Comparison Overview

Inventory Hive

VS

Compass

Inventory Hive

Lichfield, None, Lichfield, Staffordshire, GB, None
Last Update: 2026-01-22

Inventory Hive is a beautifully simple cloud-based property reporting and 360° virtual tour software — allowing for market leading paperless creation of inventories, check-ins, interim visits, comparative check-outs, custom reports and 360° virtual tours. Inventory Hive have recently won multiple awards including Best Overall Supplier at the EA Masters 2022, Best Medium Supplier in 2023, and Supplier of the Year (Technology) – Apps at the Negotiator Awards in both 2023 and 2024. Additionally, we were honoured to win the Best Overall Innovation and Improvement Award for Estate Agents at the 2024 EA Masters. Propertymark Industry Supplier. ARL (UKAA) Member NRLA - Preferred Supplier

NAICS: None
NAICS Definition: Others
Employees: 17
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

Compass

110 Fifth Avenue, New York, 10011, US
Last Update: 2026-01-18

Compass is a real estate technology company with a powerful end-to-end platform that supports the entire buying and selling workflow. We deliver an incomparable experience to both agents and their clients all in service of the Compass mission: to help everyone find their place in the world. Founded in 2012 by Ori Allon and Robert Reffkin, Compass operates in 22+ regions across the United States including New York, Los Angeles and Orange County, Chicago, San Francisco, Boston, Washington D.C., South Florida, The Hamptons, Santa Barbara & Montecito, San Diego, Seattle & Eastside, Philadelphia, Connecticut, Westchester, Aspen, Boulder, Denver, Atlanta, Austin & Central Texas, Dallas-Fort Worth, Houston, Nashville, and Lake Tahoe. Learn more and find your place at www.compass.com and www.compass.com/careers. Compass only reaches out to applicants from a @compass.com domain and does not prompt applicants to download software or files as part of its application process.

NAICS: None
NAICS Definition: Others
Employees: 34,114
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/inventory-hive.jpeg
Inventory Hive
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/compassinc.jpeg
Compass
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Inventory Hive
100%
Compliance Rate
0/4 Standards Verified
Compass
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Real Estate Industry Average (This Year)

No incidents recorded for Inventory Hive in 2026.

Incidents vs Real Estate Industry Average (This Year)

No incidents recorded for Compass in 2026.

Incident History — Inventory Hive (X = Date, Y = Severity)

Inventory Hive cyber incidents detection timeline including parent company and subsidiaries

Incident History — Compass (X = Date, Y = Severity)

Compass cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/inventory-hive.jpeg
Inventory Hive
Incidents

Date Detected: 6/2017
Type:Vulnerability
Blog: Blog
https://images.rankiteo.com/companyimages/compassinc.jpeg
Compass
Incidents

Date Detected: 5/2019
Type:Breach
Attack Vector: Phishing
Blog: Blog

FAQ

Compass company demonstrates a stronger AI Cybersecurity Score compared to Inventory Hive company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Inventory Hive and Compass have experienced a similar number of publicly disclosed cyber incidents.

In the current year, Compass company and Inventory Hive company have not reported any cyber incidents.

Neither Compass company nor Inventory Hive company has reported experiencing a ransomware attack publicly.

Compass company has disclosed at least one data breach, while Inventory Hive company has not reported such incidents publicly.

Neither Compass company nor Inventory Hive company has reported experiencing targeted cyberattacks publicly.

Inventory Hive company has disclosed at least one vulnerability, while Compass company has not reported such incidents publicly.

Neither Inventory Hive nor Compass holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Inventory Hive company nor Compass company has publicly disclosed detailed information about the number of their subsidiaries.

Compass company employs more people globally than Inventory Hive company, reflecting its scale as a Real Estate.

Neither Inventory Hive nor Compass holds SOC 2 Type 1 certification.

Neither Inventory Hive nor Compass holds SOC 2 Type 2 certification.

Neither Inventory Hive nor Compass holds ISO 27001 certification.

Neither Inventory Hive nor Compass holds PCI DSS certification.

Neither Inventory Hive nor Compass holds HIPAA certification.

Neither Inventory Hive nor Compass holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Description

A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.

Description

A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.

Description

A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.

Risk Information
cvss3
Base: 6.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.