Comparison Overview

Immersus Media

VS

Menagerie

Immersus Media

undefined, Roseville, CA, 95678, US
Last Update: 2025-12-02
Between 750 and 799

Crafting your online presence. We are a web design studio based in the Sacramento area dedicated to creative solutions for design and development. We’re always ready for another adventure. _ _ _ _ _ _ _ Immersus Media, founded by Alan Dowling in 2005, is an interactive design studio based in Roseville, California with team members distributed around the United States. We offer custom, hand-crafted products and services that are tailored to your specific needs and budget. No two clients are exactly alike and neither is any project. You + Us = Amazing At the heart of every piece we work on there is a desire to continually hone our craft. We’re proud of the work we’ve done and would love to connect with you.

NAICS: 541
NAICS Definition:
Employees: 2
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Menagerie

None
Last Update: 2025-12-03
Between 800 and 849

Hello there So, firstly, my name's Andy Doran, my company name is Menagerie and I basically make things on the screen look good and sometimes move around. As a design student I was a Royal Society of Arts Finalist and a member of the Manchester Creative Circle. I had my first taste of the industry at BDH Advertising, worked round a few other design studios and agencies, ran the graphic design department at Telewest and then jumped headfirst into the world of freelance design. Along the way I've built up a direct client list, learnt more things, learnt what not to do, welcomed and embraced the internet, designed, maintained and hosted websites, directed and animated music videos for broadcast, worked as freelancer for Code Computerlove, Love Creative, Iris Nation, The Chase, True North, Creative Lynx, Epigram and others, met lots of good people, composed and recorded soundtracks for animation and video, learnt how to code in actionscript and xhtml, produced motion graphics sequences and 3d scenarios, perfected my tea making abilities...[pause for breath...]

NAICS: 54143
NAICS Definition: Graphic Design Services
Employees: 16
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/immersus-media.jpeg
Immersus Media
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/menagerie.jpeg
Menagerie
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Immersus Media
100%
Compliance Rate
0/4 Standards Verified
Menagerie
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Graphic Design Industry Average (This Year)

No incidents recorded for Immersus Media in 2025.

Incidents vs Graphic Design Industry Average (This Year)

No incidents recorded for Menagerie in 2025.

Incident History — Immersus Media (X = Date, Y = Severity)

Immersus Media cyber incidents detection timeline including parent company and subsidiaries

Incident History — Menagerie (X = Date, Y = Severity)

Menagerie cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/immersus-media.jpeg
Immersus Media
Incidents

No Incident

https://images.rankiteo.com/companyimages/menagerie.jpeg
Menagerie
Incidents

No Incident

FAQ

Menagerie company demonstrates a stronger AI Cybersecurity Score compared to Immersus Media company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Menagerie company has disclosed a higher number of cyber incidents compared to Immersus Media company.

In the current year, Menagerie company and Immersus Media company have not reported any cyber incidents.

Neither Menagerie company nor Immersus Media company has reported experiencing a ransomware attack publicly.

Neither Menagerie company nor Immersus Media company has reported experiencing a data breach publicly.

Neither Menagerie company nor Immersus Media company has reported experiencing targeted cyberattacks publicly.

Neither Immersus Media company nor Menagerie company has reported experiencing or disclosing vulnerabilities publicly.

Neither Immersus Media nor Menagerie holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Immersus Media company nor Menagerie company has publicly disclosed detailed information about the number of their subsidiaries.

Menagerie company employs more people globally than Immersus Media company, reflecting its scale as a Graphic Design.

Neither Immersus Media nor Menagerie holds SOC 2 Type 1 certification.

Neither Immersus Media nor Menagerie holds SOC 2 Type 2 certification.

Neither Immersus Media nor Menagerie holds ISO 27001 certification.

Neither Immersus Media nor Menagerie holds PCI DSS certification.

Neither Immersus Media nor Menagerie holds HIPAA certification.

Neither Immersus Media nor Menagerie holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.

Risk Information
cvss3
Base: 4.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Description

FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Risk Information
cvss3
Base: 8.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
cvss4
Base: 7.1
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X