Company Details
marquis-data
16
1,193
5112
marquisdata.com
0
MAR_8719928
In-progress

Marquis Data Company CyberSecurity Posture
marquisdata.comHome of Marquis IQ - the world’s first data and analytics platform built for mid-market businesses. Connect your ERP(s) and start making better decisions, faster! Whether it’s Quote to Cash, Supply Chain, SIOP, FP&A, or any other business workstream, we connect you directly to your data to maximize your decision making. With Marquis IQ - you can!
Company Details
marquis-data
16
1,193
5112
marquisdata.com
0
MAR_8719928
In-progress
Between 650 and 699

Marquis Data Global Score (TPRM)XXXX

Description: What's Going On? Attorneys need to hear from people affected by the Marquis data breach as they investigate whether a class action lawsuit can be filed. What You Can Do If you believe your information may have been compromised in the Marquis data breach, fill out the form on this page to learn more about the investigation and how you can help. Does This Cost Anything? It costs nothing to get in touch or to talk to someone about your rights.


Marquis Data has 132.56% more incidents than the average of same-industry companies with at least one recorded incident.
Marquis Data has 56.25% more incidents than the average of all companies with at least one recorded incident.
Marquis Data reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
Marquis Data cyber incidents detection timeline including parent company and subsidiaries

Home of Marquis IQ - the world’s first data and analytics platform built for mid-market businesses. Connect your ERP(s) and start making better decisions, faster! Whether it’s Quote to Cash, Supply Chain, SIOP, FP&A, or any other business workstream, we connect you directly to your data to maximize your decision making. With Marquis IQ - you can!


On the Fulfillment Technologies & Robotics Team, we build dynamic partnerships between people and intelligent machines. This intricate collaboration helps Amazon fulfill orders with unmatched accuracy. Since we began working with robotics, we've added over a million new jobs worldwide. Working in s

NiCE is transforming the world with AI that puts people first. Our purpose-built AI-powered platforms automate engagements into proactive, safe, intelligent actions, empowering individuals and organizations to innovate and act, from interaction to resolution. Trusted by organizations throughout 150
Founded in 2003, LinkedIn connects the world's professionals to make them more productive and successful. With more than 1 billion members worldwide, including executives from every Fortune 500 company, LinkedIn is the world's largest professional network. The company has a diversified business mode

Olá, somos a TOTVS! A maior empresa de tecnologia do Brasil. 🤓 Líder absoluta em sistemas e plataformas para empresas, a TOTVS possui mais de 70 mil clientes. Indo muito além do ERP, oferece tecnologia completa para digitalização dos negócios por meio de 3 unidades de negócio: - Gestão: ERPs, sol
As a global leader in business cloud software specialized by industry. Infor develops complete solutions for its focus industries, including industrial manufacturing, distribution, healthcare, food & beverage, automotive, aerospace & defense, hospitality, and high tech. Infor’s mission-critical ente

Cox Automotive is the world’s largest automotive services and technology provider. Fueled by the largest breadth of first-party data fed by 2.3 billion online interactions a year, Cox Automotive tailors leading solutions for car shoppers, auto manufacturers, dealers, lenders and fleets. The company
Daraz is the leading e-commerce marketplace across South Asia (excluding India). Our business covers four key areas – e-commerce, logistics, payment infrastructure and financial services – providing our sellers and customers with an end-to-end commerce solution. With access to over 500 million custo
Atlassian powers the collaboration that helps teams accomplish what would otherwise be impossible alone. From space missions and motor racing to bugs in code and IT requests, no task is too large or too small with the right team, the right tools, and the right practices. Over 300,000 global compa
SS&C is a leading global provider of mission-critical, cloud-based software and solutions for the financial and healthcare industries. Named to the Fortune 1000 list as a top U.S. company based on revenue, SS&C (NASDAQ: SSNC) is a trusted provider to more than 20,000 financial services and healthcar
.png)
CoVantage Credit Union disclosed that a data breach at its service provider, Marquis, compromised sensitive personal information for 160000...
Strauss Borrelli PLLC, a leading data breach law firm, is investigating Marquis Software Solutions, Inc. (“Marquis”) regarding its recent...
If your information was compromised in the Marquis data breach, you may be able to start a class action to collect money for the harm you've...
ANTIGO, Wis.—CoVantage Credit Union is notifying members of a significant third-party data breach after its marketing vendor, Marquis...
Norway Savings Bank disclosed that a data breach at its service provider, Marquis, compromised sensitive personal information for 51000...
Data breach at Marquis Software impacts CoVantage Credit Union members, exposing sensitive personal info including SSNs and financial data.
If you were affected by the CoVantage Credit Union and Marquis Software Solutions data breach, you may be entitled to compensation.
He provides advisory services and oversees independent assessments of cloud service offerings destined for use by Federal Agencies and...
Rami Al Idrissi is a highly accomplished engineer and a forward-thinking leader with extensive expertise in Operational Technology (OT) and...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Marquis Data is www.marquisdata.com.
According to Rankiteo, Marquis Data’s AI-generated cybersecurity score is 686, reflecting their Weak security posture.
According to Rankiteo, Marquis Data currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Marquis Data is not certified under SOC 2 Type 1.
According to Rankiteo, Marquis Data does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Marquis Data is not listed as GDPR compliant.
According to Rankiteo, Marquis Data does not currently maintain PCI DSS compliance.
According to Rankiteo, Marquis Data is not compliant with HIPAA regulations.
According to Rankiteo,Marquis Data is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Marquis Data operates primarily in the Software Development industry.
Marquis Data employs approximately 16 people worldwide.
Marquis Data presently has no subsidiaries across any sectors.
Marquis Data’s official LinkedIn profile has approximately 1,193 followers.
Marquis Data is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, Marquis Data does not have a profile on Crunchbase.
Yes, Marquis Data maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/marquis-data.
As of December 03, 2025, Rankiteo reports that Marquis Data has experienced 1 cybersecurity incidents.
Marquis Data has an estimated 27,105 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.
FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).
PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.
NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.
NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.