Comparison Overview

Kohler Co.

VS

Procter & Gamble

Kohler Co.

444 Highland Drive, None, Kohler, Wisconsin, US, 53044
Last Update: 2025-07-27 (UTC)

We’re a community of creators. Status quo busters. Difference makers. For the past 150 years, we’ve built our business on a singular mission—helping people live gracious, healthy, and sustainable lives. Thanks to the passion, craftsmanship, and ingenuity of our associates around the world, our business has expanded across the globe with a diverse portfolio of brands. Today, we’re one of America’s oldest and largest privately held companies. We manufacture smart kitchen & bath products and host world-class hospitality experiences. At 30,000 strong, we’re the driving force behind so much meaningful progress as we strive to #BecomeMoreAtKohler—individually and together. We’re unafraid of bold action and inspired to design better tomorrows. Here’s to the next 150 years. Learn more about Kohler's hiring practices to help you avoid recruitment fraud: https://www.kohlercompany.com/careers/how-we-hire/recruitment-fraud/

NAICS: 30
NAICS Definition: Manufacturing
Employees: 14,194
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
0

Procter & Gamble

2 P&G Plaza, Cincinnati, Ohio, 45202, US
Last Update: 2025-03-04 (UTC)

Excellent

Between 900 and 1000

P&G was founded more than 185 years ago as a soap and candle company. Today, we’re one of the world’s largest consumer goods companies and home to iconic, trusted brands, including Always®, Charmin®, Braun®, Fairy®, Febreze®, Gillette®, Head & Shoulders®, Oral B®, Pantene®, Pampers®, Tide®, and Vicks®. The design, development, growth and success of these products—and many more—is thanks to the innovative and insightful minds of our people. From Day 1, you’ll help make everyday life easier for our 5 billion consumers. There is no single equation for success at P&G, because no two P&G people or careers are alike. Just as we strive to deliver a superior consumer experience, we aim to deliver a superior employee value equation as well. With our large global footprint, there are many opportunities to work with P&G in multiple locations. We offer opportunities in approximately 70 countries and continually aim to attract, reward and advance the finest people in the world. Here, we want you to get your career off to a fast start. That's why we don't have any rotational development programs or gradual ramping-up periods: you’ll be able—and encouraged—to dive right in from Day 1. Join us and help make life better through meaningful work that makes an impact from Day 1.

NAICS: 30
NAICS Definition: Manufacturing
Employees: 91,835
Subsidiaries: 17
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/kohler.jpeg
Kohler Co.
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/procter-and-gamble.jpeg
Procter & Gamble
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
Compliance Summary
Kohler Co.
100%
Compliance Rate
0/4 Standards Verified
Procter & Gamble
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Manufacturing Industry Average (This Year)

No incidents recorded for Kohler Co. in 2025.

Incidents vs Manufacturing Industry Average (This Year)

No incidents recorded for Procter & Gamble in 2025.

Incident History — Kohler Co. (X = Date, Y = Severity)

Kohler Co. cyber incidents detection timeline including parent company and subsidiaries

Incident History — Procter & Gamble (X = Date, Y = Severity)

Procter & Gamble cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/kohler.jpeg
Kohler Co.
Incidents

No Incident

https://images.rankiteo.com/companyimages/procter-and-gamble.jpeg
Procter & Gamble
Incidents

No Incident

FAQ

Procter & Gamble company company demonstrates a stronger AI risk posture compared to Kohler Co. company company, reflecting its advanced AI governance and monitoring frameworks.

Historically, Procter & Gamble company has disclosed a higher number of cyber incidents compared to Kohler Co. company.

In the current year, Procter & Gamble company and Kohler Co. company have not reported any cyber incidents.

Neither Procter & Gamble company nor Kohler Co. company has reported experiencing a ransomware attack publicly.

Neither Procter & Gamble company nor Kohler Co. company has reported experiencing a data breach publicly.

Neither Procter & Gamble company nor Kohler Co. company has reported experiencing targeted cyberattacks publicly.

Neither Kohler Co. company nor Procter & Gamble company has reported experiencing or disclosing vulnerabilities publicly.

Procter & Gamble company has more subsidiaries worldwide compared to Kohler Co. company.

Procter & Gamble company employs more people globally than Kohler Co. company, reflecting its scale as a Manufacturing.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in code-projects Project Monitoring System 1.0. Affected is an unknown function of the file /onlineJobSearchEngine/postjob.php. Such manipulation of the argument txtapplyto leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in Tenda AC18 15.03.05.19. This impacts an unknown function of the file /goform/saveAutoQos. This manipulation of the argument enable causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in Tenda AC18 15.03.05.19. This affects an unknown function of the file /goform/WizardHandle. The manipulation of the argument WANT/mtuvalue results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security vulnerability has been detected in Tenda AC18 15.03.05.19. The impacted element is an unknown function of the file /goform/AdvSetLanip. The manipulation of the argument lanIp leads to command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in Tenda AC8 16.03.34.06. The affected element is the function formSetServerConfig of the file /goform/SetServerConfig. Executing manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X