Comparison Overview

Samsung SDS

VS

Atos

Samsung SDS

Samsung SDS 125, Olympic-ro 35-gil, Songpa-gu, Seoul, undefined, 05510, KR
Last Update: 2025-12-01
Between 750 and 799

Samsung SDS provides cloud computing and digital logistics services. We build an optimized cloud environment with Samsung Cloud Platform specialized for businesses, provide all-in-one management service based on 38 years of expertise in each industry, and boost work efficiency and customer service with our SaaS solution, which proved successful in many use cases. Your only partner to present a reasonable answer to the complex challenge of digital transformation is Samsung SDS. Samsung SDS prides itself in leading IT innovation in Korea for over years while spending every year evolving to meet the needs of our clients and changing times. Our constant effort put us 21st in 2021 Gartner Global IT Service Business, and 1st in Manufacturing IT. We have also been named the 12th Most Valuable Global IT Services Brand by Brand Finance UK in 2023, showing how we have grown into a global top-tier company. Samsung SDS offers cloud-based digital transformation services with distinguished cloud technology and rich industry experience. We are recognized by global consultants such as Gartner, IDC, and Frost & Sullivan in their lists of Managed Cloud Services, Cloud Security, and AI Industry as a specialized cloud service company supporting clients' digital innovation.

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 14,493
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Atos

80 Quai Voltaire, 95877 Bezons, FR
Last Update: 2025-12-01
Between 750 and 799

Atos Group is a global leader in digital transformation with c. 70,000 employees and annual revenue of c. € 10 billion, operating in 67 countries under two brands — Atos for services and Eviden for products. European number one in cybersecurity, cloud and high-performance computing, Atos Group is committed to a secure and decarbonized future and provides tailored AI-powered, end-to-end solutions for all industries. Atos is a SE (Societas Europaea) and listed on Euronext Paris. The purpose of Atos is to help design the future of the information space. Its expertise and services support the development of knowledge, education and research in a multicultural approach and contribute to the development of scientific and technological excellence. Across the world, the Group enables its customers and employees, and members of societies at large to live, work and develop sustainably, in a safe and secure information space.

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 77,740
Subsidiaries: 6
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/samsung-sds.jpeg
Samsung SDS
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/atos.jpeg
Atos
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Samsung SDS
100%
Compliance Rate
0/4 Standards Verified
Atos
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Samsung SDS in 2025.

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Atos in 2025.

Incident History — Samsung SDS (X = Date, Y = Severity)

Samsung SDS cyber incidents detection timeline including parent company and subsidiaries

Incident History — Atos (X = Date, Y = Severity)

Atos cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/samsung-sds.jpeg
Samsung SDS
Incidents

No Incident

https://images.rankiteo.com/companyimages/atos.jpeg
Atos
Incidents

No Incident

FAQ

Samsung SDS company demonstrates a stronger AI Cybersecurity Score compared to Atos company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Atos company has disclosed a higher number of cyber incidents compared to Samsung SDS company.

In the current year, Atos company and Samsung SDS company have not reported any cyber incidents.

Neither Atos company nor Samsung SDS company has reported experiencing a ransomware attack publicly.

Neither Atos company nor Samsung SDS company has reported experiencing a data breach publicly.

Neither Atos company nor Samsung SDS company has reported experiencing targeted cyberattacks publicly.

Neither Samsung SDS company nor Atos company has reported experiencing or disclosing vulnerabilities publicly.

Neither Samsung SDS nor Atos holds any compliance certifications.

Neither company holds any compliance certifications.

Atos company has more subsidiaries worldwide compared to Samsung SDS company.

Atos company employs more people globally than Samsung SDS company, reflecting its scale as a IT Services and IT Consulting.

Neither Samsung SDS nor Atos holds SOC 2 Type 1 certification.

Neither Samsung SDS nor Atos holds SOC 2 Type 2 certification.

Neither Samsung SDS nor Atos holds ISO 27001 certification.

Neither Samsung SDS nor Atos holds PCI DSS certification.

Neither Samsung SDS nor Atos holds HIPAA certification.

Neither Samsung SDS nor Atos holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Monkeytype is a minimalistic and customizable typing test. In 25.49.0 and earlier, there is improper handling of user input which allows an attacker to execute malicious javascript on anyone viewing a malicious quote submission. quote.text and quote.source are user input, and they're inserted straight into the DOM. If they contain HTML tags, they will be rendered (after some escaping using quotes and textarea tags).

Risk Information
cvss4
Base: 7.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

SysReptor is a fully customizable pentest reporting platform. Prior to 2025.102, there is a Stored Cross-Site Scripting (XSS) vulnerability allows authenticated users to execute malicious JavaScript in the context of other logged-in users by uploading malicious JavaScript files in the web UI. This vulnerability is fixed in 2025.102.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Description

Taiko Alethia is an Ethereum-equivalent, permissionless, based rollup designed to scale Ethereum without compromising its fundamental properties. In 2.3.1 and earlier, TaikoInbox._verifyBatches (packages/protocol/contracts/layer1/based/TaikoInbox.sol:627-678) advanced the local tid to whatever transition matched the current blockHash before knowing whether that batch would actually be verified. When the loop later broke (e.g., cooldown window not yet passed or transition invalidated), the function still wrote that newer tid into batches[lastVerifiedBatchId].verifiedTransitionId after decrementing batchId. Result: the last verified batch could end up pointing at a transition index from the next batch (often zeroed), corrupting the verified chain pointer.

Risk Information
cvss4
Base: 8.0
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function getById/updateAddress/deleteAddress of the file /mall-ums/app-api/v1/addresses/. Executing manipulation can lead to improper control of dynamically-identified variables. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X