Company Details
koch-chemical-technology-group-llc
32,526
32,432
211
kochengineeredsolutions.com
0
KOC_7077347
In-progress

Koch Engineered Solutions Company CyberSecurity Posture
kochengineeredsolutions.comKoch Engineered Solutions (KES) provides uniquely engineered solutions in construction; mass and heat transfer; combustion and emissions controls; filtration; separation; materials applications; automation and actuation. KES is located in Wichita, Kansas, and is a subsidiary of Koch Industries, one of the largest private companies in the world. KES delivers superior value in developing, integrating, and applying innovative technical and service solutions for industrial value chains. More information is available at KochEngineeredSolutions.com. Below is a list of our businesses: Koch-Glitsch John Zink Koch Specialty Plant Services Optimized Process Designs, LLC Koch Technology Solutions DEPCOM Power Inc. DarkVision Technologies Inc.
Company Details
koch-chemical-technology-group-llc
32,526
32,432
211
kochengineeredsolutions.com
0
KOC_7077347
In-progress
Between 750 and 799

KES Global Score (TPRM)XXXX



No incidents recorded for Koch Engineered Solutions in 2025.
No incidents recorded for Koch Engineered Solutions in 2025.
No incidents recorded for Koch Engineered Solutions in 2025.
KES cyber incidents detection timeline including parent company and subsidiaries

Koch Engineered Solutions (KES) provides uniquely engineered solutions in construction; mass and heat transfer; combustion and emissions controls; filtration; separation; materials applications; automation and actuation. KES is located in Wichita, Kansas, and is a subsidiary of Koch Industries, one of the largest private companies in the world. KES delivers superior value in developing, integrating, and applying innovative technical and service solutions for industrial value chains. More information is available at KochEngineeredSolutions.com. Below is a list of our businesses: Koch-Glitsch John Zink Koch Specialty Plant Services Optimized Process Designs, LLC Koch Technology Solutions DEPCOM Power Inc. DarkVision Technologies Inc.

En YPF, tenemos un Plan 4x4 para convertirnos en una compañía de clase mundial y lograr transformarnos en grandes exportadores de hidrocarburos. Nuestros cuatro pilares son: la aceleración de la producción de petróleo en Vaca Muerta, el activo más importante que tiene nuestro país; la disciplina f
PT Pertamina (Persero) is an Indonesian state-owned enterprise, which is engaged in the integrated energy in Indonesia. Established on December 10, 1957, Pertamina had the experiences in upstream, midstream, downstream and renewable energy sectors for more than 50 years. This is the official Link
Shell is a global group of energy and petrochemical companies, employing 103,000 people and with operations in more than 70 countries. We serve more than 1 million commercial and industrial customers, and around 33 million customers daily at more than 47,000 Shell-branded retail service stations. O

Sonatrach (Société Nationale pour la Recherche, la Production, le Transport, la Transformation, et la Commercialisation des Hydrocarbures s.p.a.) is an Algerian government-owned company formed to exploit the hydrocarbon resources of the country. Its diversified activities cover all aspects of Oil &

Wood Group has combined with Amec Foster Wheeler to form a new global leader in the delivery of project, engineering and technical services to energy and industrial markets. To find out more about Wood visit our new website at www.woodplc.com For all the latest updates and job news follow Wood on L
Weatherford International plc (Nasdaq: WFRD) is a leading global energy services company. Operating in approximately 75 countries, the Company answers the challenges of the energy industry with its global talent network of approximately 17,000 team members and approximately 350 operating locations,

Marathon Petroleum Corporation (MPC) is a leading, integrated, downstream and midstream energy company headquartered in Findlay, Ohio. The company operates the nation's largest refining system. MPC's marketing system includes branded locations across the United States, including Marathon brand retai
At Repsol, we are at the forefront of the energy sector to build the future of energy with innovation and sustainability. We are a strong multienergy company that creates value in an integrated, diversified, and sustainable way to promote progress in society. We leverage our past experience to be pr

We’re a leading producer of the energy and chemicals that drive global commerce and enhance the daily lives of people around the globe by continuing delivering an uninterrupted supply of energy to the world. Our resilience and agility has built one of the world’s largest integrated energy and chemi
.png)
In 2024, Wichita's tech scene is booming, with the top ten tech companies providing excellent career opportunities in cybersecurity,...
Through a partnership with Washington State University (WSU), engineering students delivered an imaginative and cost-effective solution.
The agreement will enable both companies to collaborate in the development and implementation of Chart's Cryogenic Carbon Capture (CCC) technologies,...
Koch Industries and its funding vehicles funnel millions to groups that are decrying "woke capitalism" and attacking the investment giant...
Koch Engineered Solutions (KES) said it bought DEPCOM Power Inc., a company focused on building utility-scale solar power plants.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Koch Engineered Solutions is https://kochengineeredsolutions.com/.
According to Rankiteo, Koch Engineered Solutions’s AI-generated cybersecurity score is 767, reflecting their Fair security posture.
According to Rankiteo, Koch Engineered Solutions currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Koch Engineered Solutions is not certified under SOC 2 Type 1.
According to Rankiteo, Koch Engineered Solutions does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Koch Engineered Solutions is not listed as GDPR compliant.
According to Rankiteo, Koch Engineered Solutions does not currently maintain PCI DSS compliance.
According to Rankiteo, Koch Engineered Solutions is not compliant with HIPAA regulations.
According to Rankiteo,Koch Engineered Solutions is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Koch Engineered Solutions operates primarily in the Oil and Gas industry.
Koch Engineered Solutions employs approximately 32,526 people worldwide.
Koch Engineered Solutions presently has no subsidiaries across any sectors.
Koch Engineered Solutions’s official LinkedIn profile has approximately 32,432 followers.
Koch Engineered Solutions is classified under the NAICS code 211, which corresponds to Oil and Gas Extraction.
No, Koch Engineered Solutions does not have a profile on Crunchbase.
Yes, Koch Engineered Solutions maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/koch-chemical-technology-group-llc.
As of December 14, 2025, Rankiteo reports that Koch Engineered Solutions has not experienced any cybersecurity incidents.
Koch Engineered Solutions has an estimated 10,552 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Koch Engineered Solutions has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.