Comparison Overview

NEC Visual Communications

VS

AZ Litho

NEC Visual Communications

Fryers Road, Walsall, undefined, WS2 7LZ, GB
Last Update: 2025-12-11
Between 750 and 799

Welcome to NEC Graph-fix. We were originally established in 1997 and are one of the most dynamic & versatile visual communication specialists in the UK. We provide end to end solutions for the Outdoor and Retail Display sectors. Our comprehensive in-house printing capabilities and detailed understanding of fabrics allow us to create displays which are tailored towards the needs of today’s brands. We can effectively help you to deliver your in-store and outdoor campaign, from a large format roadside poster outside the supermarket, to an off-the-shelf promotional display at the point of purchase. In the ever changing retail display market, we offer value, integrity, and innovation. Innovation We are an innovation-driven business, and restless about staying ahead of the curve. Our most recent acquisitions include a totally eco-friendly Duratran solution and a card based POS, which can withstand two years life in-store. Our aim is to help our customer be first to market with technology that really makes a difference. Value We strive to offer our customers the best possible value for their budget. With over 20 years in the industry, we are well equipped to advise the best materials and processes for the job. Integrity We do things properly. It’s important to us that you feel confident in leaving your work in our hands. Every customer receives their own dedicated account manager, to ensure your project runs smoothly and to budget. #OutdoorMedia #InStore #FSDU #3DDisplay #Printing #LargeFormatPrinting

NAICS: 323
NAICS Definition: Printing and Related Support Activities
Employees: 14
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

AZ Litho

383 N. Commerce Park Loop, Tucson, Arizona, 85745, US
Last Update: 2025-12-10
Between 750 and 799

AZ Litho is setting the bar high for eco-friendly businesses. This quality and customer service minded printing company is U.S. EPA Energy-Star certified, Green Seal certified, Clean Watts certified, and an EPA Green Power Partner. Beyond those stellar certifications, AZ Litho is powered by 100 percent renewable energy resources, and uses eco-friendly vegetable oil-based inks in its work. The company recycles a wide variety of materials, and utilizes water-soluble chemicals in its printing process. AZ Litho's award-winning work includes Builder Magazine, a quarterly publication produced for the Southern Arizona Home Builders Association (SAHBA). The magazine recently was recognized by the U.S. Environmental Protection Agency as an official "green"​ publication.

NAICS: 323
NAICS Definition:
Employees: 28
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/nec-graphfix.jpeg
NEC Visual Communications
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/arizona-lithographers.jpeg
AZ Litho
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
NEC Visual Communications
100%
Compliance Rate
0/4 Standards Verified
AZ Litho
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Printing Services Industry Average (This Year)

No incidents recorded for NEC Visual Communications in 2025.

Incidents vs Printing Services Industry Average (This Year)

No incidents recorded for AZ Litho in 2025.

Incident History — NEC Visual Communications (X = Date, Y = Severity)

NEC Visual Communications cyber incidents detection timeline including parent company and subsidiaries

Incident History — AZ Litho (X = Date, Y = Severity)

AZ Litho cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/nec-graphfix.jpeg
NEC Visual Communications
Incidents

No Incident

https://images.rankiteo.com/companyimages/arizona-lithographers.jpeg
AZ Litho
Incidents

No Incident

FAQ

AZ Litho company demonstrates a stronger AI Cybersecurity Score compared to NEC Visual Communications company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, AZ Litho company has disclosed a higher number of cyber incidents compared to NEC Visual Communications company.

In the current year, AZ Litho company and NEC Visual Communications company have not reported any cyber incidents.

Neither AZ Litho company nor NEC Visual Communications company has reported experiencing a ransomware attack publicly.

Neither AZ Litho company nor NEC Visual Communications company has reported experiencing a data breach publicly.

Neither AZ Litho company nor NEC Visual Communications company has reported experiencing targeted cyberattacks publicly.

Neither NEC Visual Communications company nor AZ Litho company has reported experiencing or disclosing vulnerabilities publicly.

Neither NEC Visual Communications nor AZ Litho holds any compliance certifications.

Neither company holds any compliance certifications.

Neither NEC Visual Communications company nor AZ Litho company has publicly disclosed detailed information about the number of their subsidiaries.

AZ Litho company employs more people globally than NEC Visual Communications company, reflecting its scale as a Printing Services.

Neither NEC Visual Communications nor AZ Litho holds SOC 2 Type 1 certification.

Neither NEC Visual Communications nor AZ Litho holds SOC 2 Type 2 certification.

Neither NEC Visual Communications nor AZ Litho holds ISO 27001 certification.

Neither NEC Visual Communications nor AZ Litho holds PCI DSS certification.

Neither NEC Visual Communications nor AZ Litho holds HIPAA certification.

Neither NEC Visual Communications nor AZ Litho holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.

Risk Information
cvss4
Base: 8.6
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N