workflows and transform teams’ day-to-day work experience.​ To learn more about our platform, the products, and how we help fuel better decision-making visit https://www.galytix.com

Galytix A.I CyberSecurity Scoring

Galytix

Company Details

Linkedin ID:

galytix

Employees number:

165

Number of followers:

46,314

NAICS:

541511

Industry Type:

IT System Custom Software Development

Homepage:

galytix.com

IP Addresses:

0

Company ID:

GAL_3348940

Scan Status:

In-progress

AI scoreGalytix Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/galytix.jpeg
Galytix IT System Custom Software Development
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreGalytix Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/galytix.jpeg
Galytix IT System Custom Software Development
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Galytix Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

Galytix Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Galytix

Incidents vs IT System Custom Software Development Industry Average (This Year)

No incidents recorded for Galytix in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Galytix in 2026.

Incident Types Galytix vs IT System Custom Software Development Industry Avg (This Year)

No incidents recorded for Galytix in 2026.

Incident History — Galytix (X = Date, Y = Severity)

Galytix cyber incidents detection timeline including parent company and subsidiaries

Galytix Company Subsidiaries

SubsidiaryImage

Founded in 2015 by credit and insurance experts together with world class AI engineers, GX’s financial services specialised AI Agents empower credit and risk professionals with a trusted and personalised agent delivering a step change in productivity and decision-making.​ Built for Financial Institutions. With Financial Institutions.​ GX’s Agentic AI technology built in partnership with global FIs implements multi-model approach, combining industry specific data and domain knowledge with ‘human in the loop’ oversight delivering trustworthy outcomes.​ Our Specialised AI Agents deliver 30 hours work in 30 minutes.​ GX’s AI Agents are already helping banks and insurers gain new insights into their customers, reduce costs, automate workflows and transform teams’ day-to-day work experience.​ To learn more about our platform, the products, and how we help fuel better decision-making visit https://www.galytix.com

Loading...
similarCompanies

Galytix Similar Companies

Mozym Software Development

With over 18 combined years of experience, Mozym is a team of passionate engineers who build enterprise custom software with your business goals in mind. Whether you want to develop a straightforward mobile app or invest in a complex platform that will serve your company for years to come, Mozym can

ComstarUSA

ComstarUSA gives optimizing management solutions for its clients globally. We made it possible with a group of designers, engineers, business experts, developers, and marketing specialists in Odoo customization & integration according to your business scope. We give an extensive variety of managemen

Neeyat AI

At Neeyat.ai, we bring the future of performance testing to your fingertips by seamlessly integrating Apache Jmeter with AI-powered intelligence. Our platform is designed to: ✔️ Simplify Test Design – Automate and reduce manual efforts for faster test creation. ✔️ Enhance Analysis – Gain deep insig

Formulate Digital

Find your formula for digital success. Wasting time on manual tasks? Struggling with disconnected systems that slow you down? Have a great idea but lack the software to bring it to life? The right formula can change everything. At Formulate, we believe technology shouldn’t be hard work, it should

BKJ Digital

We specialize in digital transformation that delivers smarter internal systems, and stronger customer experiences across your organization. Today’s Marketers are dealing with a dizzying combination of platform advancements, shifting technologies, and evolving customer expectations. Marketing depar

Fractalic AI

Fractalic AI is an open-source platform that turns natural-language specs into executable, parameterized, repeatable programs—deterministic runs, transparent logic, reproducible and human-readable traces. Documents become dynamic, context-managed knowledge trees where agents work together, each in

Hybrid IT Services, Inc

HYBRID IT is a source provider of Professional Business Services to corporate and government clients related to Information technology, both on domestic & and international levels. Founded in 2007, and Registered in Arizona, United States, it not only provides efficient solutions to businesses in th

Refined Data

Most real estate companies lose time and money because their data is scattered across spreadsheets, systems, and siloed workflows. Teams spend hours re-keying numbers, fixing errors, and chasing updates instead of managing assets and growing the portfolio. Refined Data fixes this. We provide the s

Unipro

Unipro is a bespoke software studio that creates custom solutions to solve the most complex digital transformation challenges, giving our clients unparalleled control and lasting commercial advantage. We're an inquisitive team driven to understand and overcome challenging issues - like tackling leg

newsone

Galytix CyberSecurity News

April 03, 2026 11:15 PM
How Hackers Bypass Passwords in Seconds In this video, we break down one of the oldest and most effective hacking techniques: SQL Injection (SQLi). Learn how a simple string of code can bypass authentication, steal sensitive data, and even compromise

April 03, 2026 11:11 PM
AI CYBERSECURITY KEYNOTE SPEAKER & IT FUTURIST CONSULTING EXPERT FOR EVENTS

AI cybersecurity keynote speaker, IT defense and artificial intelligence thought leader, celebrity influencer and consulting expert Scott...

