Comparison Overview

Inotiv

VS

Utrecht University

Inotiv

2701 Kent Ave., None, West Lafayette, IN, US, 47906
Last Update: 2025-12-09
Between 0 and 549

WHERE INSIGHTS LEAD TO ANSWERS Expect More In choosing a partner for discovery, development and research models, expect more: more attention, more insight, and a superlative experience. You’ve worked hard to get this far, and you deserve a provider seamlessly aligned to your needs and goals. Through scientific leadership and ongoing investments, Inotiv delivers a comprehensive range of services and products that will exceed your expectations. Benefit from our long and impeccable regulatory history, world class team of scientists, and track record of providing attentive, decisive service. Answering the right questions on time and with high-quality data is the key to achieving your objectives. At Inotiv, that is our focus: to provide you with both the broad scope and right-size solutions essential to your success. Gain the insights you deserve to get the answers you need. Expect more — with Inotiv. Inotiv is a Top Workplaces 2023 Winner.

NAICS: 5417
NAICS Definition: Scientific Research and Development Services
Employees: 1,799
Subsidiaries: 0
12-month incidents
3
Known data breaches
0
Attack type number
1

Utrecht University

Heidelberglaan 6, Utrecht, Utrecht, utrecht, NL, 3512
Last Update: 2025-12-02
Between 700 and 749

At Utrecht University (UU), we are working towards a better world. We do this by researching complex issues beyond the borders of disciplines. We put thinkers in contact with doers, so new insights can be applied. We give students the space to develop themselves. In so doing, we make substantial contributions to society, both now and in the future.

NAICS: 5417
NAICS Definition: Scientific Research and Development Services
Employees: 11,279
Subsidiaries: 7
12-month incidents
0
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/inotiv.jpeg
Inotiv
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/universiteit-utrecht.jpeg
Utrecht University
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Inotiv
100%
Compliance Rate
0/4 Standards Verified
Utrecht University
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Research Services Industry Average (This Year)

Inotiv has 476.92% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs Research Services Industry Average (This Year)

No incidents recorded for Utrecht University in 2025.

Incident History — Inotiv (X = Date, Y = Severity)

Inotiv cyber incidents detection timeline including parent company and subsidiaries

Incident History — Utrecht University (X = Date, Y = Severity)

Utrecht University cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/inotiv.jpeg
Inotiv
Incidents

Date Detected: 12/2025
Type:Ransomware
Blog: Blog

Date Detected: 9/2025
Type:Ransomware
Attack Vector: Phishing, Ransomware, Third-Party Vulnerabilities, IoT Device Exploitation
Motivation: Financial Gain, Data Theft (Intellectual Property, Patient Data), Disruption of Operations
Blog: Blog

Date Detected: 8/2025
Type:Ransomware
Motivation: Financial Gain, Data Theft, Extortion
Blog: Blog
https://images.rankiteo.com/companyimages/universiteit-utrecht.jpeg
Utrecht University
Incidents

Date Detected: 08/2020
Type:Ransomware
Blog: Blog

FAQ

Utrecht University company demonstrates a stronger AI Cybersecurity Score compared to Inotiv company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Inotiv company has faced a higher number of disclosed cyber incidents historically compared to Utrecht University company.

In the current year, Inotiv company has reported more cyber incidents than Utrecht University company.

Both Utrecht University company and Inotiv company have confirmed experiencing at least one ransomware attack.

Neither Utrecht University company nor Inotiv company has reported experiencing a data breach publicly.

Neither Utrecht University company nor Inotiv company has reported experiencing targeted cyberattacks publicly.

Neither Inotiv company nor Utrecht University company has reported experiencing or disclosing vulnerabilities publicly.

Neither Inotiv nor Utrecht University holds any compliance certifications.

Neither company holds any compliance certifications.

Utrecht University company has more subsidiaries worldwide compared to Inotiv company.

Utrecht University company employs more people globally than Inotiv company, reflecting its scale as a Research Services.

Neither Inotiv nor Utrecht University holds SOC 2 Type 1 certification.

Neither Inotiv nor Utrecht University holds SOC 2 Type 2 certification.

Neither Inotiv nor Utrecht University holds ISO 27001 certification.

Neither Inotiv nor Utrecht University holds PCI DSS certification.

Neither Inotiv nor Utrecht University holds HIPAA certification.

Neither Inotiv nor Utrecht University holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Tuleap is a free and open source suite for management of software development and collaboration. Versions of Tuleap Community Edition prior to 17.0.99.1763126988 and Tuleap Enterprise Edition prior to 17.0-3 and 16.13-8 have missing CSRF protections which allow attackers to create or remove tracker triggers. This issue is fixed in Tuleap Community Edition version 17.0.99.1763126988 and Tuleap Enterprise Edition versions 17.0-3 and 16.13-8.

Risk Information
cvss3
Base: 4.6
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
Description

Tuleap is a free and open source suite for management of software development and collaboration. Tuleap Community Editon versions prior to 17.0.99.1762456922 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 are vulnerable to CSRF attacks through planning management API. Attackers have access to create, edit or remove plans. This issue is fixed in Tuleap Community Edition version 17.0.99.1762456922 and Tuleap Enterprise Edtion versions 17.0-2, 16.13-7 and 16.12-10.

Risk Information
cvss3
Base: 4.6
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
Description

Tuleap is an Open Source Suite for management of software development and collaboration. Tuleap Community Edition versions below 17.0.99.1762444754 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 allow attackers trick victims into changing tracker general settings. This issue is fixed in version Tuleap Community Edition version 17.0.99.1762444754 and Tuleap Enterprise Edition versions 17.0-2, 16.13-7 and 16.12-10.

Risk Information
cvss3
Base: 4.6
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
Description

Tuleap is an Open Source Suite for management of software development and collaboration. Versions below 17.0.99.1762431347 of Tuleap Community Edition and Tuleap Enterprise Edition below 17.0-2, 16.13-7 and 16.12-10 allow attackers to access file release system information in projects they do not have access to. This issue is fixed in version 17.0.99.1762431347 of the Tuleap Community Edition and versions 17.0-2, 16.13-7 and 16.12-10 of Tuleap Enterprise Edition.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Description

IBM watsonx.data 2.2 through 2.2.1 could allow an authenticated user to cause a denial of service through ingestion pods due to improper allocation of resources without limits.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H