Comparison Overview

ITC Infotech

VS

Diebold Nixdorf

ITC Infotech

No.18, Banaswadi Main Road, Maruthiseva Nagar, Bangalore, Karnataka, IN, 560005
Last Update: 2025-12-09
Between 750 and 799

ITC Infotech is a global technology solution and services leader providing business-friendly solutions, that enable future-readiness for clients. We seamlessly bring together digital expertise, strong industry-specific alliances, and deep domain expertise from ITC Group businesses. Our solutions and services are focused on Banking and financial Services, Healthcare, Manufacturing, Consumer Goods, Travel and Hospitality. ITC Infotech is a wholly-owned subsidiary of ITC Ltd, one of India’s most admired companies.

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 18,759
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

Diebold Nixdorf

350 Orchard Ave NE, North Canton, Ohio, 44720, US
Last Update: 2025-12-11
Between 750 and 799

We automate, digitize and transform the way people bank and shop. We offer proven expertise and comprehensive portfolios in cutting-edge product technology, multi-vendor software and service excellence for financial and retail customers. Consumer behavior is changing rapidly; people are empowered and connected and expect unprecedented service and convenience. The world is “always on” – a digital era requiring us to orchestrate touchpoints in ways that meet and exceed the 24/7 automation needs of the banking and retail worlds. Diebold Nixdorf employs approximately 21,000 employees in more than 130 countries worldwide. We are publicly traded on the New York Stock Exchange under the symbol “DBD.” Specialties: financial and retail self-service solutions, services, security solutions, software, cash management, branch and store transformation

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 19,828
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
2

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/itc-infotech.jpeg
ITC Infotech
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/diebold.jpeg
Diebold Nixdorf
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
ITC Infotech
100%
Compliance Rate
0/4 Standards Verified
Diebold Nixdorf
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for ITC Infotech in 2025.

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Diebold Nixdorf in 2025.

Incident History — ITC Infotech (X = Date, Y = Severity)

ITC Infotech cyber incidents detection timeline including parent company and subsidiaries

Incident History — Diebold Nixdorf (X = Date, Y = Severity)

Diebold Nixdorf cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/itc-infotech.jpeg
ITC Infotech
Incidents

No Incident

https://images.rankiteo.com/companyimages/diebold.jpeg
Diebold Nixdorf
Incidents

Date Detected: 8/2024
Type:Vulnerability
Attack Vector: Hard Drive Encryption Bypass
Motivation: Financial Data Breach, Unauthorized Cash Withdrawals
Blog: Blog

Date Detected: 05/2020
Type:Cyber Attack
Blog: Blog

FAQ

ITC Infotech company demonstrates a stronger AI Cybersecurity Score compared to Diebold Nixdorf company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Diebold Nixdorf company has historically faced a number of disclosed cyber incidents, whereas ITC Infotech company has not reported any.

In the current year, Diebold Nixdorf company and ITC Infotech company have not reported any cyber incidents.

Neither Diebold Nixdorf company nor ITC Infotech company has reported experiencing a ransomware attack publicly.

Neither Diebold Nixdorf company nor ITC Infotech company has reported experiencing a data breach publicly.

Diebold Nixdorf company has reported targeted cyberattacks, while ITC Infotech company has not reported such incidents publicly.

Diebold Nixdorf company has disclosed at least one vulnerability, while ITC Infotech company has not reported such incidents publicly.

Neither ITC Infotech nor Diebold Nixdorf holds any compliance certifications.

Neither company holds any compliance certifications.

ITC Infotech company has more subsidiaries worldwide compared to Diebold Nixdorf company.

Diebold Nixdorf company employs more people globally than ITC Infotech company, reflecting its scale as a IT Services and IT Consulting.

Neither ITC Infotech nor Diebold Nixdorf holds SOC 2 Type 1 certification.

Neither ITC Infotech nor Diebold Nixdorf holds SOC 2 Type 2 certification.

Neither ITC Infotech nor Diebold Nixdorf holds ISO 27001 certification.

Neither ITC Infotech nor Diebold Nixdorf holds PCI DSS certification.

Neither ITC Infotech nor Diebold Nixdorf holds HIPAA certification.

Neither ITC Infotech nor Diebold Nixdorf holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Hitachi Vantara Pentaho Data Integration and Analytics Community Dashboard Framework prior to versions 10.2.0.4, including 9.3.0.x and 8.3.x display the full server stack trace when encountering an error within the GetCdfResource servlet.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Description

Pentaho Data Integration and Analytics Community Dashboard Editor plugin versions before 10.2.0.4, including 9.3.0.x and 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

A security flaw has been discovered in CTCMS Content Management System up to 2.1.2. The impacted element is an unknown function in the library /ctcms/libs/Ct_Config.php of the component Backend System Configuration Module. The manipulation of the argument Cj_Add/Cj_Edit results in code injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 5.8
Severity: LOW
AV:N/AC:L/Au:M/C:P/I:P/A:P
cvss3
Base: 4.7
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in CTCMS Content Management System up to 2.1.2. The affected element is the function Save of the file /ctcms/libs/Ct_App.php of the component Backend App Configuration Module. The manipulation of the argument CT_App_Paytype leads to code injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 5.8
Severity: LOW
AV:N/AC:L/Au:M/C:P/I:P/A:P
cvss3
Base: 4.7
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Weblate is a web based localization tool. In versions prior to 5.15, it was possible to accept an invitation opened by a different user. Version 5.15. contains a patch. As a workaround, avoid leaving one's Weblate sessions with an invitation opened unattended.

Risk Information
cvss4
Base: 1.0
Severity: HIGH
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X