Comparison Overview

HealPay

VS

SunTrust

HealPay

203 E. Washington St., Ann Arbor, MI, 48104, US
Last Update: 2025-03-14 (UTC)
Between 800 and 900

Strong

HealPay is a leading provider of payment services software, allowing businesses to accept credit, debit, and ACH payments from their customers. Our payment solutions include SettlementApp, IVR, RentRoll Pay, Pay Portal, and PayPortal. We specialize in automated solutions for Collection Attorneys & Firms, Auto Finance Companies, Charitable and Religions Organizations, Non-Profits, Property Managers, and Family Law Firms. Ourย flagship web application, SettlementApp, innovates by analyzing data and providing individuals with flexible payment options. HealPay integrates with leading claims management software, accounting software and payment gateways, automating reports and reducing data entry. We believe making payments should be a painless process. HealPay connects businesses to clients via web-based portal or over the phone with or without a customer service agent. Our white-label solutions allow businesses to extend payment solutions to their clients. All solutions are PCI-compliant and protected and secured by our 256 bit SSL encryption process. We are located in the heart of downtown Ann Arbor: 203 E. Washington St. Suite #3 Ann Arbor, Michigan 48104 Visit us online at http://healpay.com

NAICS: 52
NAICS Definition:
Employees: 11
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

SunTrust

Last Update: 2024-07-01 (UTC)

Strong

Between 800 and 900

Weโ€™d love to stay connected with you! Please follow our Truist company page and unfollow this page which is no longer active. BB&T and SunTrust formed Truist with a shared purposeโ€”to inspire and build better lives and communities. With our combined resources, collective passion, and commitment to innovation, weโ€™re creating a better financial experience to help people and businesses achieve more. With 275 years of combined BB&T and SunTrust history, Truist serves approximately 12 million households with leading market share in many high growth markets in the country. The company offers a wide range of services including retail, small business and commercial banking; asset management; capital markets; commercial real estate; corporate and institutional banking; insurance; mortgage; payments; specialized lending; and wealth management. Headquartered in Charlotte, North Carolina, Truist is the sixth-largest commercial bank in the U.S. Truist Bank, Member FDIC. Learn more at Truist.com and see social media terms and conditions at Truist.com/SocialTerms.

NAICS: 52
NAICS Definition: Finance and Insurance
Employees: 11,872
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/healpay.jpeg
HealPay
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/suntrustnowtruist.jpeg
SunTrust
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
HealPay
100%
Compliance Rate
0/4 Standards Verified
SunTrust
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for HealPay in 2025.

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for SunTrust in 2025.

Incident History โ€” HealPay (X = Date, Y = Severity)

HealPay cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” SunTrust (X = Date, Y = Severity)

SunTrust cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/healpay.jpeg
HealPay
Incidents

No Incident

https://images.rankiteo.com/companyimages/suntrustnowtruist.jpeg
SunTrust
Incidents

Date Detected: 04/2018
Type:Data Leak
Attack Vector: Insider Threat
Motivation: Unspecified
Blog: Blog

FAQ

Both HealPay company and SunTrust company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

SunTrust company has historically faced a number of disclosed cyber incidents, whereas HealPay company has not reported any.

In the current year, SunTrust company and HealPay company have not reported any cyber incidents.

Neither SunTrust company nor HealPay company has reported experiencing a ransomware attack publicly.

Neither SunTrust company nor HealPay company has reported experiencing a data breach publicly.

Neither SunTrust company nor HealPay company has reported experiencing targeted cyberattacks publicly.

Neither HealPay company nor SunTrust company has reported experiencing or disclosing vulnerabilities publicly.

SunTrust company has more subsidiaries worldwide compared to HealPay company.

SunTrust company employs more people globally than HealPay company, reflecting its scale as a Financial Services.

Latest Global CVEs (Not Company-Specific)

Description

An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.

Description

A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X