Comparison Overview

Granger Construction

VS

[UNEC] United Engineering Construction

Granger Construction

6267 Aurelius Rd, Lansing, Michigan, undefined, US
Last Update: 2025-05-06 (UTC)

Since its founding as a family-owned company in 1959, Granger Construction has fostered an atmosphere of integrity, inclusiveness and ingenuity. Granger has been ranked among the top workplaces in Michigan, and places the utmost value on relationships and community. By applying the Golden Rule in our interactions with clients and employees, Granger’s workplace culture – whether in the office or on the jobsite – advances and strengthens our most valuable asset – our people. At Granger Construction, we strive to truly understand our customers’ vision and aspirations. We listen intently, collaborate closely, and consistently build results that make a positive impact on the communities they serve. Our experience across multiple market segments – from healthcare and industrial to education and government – brings to our customers a deep and broad range of expertise. This informed approach together with our guidance makes a significant difference in the ultimate success of any building endeavor.

NAICS: 23
NAICS Definition: Construction
Employees: 317
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

[UNEC] United Engineering Construction

Al Barsha South Rd Arjan, Dubai Land. Karm Square Dubai, AE
Last Update: 2025-03-14 (UTC)
Between 750 and 799

[UNEC] is a multi-award-winning construction company with more than 40 years of expertise in the region. Our vast experience, forward-thinking innovations and commitment to the highest standards in professionalism, safety and efficiency have made us a trusted partner to the developers of some of the area’s most iconic buildings and landmarks. [UNEC] has been a trusted, hard-working partner at the side of real estate developers in the region for over 40 years, collaborating on iconic, world-class projects across the UAE and gulf region. Our role is to successfully deliver the client’s vision into reality using our history of experience, vast resources and dedicated team members. We attribute our accomplishments to decades of commitment to our clients, and a deep understanding of their interests and goals; providing real value in building tomorrows skylines, today. This is our passion and the foundation of a hard-earned reputation. It is and will remain at the heart of who we are as a company, as we continue to evolve with new strategies and technical mastery, maintaining our position at the forefront of our industry. Together, we’re building a legacy of excellence for years to come. OUR MISSION To Serve the Region with Reliable, High-Quality Construction Through Innovative Machinery, Professional Manpower and the Accomplished Mastery that Comes with Experience. OUR VISION A Strong and Trusted Partner – Building a Lasting Legacy for Our Employees, Our Clients and Our Nation. OUR NAME SPELLS OUR VALUES [UNITED] IN APPROACH We build relationships that last. That is because our interests are always aligned with yours. From the word ‘go’, we consider ourselves as part of your team and every decision is made with your deadline and goals in mind, culminating in successful outcomes. What is more, our commitment continues even after delivery. It is a unity of purpose shared by everyone at [UNEC], where experts from multiple fields come together as one. We bring combined experience and expertise to every job, each team member taking pride in their contribution to our collective strength to continue shaping the legacy of tomorrow. [ENGINEERING] SOLUTIONS Engineering is in our DNA and it influences the way we solve every problem. We cherish the challenges that come with complex projects because they lead to solutions that create the outstanding. [CONSTRUCTION] DONE WELL Expertise comes from a strong desire to learn. We are always acquiring and applying new knowledge in order to improve safety and efficiency while reducing our impact on the natural environment. When you team up with [UNEC], you get quality workmanship at excellent value executed in a responsible and sustainable way. [COMPANY] UNLIMITED We are a forward-looking company that gets excited about the future. As technology and techniques evolve, we are always there at the cusp of change to ensure projects are executed in the most modern and efficient way. Innovation inspires us, and it is a hallmark of our work.

NAICS: 23
NAICS Definition:
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/granger-construction.jpeg
Granger Construction
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/united-engineering-construction.jpeg
[UNEC] United Engineering Construction
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Granger Construction
100%
Compliance Rate
0/4 Standards Verified
[UNEC] United Engineering Construction
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Construction Industry Average (This Year)

No incidents recorded for Granger Construction in 2025.

Incidents vs Construction Industry Average (This Year)

No incidents recorded for [UNEC] United Engineering Construction in 2025.

Incident History — Granger Construction (X = Date, Y = Severity)

Granger Construction cyber incidents detection timeline including parent company and subsidiaries

Incident History — [UNEC] United Engineering Construction (X = Date, Y = Severity)

[UNEC] United Engineering Construction cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/granger-construction.jpeg
Granger Construction
Incidents

No Incident

https://images.rankiteo.com/companyimages/united-engineering-construction.jpeg
[UNEC] United Engineering Construction
Incidents

No Incident

FAQ

[UNEC] United Engineering Construction company demonstrates a stronger AI Cybersecurity Score compared to Granger Construction company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, [UNEC] United Engineering Construction company has disclosed a higher number of cyber incidents compared to Granger Construction company.

