Comparison Overview

KUNAN S.A.

VS

Intelligent Business Solutions, Inc.

KUNAN S.A.

Av. La Voz del Interior 8501 - Parque Empresarial Aeropuerto - Córdoba, Córdoba, Córdoba, AR
Last Update: 2025-03-20 (UTC)
Between 900 and 1000

Excellent

Somos una destacada empresa tecnológica con sede en Córdoba desde 2004, especializándonos como expertos en respaldar a las organizaciones en la adopción e implementación de tecnologías vanguardistas. Nos destacamos por proporcionar respuestas ágiles e innovadoras que satisfacen la creciente y dinámica demanda del mercado, operando con alcance global desde nuestra sede central en Córdoba. Guiados por nuestro lema, "Facilitamos la vida de las personas con tecnología", ofrecemos un amplio abanico de soluciones tecnológicas de última generación: Asistentes Virtuales de IA para Empresas Whapp (Plataforma Comercial Omnicanal) Metabase o Business Intelligence CRM para Empresas Kuning Tech – Staff Augmentation (gestión y administración de equipos IT) Remote DBA (Administración Remota de Bases de Datos) Estas soluciones están meticulosamente desarrolladas utilizando tecnologías avanzadas como Big Data y análisis, inteligencia artificial, aprendizaje automático, lenguaje natural, ingeniería de software, entre otras. Nos enorgullece ser impulsores de la transformación digital, aportando soluciones innovadoras para satisfacer las necesidades tecnológicas de las empresas en todo el mundo. .... We are a prominent technology company based in Córdoba since 2004, specializing as experts in supporting organizations in the adoption and implementation of cutting-edge technologies. Renowned for providing agile and innovative responses to meet the growing and dynamic market demand, we operate globally from our central headquarters in Córdoba. Guided by our motto, "We make life easier for people with technology," we offer a comprehensive range of state-of-the-art technological solutions: Conversational Virtual Assistants for Enterprises Whapp (Omnichannel Commercial Platform) Metabase or Business Intelligence CRM for Enterprises Kuning Tech – Staff Augmentation (management and administration of IT teams) Remote DBA (Remote Database Administration) These solutions are metic

NAICS: 541511
NAICS Definition: Custom Computer Programming Services
Employees: 0
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Intelligent Business Solutions, Inc.

301 S Liberty St, Suite C, Winston-Salem, North Carolina, US, 27101
Last Update: 2025-07-27 (UTC)

Excellent

Between 900 and 1000

Through our flagship software suites CardioPulse® and Care Command Center® (CCC™), Intelligent Business Solutions, Inc. (IBS) strives to provide an advantage to our clients through dedication, superior service and diligent communication. IBS was founded in 1989 with the goal of providing a better patient care experience by producing innovative, clinical focused software. Our software has, and always will be built around our client’s needs, workflows and price points all while providing a better patient care experience. We urge you to find us on our websites or one of our social media outlets and provide us with some feedback. At IBS, people are the process! Service Excellence: Our clients are the cornerstone of our business principles. Every staff member at IBS is respectful of this knowledge. It is our goal to provide a level of service that exceeds the expectations of our customers. If we can provide an advantage to our clients through dedication, superior service and diligent follow through than we have succeeded in creating a partnership driven by mutual respect and success. Our Promise: Medicine and technology are driven by change. It is our promise to our customers that we will strive to stay current with the ever changing dynamics of health care so our customers can sustain an advantage in the marketplace both clinically and professionally.

NAICS: 541511
NAICS Definition: Custom Computer Programming Services
Employees: 18
Subsidiaries: 2
12-month incidents
0
Known data breaches
2
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
KUNAN S.A.
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/ibs-inc-.jpeg
Intelligent Business Solutions, Inc.
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
Compliance Summary
KUNAN S.A.
100%
Compliance Rate
0/4 Standards Verified
Intelligent Business Solutions, Inc.
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT System Custom Software Development Industry Average (This Year)

No incidents recorded for KUNAN S.A. in 2025.

