Comparison Overview

Inventory Hive

VS

Shimao Group

Inventory Hive

Lichfield, None, Lichfield, Staffordshire, GB, None
Last Update: 2025-11-24

Inventory Hive is a beautifully simple cloud-based property reporting and 360° virtual tour software — allowing for market leading paperless creation of inventories, check-ins, interim visits, comparative check-outs, custom reports and 360° virtual tours. Inventory Hive have recently won multiple awards including Best Overall Supplier at the EA Masters 2022, Best Medium Supplier in 2023, and Supplier of the Year (Technology) – Apps at the Negotiator Awards in both 2023 and 2024. Additionally, we were honoured to win the Best Overall Innovation and Improvement Award for Estate Agents at the 2024 EA Masters. Propertymark Industry Supplier. ARL (UKAA) Member NRLA - Preferred Supplier

NAICS: None
NAICS Definition: Others
Employees: 17
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

Shimao Group

None
Last Update: 2025-11-24
Between 750 and 799

Shimao Group has entered the real estate industry since 1989, After more than 30 years of development, the Group has made its layout in more than 100 core development cities across China, involving real estate, commercial, property management, hotel, theme entertainment and culture. Following the national strategy, Shimao continuously provides customers with high-level quality experience in living, life, consumption, business and tourism, leading the lifestyle and serving a better life.

NAICS: None
NAICS Definition: Others
Employees: 11
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/inventory-hive.jpeg
Inventory Hive
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/世茂房地产.jpeg
Shimao Group
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Inventory Hive
100%
Compliance Rate
0/4 Standards Verified
Shimao Group
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Real Estate Industry Average (This Year)

No incidents recorded for Inventory Hive in 2025.

Incidents vs Real Estate Industry Average (This Year)

No incidents recorded for Shimao Group in 2025.

Incident History — Inventory Hive (X = Date, Y = Severity)

Inventory Hive cyber incidents detection timeline including parent company and subsidiaries

Incident History — Shimao Group (X = Date, Y = Severity)

Shimao Group cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/inventory-hive.jpeg
Inventory Hive
Incidents

Date Detected: 6/2017
Type:Vulnerability
Blog: Blog
https://images.rankiteo.com/companyimages/世茂房地产.jpeg
Shimao Group
Incidents

No Incident

FAQ

Shimao Group company demonstrates a stronger AI Cybersecurity Score compared to Inventory Hive company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Inventory Hive company has historically faced a number of disclosed cyber incidents, whereas Shimao Group company has not reported any.

In the current year, Shimao Group company and Inventory Hive company have not reported any cyber incidents.

Neither Shimao Group company nor Inventory Hive company has reported experiencing a ransomware attack publicly.

Neither Shimao Group company nor Inventory Hive company has reported experiencing a data breach publicly.

Neither Shimao Group company nor Inventory Hive company has reported experiencing targeted cyberattacks publicly.

Inventory Hive company has disclosed at least one vulnerability, while Shimao Group company has not reported such incidents publicly.

Neither Inventory Hive nor Shimao Group holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Inventory Hive company nor Shimao Group company has publicly disclosed detailed information about the number of their subsidiaries.

Inventory Hive company employs more people globally than Shimao Group company, reflecting its scale as a Real Estate.

Neither Inventory Hive nor Shimao Group holds SOC 2 Type 1 certification.

Neither Inventory Hive nor Shimao Group holds SOC 2 Type 2 certification.

Neither Inventory Hive nor Shimao Group holds ISO 27001 certification.

Neither Inventory Hive nor Shimao Group holds PCI DSS certification.

Neither Inventory Hive nor Shimao Group holds HIPAA certification.

Neither Inventory Hive nor Shimao Group holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.