Company Details
industrial-sales-marketing-inc-
9
259
None
industrialsales-marketing.com
0
IND_3266824
In-progress

Industrial Sales / Marketing, Inc. Company CyberSecurity Posture
industrialsales-marketing.comIS/M, Inc.- Industrial Sales / Marketing, is an experienced SPECIFICATION driven, Manufacturers Representative, covering the Southeast, with offices located in; Richmond,VA. , Raleigh, NC., Greenville, SC. , Montgomery, AL. , and Melbourne, FL. Our Field Service & Sales personnel have both practical and hands on application experience with a variety of products including; Motor / Generator Brushes, Spring Clips, Brush Holders, Commutator Tools / Supplies, Shaft Grounding Devices. Wireless Plant Monitoring / Preventive Maintenance Components / Systems, Hot Spot Monitoring, Motor Bearing Temperature and Vibration Sensing. Explosion Proof Devices. Machine Guarding Devices, Interlocks, RFID Interlocks, Cable Switches, Light Curtains. AC / DC Drives, Shaft Speed Monitoring, Photo Electric / Proximity Sensors, Palm Buttons, Thru-Door Programming Ports, 600 / 4160 Voltage Indicators, Lock Out Tag Out, PESD’s (Permanent Electrical Safety Devices), Enclosures / Cabinets, Stainless Cable Entry glands, Cord Grips and Multi-conductor Cord Sets. Rectangular / Round connectors, Fiber Optic, Ethernet IP and Ethernet Switches, Custom Cable Assemblies.
Company Details
industrial-sales-marketing-inc-
9
259
None
industrialsales-marketing.com
0
IND_3266824
In-progress
Between 750 and 799

ISMI Global Score (TPRM)XXXX



No incidents recorded for Industrial Sales / Marketing, Inc. in 2025.
No incidents recorded for Industrial Sales / Marketing, Inc. in 2025.
No incidents recorded for Industrial Sales / Marketing, Inc. in 2025.
ISMI cyber incidents detection timeline including parent company and subsidiaries

IS/M, Inc.- Industrial Sales / Marketing, is an experienced SPECIFICATION driven, Manufacturers Representative, covering the Southeast, with offices located in; Richmond,VA. , Raleigh, NC., Greenville, SC. , Montgomery, AL. , and Melbourne, FL. Our Field Service & Sales personnel have both practical and hands on application experience with a variety of products including; Motor / Generator Brushes, Spring Clips, Brush Holders, Commutator Tools / Supplies, Shaft Grounding Devices. Wireless Plant Monitoring / Preventive Maintenance Components / Systems, Hot Spot Monitoring, Motor Bearing Temperature and Vibration Sensing. Explosion Proof Devices. Machine Guarding Devices, Interlocks, RFID Interlocks, Cable Switches, Light Curtains. AC / DC Drives, Shaft Speed Monitoring, Photo Electric / Proximity Sensors, Palm Buttons, Thru-Door Programming Ports, 600 / 4160 Voltage Indicators, Lock Out Tag Out, PESD’s (Permanent Electrical Safety Devices), Enclosures / Cabinets, Stainless Cable Entry glands, Cord Grips and Multi-conductor Cord Sets. Rectangular / Round connectors, Fiber Optic, Ethernet IP and Ethernet Switches, Custom Cable Assemblies.


We strive to fully understand the business needs behind our client's projects. We then turn that understanding into solutions that deliver true value to all stakeholders. By working with world class technologies and ensuring that we have deep technical expertise we are able to fully support projects
Global Process Automation™ (GPA) is a full-service industrial technology solutions provider specializing in Discrete & Process Automation, OT Infrastructure & ICS Cybersecurity, and Manufacturing Intelligence. Our vision is to leverage our expertise to build meaningful relationships with our custo

CMA/Flodyne/Hydradyne is a full service distributor, 100% Employee Owned. We offer complete machine automation and control solutions for hydraulic, pneumatic, and electro-mechanical applications. We serve machine builders and industrial end users with a broad selection of machine technology from th

M&M Systems is a leader in the design and manufacturing of cutting edge automated control systems. We provide solutions from simple commercially sold units to complex industrial systems. Specializing in industrial refrigeration controls and commercial HVAC/R control systems, our focus is on en

With over 20 years of experience as a leading manufacturer of custom and modular conveying equipment for food & beverage, pharmaceutical, cosmetic and consumer industries, Advantage Conveyor can provide you with a solution that is tailor-made to address your exact production demands. We produce ever

For over 65 years, BELL-MARK has been developing innovative solutions for package and carton printing applications in the medical device, pharmaceutical, prepared foods, meat, bakery, dairy, and poultry packaging industries. BELL-MARK offers many in-line printing technologies including piezo inkjet,
.png)
The new guides offer practical frameworks, outbound strategies, and agency comparison lists tailored to manufacturing, technology, solar,...
Explore more than 1000 real-life examples of how organizations are embracing Microsoft's proven AI capabilities to drive impact.
Almost all companies invest in AI, but just 1 percent believe they are at maturity. Our research finds the biggest barrier to scaling is not...
Artificial intelligence in business is the use of AI tools such as machine learning, natural language processing, and computer vision to optimize business...
Want to hear more from Honeywell International Inc. and its affiliates? By checking this box, you agree to receive marketing e-communications,...
Ready to join a mission that matters? Join our talent community. Go to job postings. Careers at CrowdStrike. Sales & Marketing. Engineering & Technology.
When looking for work abroad, your first instinct is likely to pursue jobs with companies that are familiar to you. Several companies based in the United...
A 28-year veteran of the company, Martha leads the team responsible for enabling the company's fuels and lubricants business to respond to a major cyberattack.
These are the best sales companies to work for. Learn about the values and professional development opportunities that set these sales teams apart.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Industrial Sales / Marketing, Inc. is http://www.industrialsales-marketing.com.
According to Rankiteo, Industrial Sales / Marketing, Inc.’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.
According to Rankiteo, Industrial Sales / Marketing, Inc. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Industrial Sales / Marketing, Inc. is not certified under SOC 2 Type 1.
According to Rankiteo, Industrial Sales / Marketing, Inc. does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Industrial Sales / Marketing, Inc. is not listed as GDPR compliant.
According to Rankiteo, Industrial Sales / Marketing, Inc. does not currently maintain PCI DSS compliance.
According to Rankiteo, Industrial Sales / Marketing, Inc. is not compliant with HIPAA regulations.
According to Rankiteo,Industrial Sales / Marketing, Inc. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Industrial Sales / Marketing, Inc. operates primarily in the Industrial Automation industry.
Industrial Sales / Marketing, Inc. employs approximately 9 people worldwide.
Industrial Sales / Marketing, Inc. presently has no subsidiaries across any sectors.
Industrial Sales / Marketing, Inc.’s official LinkedIn profile has approximately 259 followers.
No, Industrial Sales / Marketing, Inc. does not have a profile on Crunchbase.
Yes, Industrial Sales / Marketing, Inc. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/industrial-sales-marketing-inc-.
As of November 27, 2025, Rankiteo reports that Industrial Sales / Marketing, Inc. has not experienced any cybersecurity incidents.
Industrial Sales / Marketing, Inc. has an estimated 801 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Industrial Sales / Marketing, Inc. has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.