Incidents vs IT System Custom Software Development Industry Average (This Year)

No incidents recorded for Intelligent Business Solutions, Inc. in 2025.

Incident History — KUNAN S.A. (X = Date, Y = Severity)

KUNAN S.A. cyber incidents detection timeline including parent company and subsidiaries

Incident History — Intelligent Business Solutions, Inc. (X = Date, Y = Severity)

Intelligent Business Solutions, Inc. cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
KUNAN S.A.
Incidents

No Incident

https://images.rankiteo.com/companyimages/ibs-inc-.jpeg
Intelligent Business Solutions, Inc.
Incidents

Date Detected: 11/2022
Type:Breach
Blog: Blog

Date Detected: 11/2022
Type:Breach
Attack Vector: Unauthorized Access
Blog: Blog

FAQ

Both KUNAN S.A. company and Intelligent Business Solutions, Inc. company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Intelligent Business Solutions, Inc. company has historically faced a number of disclosed cyber incidents, whereas KUNAN S.A. company has not reported any.

In the current year, Intelligent Business Solutions, Inc. company and KUNAN S.A. company have not reported any cyber incidents.

Neither Intelligent Business Solutions, Inc. company nor KUNAN S.A. company has reported experiencing a ransomware attack publicly.

Intelligent Business Solutions, Inc. company has disclosed at least one data breach, while KUNAN S.A. company has not reported such incidents publicly.

Neither Intelligent Business Solutions, Inc. company nor KUNAN S.A. company has reported experiencing targeted cyberattacks publicly.

Neither KUNAN S.A. company nor Intelligent Business Solutions, Inc. company has reported experiencing or disclosing vulnerabilities publicly.

Intelligent Business Solutions, Inc. company has more subsidiaries worldwide compared to KUNAN S.A. company.

Intelligent Business Solutions, Inc. company employs more people globally than KUNAN S.A. company, reflecting its scale as a IT System Custom Software Development.

Latest Global CVEs (Not Company-Specific)

Description

Formbricks is an open source qualtrics alternative. Prior to version 4.0.1, Formbricks is missing JWT signature verification. This vulnerability stems from a token validation routine that only decodes JWTs (jwt.decode) without verifying their signatures. Both the email verification token login path and the password reset server action use the same validator, which does not check the token’s signature, expiration, issuer, or audience. If an attacker learns the victim’s actual user.id, they can craft an arbitrary JWT with an alg: "none" header and use it to authenticate and reset the victim’s password. This issue has been patched in version 4.0.1.

Risk Information
cvss3
Base: 9.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Description

Apollo Studio Embeddable Explorer & Embeddable Sandbox are website embeddable software solutions from Apollo GraphQL. Prior to Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3, a cross-site request forgery (CSRF) vulnerability was identified. The vulnerability arises from missing origin validation in the client-side code that handles window.postMessage events. A malicious website can send forged messages to the embedding page, causing the victim’s browser to execute arbitrary GraphQL queries or mutations against their GraphQL server while authenticated with the victim’s cookies. This issue has been patched in Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3.

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N
Description

A security vulnerability has been detected in Portabilis i-Educar up to 2.10. Affected by this vulnerability is an unknown functionality of the file /consulta-dispensas. Such manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in Portabilis i-Educar up to 2.10. Affected is an unknown function of the file /module/Api/aluno. This manipulation of the argument aluno_id causes improper authorization. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tencent WeKnora 0.1.0. This impacts the function testEmbeddingModel of the file /api/v1/initialization/embedding/test. The manipulation of the argument baseUrl results in server-side request forgery. The attack can be launched remotely. The exploit has been released to the public and may be exploited. It is advisable to upgrade the affected component. The vendor responds: "We have confirmed that the issue mentioned in the report does not exist in the latest releases".

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X