In the current year, [UNEC] United Engineering Construction company and Granger Construction company have not reported any cyber incidents.

Neither [UNEC] United Engineering Construction company nor Granger Construction company has reported experiencing a ransomware attack publicly.

Neither [UNEC] United Engineering Construction company nor Granger Construction company has reported experiencing a data breach publicly.

Neither [UNEC] United Engineering Construction company nor Granger Construction company has reported experiencing targeted cyberattacks publicly.

Neither Granger Construction company nor [UNEC] United Engineering Construction company has reported experiencing or disclosing vulnerabilities publicly.

Neither Granger Construction nor [UNEC] United Engineering Construction holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Granger Construction company nor [UNEC] United Engineering Construction company has publicly disclosed detailed information about the number of their subsidiaries.

Granger Construction company employs more people globally than [UNEC] United Engineering Construction company, reflecting its scale as a Construction.

Neither Granger Construction nor [UNEC] United Engineering Construction holds SOC 2 Type 1 certification.

Neither Granger Construction nor [UNEC] United Engineering Construction holds SOC 2 Type 2 certification.

Neither Granger Construction nor [UNEC] United Engineering Construction holds ISO 27001 certification.

Neither Granger Construction nor [UNEC] United Engineering Construction holds PCI DSS certification.

Neither Granger Construction nor [UNEC] United Engineering Construction holds HIPAA certification.

Neither Granger Construction nor [UNEC] United Engineering Construction holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Deck Mate 1 executes firmware directly from an external EEPROM without verifying authenticity or integrity. An attacker with physical access can replace or reflash the EEPROM to run arbitrary code that persists across reboots. Because this design predates modern secure-boot or signed-update mechanisms, affected systems should be physically protected or retired from service. The vendor has not indicated that firmware updates are available for this legacy model.

Risk Information
cvss4
Base: 7.0
Severity: LOW
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Deck Mate 2 lacks a verified secure-boot chain and runtime integrity validation for its controller and display modules. Without cryptographic boot verification, an attacker with physical access can modify or replace the bootloader, kernel, or filesystem and gain persistent code execution on reboot. This weakness allows long-term firmware tampering that survives power cycles. The vendor indicates that more recent firmware updates strengthen update-chain integrity and disable physical update ports to mitigate related attack avenues.

Risk Information
cvss4
Base: 7.0
Severity: LOW
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Deck Mate 2's firmware update mechanism accepts packages without cryptographic signature verification, encrypts them with a single hard-coded AES key shared across devices, and uses a truncated HMAC for integrity validation. Attackers with access to the update interface - typically via the unit's USB update port - can craft or modify firmware packages to execute arbitrary code as root, allowing persistent compromise of the device's integrity and deck randomization process. Physical or on-premises access remains the most likely attack path, though network-exposed or telemetry-enabled deployments could theoretically allow remote exploitation if misconfigured. The vendor confirmed that firmware updates have been issued to correct these update-chain weaknesses and that USB update access has been disabled on affected units.

Risk Information
cvss4
Base: 7.0
Severity: LOW
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS bc-fips on All (API modules), Legion of the Bouncy Castle Inc. Bouncy Castle for Java LTS bcprov-lts8on on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCFB.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeGCM.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/SHA256NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeEngine.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCBC.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCTR.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCFB.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeGCM.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeEngine.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCBC.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeGCMSIV.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCCM.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCTR.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA256NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA224NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA3NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHAKENativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA512NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA384NativeDigest.Java. This issue affects Bouncy Castle for Java FIPS: from 2.1.0 through 2.1.1; Bouncy Castle for Java LTS: from 2.73.0 through 2.73.7.

Risk Information
cvss4
Base: 5.9
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:N/R:U/V:C/RE:M/U:Amber
Description

Wasmtime is a runtime for WebAssembly. In versions from 38.0.0 to before 38.0.3, the implementation of component-model related host-to-wasm trampolines in Wasmtime contained a bug where it's possible to carefully craft a component, which when called in a specific way, would crash the host with a segfault or assert failure. Wasmtime 38.0.3 has been released and is patched to fix this issue. There are no workarounds.

Risk Information
cvss4
Base: 2.1
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X