Comparison Overview

ICONICS

VS

Siemens Digital Industries Software

ICONICS

2 Hampshire St, Foxborough (Foxboro), Massachusetts, 02035, US
Last Update: 2025-12-25
Between 750 and 799

Founded in 1986, ICONICS is an award-winning global software provider offering real-time visualization, HMI/SCADA, energy management, fault detection, manufacturing intelligence, IoT, and a suite of analytics solutions for building automation and operational excellence. ICONICS solutions are installed in 70% of Global 500 companies around the world, helping customers to be more profitable, agile, efficient, and sustainable. ICONICS promotes an international culture of innovation, creativity and excellence in product design, development, technical support, training, sales and consulting services for end users, system integrators, OEMs and channel partners. ICONICS has over 375,000 applications installed in multiple industries worldwide. #AutomatingtheWorld #MaketheInvisibleVisible #AutomationSoftware #Technology #SmartSolutions

NAICS: 5112
NAICS Definition: Software Publishers
Employees: 237
Subsidiaries: 4
12-month incidents
0
Known data breaches
0
Attack type number
1

Siemens Digital Industries Software

5800 Granite Pkwy, 600, Plano, Texas, US, 75024
Last Update: 2025-12-25
Between 750 and 799

We help organizations of all sizes digitally transform using software, hardware and services from the Siemens Xcelerator business platform. Our software and the comprehensive digital twin enable companies to optimize their design, engineering and manufacturing processes to turn today's ideas into the sustainable products of the future. From chips to entire systems, from product to process, across all industries. We help transform the everyday as part of @Siemens, To learn more, visit http://sw.siemens.com.

NAICS: 5112
NAICS Definition: Software Publishers
Employees: 17,653
Subsidiaries: 13
12-month incidents
0
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/iconics.jpeg
ICONICS
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/siemenssoftware.jpeg
Siemens Digital Industries Software
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
ICONICS
100%
Compliance Rate
0/4 Standards Verified
Siemens Digital Industries Software
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for ICONICS in 2025.

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for Siemens Digital Industries Software in 2025.

Incident History — ICONICS (X = Date, Y = Severity)

ICONICS cyber incidents detection timeline including parent company and subsidiaries

Incident History — Siemens Digital Industries Software (X = Date, Y = Severity)

Siemens Digital Industries Software cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/iconics.jpeg
ICONICS
Incidents

Date Detected: 6/2024
Type:Vulnerability
Attack Vector: Phantom DLL Hijacking, Lateral Movement
Blog: Blog
https://images.rankiteo.com/companyimages/siemenssoftware.jpeg
Siemens Digital Industries Software
Incidents

Date Detected: 6/2024
Type:Vulnerability
Attack Vector: Unlocked bootloader
Blog: Blog

FAQ

Siemens Digital Industries Software company demonstrates a stronger AI Cybersecurity Score compared to ICONICS company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

ICONICS and Siemens Digital Industries Software have experienced a similar number of publicly disclosed cyber incidents.

In the current year, Siemens Digital Industries Software company and ICONICS company have not reported any cyber incidents.

Neither Siemens Digital Industries Software company nor ICONICS company has reported experiencing a ransomware attack publicly.

Neither Siemens Digital Industries Software company nor ICONICS company has reported experiencing a data breach publicly.

Neither Siemens Digital Industries Software company nor ICONICS company has reported experiencing targeted cyberattacks publicly.

Both ICONICS company and Siemens Digital Industries Software company have disclosed vulnerabilities.

Neither ICONICS nor Siemens Digital Industries Software holds any compliance certifications.

Neither company holds any compliance certifications.

Siemens Digital Industries Software company has more subsidiaries worldwide compared to ICONICS company.

Siemens Digital Industries Software company employs more people globally than ICONICS company, reflecting its scale as a Software Development.

Neither ICONICS nor Siemens Digital Industries Software holds SOC 2 Type 1 certification.

Neither ICONICS nor Siemens Digital Industries Software holds SOC 2 Type 2 certification.

Neither ICONICS nor Siemens Digital Industries Software holds ISO 27001 certification.

Neither ICONICS nor Siemens Digital Industries Software holds PCI DSS certification.

Neither ICONICS nor Siemens Digital Industries Software holds HIPAA certification.

Neither ICONICS nor Siemens Digital Industries Software holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was determined in itsourcecode Online Frozen Foods Ordering System 1.0. This affects an unknown part of the file /contact_us.php. This manipulation of the argument Name causes sql injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

C-Kermit (aka ckermit) through 10.0 Beta.12 (aka 416-beta12) before 244644d allows a remote Kermit system to overwrite files on the local system, or retrieve arbitrary files from the local system.

Risk Information
cvss3
Base: 8.9
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L
Description

Telenium Online Web Application is vulnerable due to a Perl script that is called to load the login page. Due to improper input validation, an attacker can inject arbitrary Perl code through a crafted HTTP request, leading to remote code execution on the server.

Risk Information
cvss3
Base: 9.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 9.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Fujitsu / Fsas Technologies ETERNUS SF ACM/SC/Express (DX / AF Management Software) before 16.8-16.9.1 PA 2025-12, when collected maintenance data is accessible by a principal/authority other than ETERNUS SF Admin, allows an attacker to potentially affect system confidentiality, integrity, and availability.

Risk Information
cvss3
Base: 5.6
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Description

ONLYOFFICE Docs before 9.2.1 allows XSS in the textarea of the comment editing form. This is related to DocumentServer.

Risk Information
cvss3
Base: 6.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N