Comparison Overview

HealPay

VS

HNA Capital

HealPay

203 E. Washington St., Ann Arbor, MI, 48104, US
Last Update: 2025-03-14 (UTC)
Between 800 and 900

Strong

HealPay is a leading provider of payment services software, allowing businesses to accept credit, debit, and ACH payments from their customers. Our payment solutions include SettlementApp, IVR, RentRoll Pay, Pay Portal, and PayPortal. We specialize in automated solutions for Collection Attorneys & Firms, Auto Finance Companies, Charitable and Religions Organizations, Non-Profits, Property Managers, and Family Law Firms. Ourย flagship web application, SettlementApp, innovates by analyzing data and providing individuals with flexible payment options. HealPay integrates with leading claims management software, accounting software and payment gateways, automating reports and reducing data entry. We believe making payments should be a painless process. HealPay connects businesses to clients via web-based portal or over the phone with or without a customer service agent. Our white-label solutions allow businesses to extend payment solutions to their clients. All solutions are PCI-compliant and protected and secured by our 256 bit SSL encryption process. We are located in the heart of downtown Ann Arbor: 203 E. Washington St. Suite #3 Ann Arbor, Michigan 48104 Visit us online at http://healpay.com

NAICS: 52
NAICS Definition:
Employees: 11
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

HNA Capital

HNA Plaza 26 Xiaoyun Road, 23rd Floor Chaoyang District, Beijing, Beijing 100025, CN
Last Update: 2025-05-01 (UTC)

Strong

Between 800 and 900

As the financial industry branch of the HNA Group, a Global Fortune 500 Company, HNA Capital Group Co., Ltd. relies on the profound industrial advantages of HNA Group and conducts breakthrough innovations leading to the booming development of HNAโ€™s financial industry sector. Nowadays, HNA Capital has developed into an integrated financial company based on the traditional finance business, followed by innovative finance business and investment finance business. Giving priority to leasing, insurance, internet finance, investment banking, securities, fund, trust , futures and other business areas, its scope covers more than 30 different member companies throughout 100 cities and regions worldwide, with total assets exceeding 681 billion CNY. In the future, HNA Capital will fully take advantage of HNA Groupโ€™s industrial entities, broadening its financial services in the field of socialization, enlarging its international financial services and consolidating its position as the leading financial service and investment group, serving its customers worldwide with world class financial and investment management services.

NAICS: 52
NAICS Definition: Finance and Insurance
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/healpay.jpeg
HealPay
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/hna-capital.jpeg
HNA Capital
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
HealPay
100%
Compliance Rate
0/4 Standards Verified
HNA Capital
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for HealPay in 2025.

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for HNA Capital in 2025.

Incident History โ€” HealPay (X = Date, Y = Severity)

HealPay cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” HNA Capital (X = Date, Y = Severity)

HNA Capital cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/healpay.jpeg
HealPay
Incidents

No Incident

https://images.rankiteo.com/companyimages/hna-capital.jpeg
HNA Capital
Incidents

No Incident

FAQ

Both HealPay company and HNA Capital company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, HNA Capital company has disclosed a higher number of cyber incidents compared to HealPay company.

In the current year, HNA Capital company and HealPay company have not reported any cyber incidents.

Neither HNA Capital company nor HealPay company has reported experiencing a ransomware attack publicly.

Neither HNA Capital company nor HealPay company has reported experiencing a data breach publicly.

Neither HNA Capital company nor HealPay company has reported experiencing targeted cyberattacks publicly.

Neither HealPay company nor HNA Capital company has reported experiencing or disclosing vulnerabilities publicly.

Neither HealPay company nor HNA Capital company has publicly disclosed detailed information about the number of their subsidiaries.

HealPay company employs more people globally than HNA Capital company, reflecting its scale as a Financial Services.

Latest Global CVEs (Not Company-Specific)

Description

An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.

Description

A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X