Comparison Overview

HealPay

VS

BNY

HealPay

203 E. Washington St., Ann Arbor, MI, 48104, US
Last Update: 2025-03-14 (UTC)
Between 800 and 900

Strong

HealPay is a leading provider of payment services software, allowing businesses to accept credit, debit, and ACH payments from their customers. Our payment solutions include SettlementApp, IVR, RentRoll Pay, Pay Portal, and PayPortal. We specialize in automated solutions for Collection Attorneys & Firms, Auto Finance Companies, Charitable and Religions Organizations, Non-Profits, Property Managers, and Family Law Firms. Ourย flagship web application, SettlementApp, innovates by analyzing data and providing individuals with flexible payment options. HealPay integrates with leading claims management software, accounting software and payment gateways, automating reports and reducing data entry. We believe making payments should be a painless process. HealPay connects businesses to clients via web-based portal or over the phone with or without a customer service agent. Our white-label solutions allow businesses to extend payment solutions to their clients. All solutions are PCI-compliant and protected and secured by our 256 bit SSL encryption process. We are located in the heart of downtown Ann Arbor: 203 E. Washington St. Suite #3 Ann Arbor, Michigan 48104 Visit us online at http://healpay.com

NAICS: 52
NAICS Definition:
Employees: 11
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

BNY

240 Greenwich St, New York, NY, 10286, US
Last Update: 2025-05-06 (UTC)

Strong

Between 800 and 900

We help make money work for the world โ€” managing it, moving it and keeping it safe. As a leading global financial services company at the center of the worldโ€™s financial system, we touch nearly 20% of the worldโ€™s investable assets. Today we help over 90% of Fortune 100 companies and nearly all the top 100 banks globally access the money they need. For more than 240 years we have partnered alongside our clients to create solutions that benefit businesses, communities and people everywhere. Follow BNY on Instagram & X: @BNYglobal

NAICS: 52
NAICS Definition: Finance and Insurance
Employees: 55,698
Subsidiaries: 8
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/healpay.jpeg
HealPay
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/bny-mellon.jpeg
BNY
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
HealPay
100%
Compliance Rate
0/4 Standards Verified
BNY
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for HealPay in 2025.

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for BNY in 2025.

Incident History โ€” HealPay (X = Date, Y = Severity)

HealPay cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” BNY (X = Date, Y = Severity)

BNY cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/healpay.jpeg
HealPay
Incidents

No Incident

https://images.rankiteo.com/companyimages/bny-mellon.jpeg
BNY
Incidents

No Incident

FAQ

Both HealPay company and BNY company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, BNY company has disclosed a higher number of cyber incidents compared to HealPay company.

In the current year, BNY company and HealPay company have not reported any cyber incidents.

Neither BNY company nor HealPay company has reported experiencing a ransomware attack publicly.

Neither BNY company nor HealPay company has reported experiencing a data breach publicly.

Neither BNY company nor HealPay company has reported experiencing targeted cyberattacks publicly.

Neither HealPay company nor BNY company has reported experiencing or disclosing vulnerabilities publicly.

BNY company has more subsidiaries worldwide compared to HealPay company.

BNY company employs more people globally than HealPay company, reflecting its scale as a Financial Services.

Latest Global CVEs (Not Company-Specific)

Description

An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.

Description

A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X