April 03, 2026 10:22 PM
West Virginia gives CISO greater authority to lead statewide cyber program

Recently approved legislation in West Virginia grants the state's chief information security officer greater authority to implement...

April 03, 2026 10:14 PM
The Theranos Playbook Is Quietly Returning in Cybersecurity

The fall of health tech company Theranos exposed how hype can outpace reality. In cybersecurity, similar pressures are emerging as vendors...

April 03, 2026 09:58 PM
Small Business Cybersecurity Training Program Scales Nationwide

The national Small Business Development Center is taking a program that was started in Delaware and offering it through its full 1200-center...

April 03, 2026 09:05 PM
Seattle Weighed National Guard Cyber Help, Then Walked Away

City leaders ultimately rejected a National Guard cybersecurity partnership as concerns mounted over data access and federal involvement.

April 03, 2026 08:44 PM
AI attack trends reshape cybersecurity at RSAC 2026

AI attack trends reshape cybersecurity as RSAC highlights autonomous threats, agentic defense and quantum risks as enterprises build new...

April 03, 2026 08:13 PM
Harvard Warns of Active Cyberattack Impersonating IT Staff and Targeting Affiliates

Harvard is monitoring an ongoing cybersecurity threat involving individuals impersonating University information technology staff to gain...

April 03, 2026 08:07 PM
Enforcers project plans to strengthen European cybersecurity

Three-year coordinated collaboration aims to automate incident detection, response, certification, and secure updates.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Galytix CyberSecurity History Information

Official Website of Galytix

The official website of Galytix is https://galytix.com/.

Galytix’s AI-Generated Cybersecurity Score

According to Rankiteo, Galytix’s AI-generated cybersecurity score is 752, reflecting their Fair security posture.

How many security badges does Galytix’ have ?

According to Rankiteo, Galytix currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Galytix been affected by any supply chain cyber incidents ?

According to Rankiteo, Galytix has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Galytix have SOC 2 Type 1 certification ?

According to Rankiteo, Galytix is not certified under SOC 2 Type 1.

Does Galytix have SOC 2 Type 2 certification ?

According to Rankiteo, Galytix does not hold a SOC 2 Type 2 certification.

Does Galytix comply with GDPR ?

According to Rankiteo, Galytix is not listed as GDPR compliant.

Does Galytix have PCI DSS certification ?

According to Rankiteo, Galytix does not currently maintain PCI DSS compliance.

Does Galytix comply with HIPAA ?

According to Rankiteo, Galytix is not compliant with HIPAA regulations.

Does Galytix have ISO 27001 certification ?

According to Rankiteo,Galytix is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Galytix

Galytix operates primarily in the IT System Custom Software Development industry.

Number of Employees at Galytix

Galytix employs approximately 165 people worldwide.

Subsidiaries Owned by Galytix

Galytix presently has no subsidiaries across any sectors.

Galytix’s LinkedIn Followers

Galytix’s official LinkedIn profile has approximately 46,314 followers.

NAICS Classification of Galytix

Galytix is classified under the NAICS code 541511, which corresponds to Custom Computer Programming Services.

Galytix’s Presence on Crunchbase

Yes, Galytix has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/galytix.

Galytix’s Presence on LinkedIn

Yes, Galytix maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/galytix.

Cybersecurity Incidents Involving Galytix

As of April 03, 2026, Rankiteo reports that Galytix has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Galytix has an estimated 285 peer or competitor companies worldwide.

Galytix CyberSecurity History Information

How many cyber incidents has Galytix faced ?

Total Incidents: According to Rankiteo, Galytix has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Galytix ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Hirschmann EagleSDV version 05.4.01 prior to 05.4.02 contains a denial-of-service vulnerability that causes the device to crash during session establishment when using TLS 1.0 or TLS 1.1. Attackers can trigger a crash by initiating TLS connections with these protocol versions to disrupt service availability.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.

Description

XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services

Description

Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.

Description

A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=galytix' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge