Comparison Overview

SARSTEDT Group

VS

Danaher Corporation

SARSTEDT Group

SarstedtstraรŸe 1, Nรผmbrecht, NRW, 51588, DE
Last Update: 2025-03-07 (UTC)
Between 900 and 1000

Excellent

We develop, produce and sell devices and consumables for medicine and science. SARSTEDT is known as one of the leading providers in this sector worldwide. Ever since the companyโ€™s foundation in 1961, we have continued to grow to the point where we now employ a workforce of 2,900. Our SARSTEDT Group with its head office in Nรผmbrecht (Germany), North Rhine-Westphalia, comprises 34 sales organisations and 14 production sites in Europe, Australia, North and South America. Quality "Made in Germany"โ€‹ Our customers can rely on high-quality and high-performance products. "We always develop solutions characterised by ease of use, safety and the latest technology,"โ€‹ highlights the Sarstedt family, who own the Group. In order to continue to ensure this in the future, sustainable and intensive investments have been made in our national and international locations in the past few years. The high demand for quality, continuous development work, committed and very well trained employees and automated processes are the components which make up our excellent quality "Made in Germanyโ€. We offer services under one roof โ€“ from the initial idea through to sales. The majority of our products are developed in our Development Centre. Approximately 90 per cent of our products are manufactured at our own production sites and sold around the world for the most part through our own sales organisations. In this way, we are able to achieve the highest level of quality, delivery capability and product support all under one roof. As a responsibly managed family-owned company, we feel obliged to act beyond our business objective to the benefit of society. Our products increase patient and user comfort, make laboratory work more efficient and, in this way, help to improve healthcare worldwide in the long term.

NAICS: 339
NAICS Definition:
Employees: 676
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Danaher Corporation

2200 Pennsylvania Ave NW, Washington, District of Columbia, 20037, US
Last Update: 2025-03-04 (UTC)

Excellent

Between 900 and 1000

Danaher is a leading global life sciences and diagnostics innovator, committed to accelerating the power of science and technology to improve human health. We partner with customers across the globe to help them solve their most complex challenges, architecting solutions that bring the power of science to life. Our global teams are pioneering whatโ€™s next across Life Sciences, Diagnostics, Biotechnology and beyond. For more information, visit www.danaher.com.

NAICS: 3391
NAICS Definition: Medical Equipment and Supplies Manufacturing
Employees: 53,849
Subsidiaries: 43
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/sarstedt-group.jpeg
SARSTEDT Group
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/danaher.jpeg
Danaher Corporation
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
SARSTEDT Group
100%
Compliance Rate
0/4 Standards Verified
Danaher Corporation
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Medical Equipment Manufacturing Industry Average (This Year)

No incidents recorded for SARSTEDT Group in 2025.

Incidents vs Medical Equipment Manufacturing Industry Average (This Year)

No incidents recorded for Danaher Corporation in 2025.

Incident History โ€” SARSTEDT Group (X = Date, Y = Severity)

SARSTEDT Group cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Danaher Corporation (X = Date, Y = Severity)

Danaher Corporation cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/sarstedt-group.jpeg
SARSTEDT Group
Incidents

No Incident

https://images.rankiteo.com/companyimages/danaher.jpeg
Danaher Corporation
Incidents

No Incident

FAQ

Both SARSTEDT Group company and Danaher Corporation company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Danaher Corporation company has disclosed a higher number of cyber incidents compared to SARSTEDT Group company.

In the current year, Danaher Corporation company and SARSTEDT Group company have not reported any cyber incidents.

Neither Danaher Corporation company nor SARSTEDT Group company has reported experiencing a ransomware attack publicly.

Neither Danaher Corporation company nor SARSTEDT Group company has reported experiencing a data breach publicly.

Neither Danaher Corporation company nor SARSTEDT Group company has reported experiencing targeted cyberattacks publicly.

Neither SARSTEDT Group company nor Danaher Corporation company has reported experiencing or disclosing vulnerabilities publicly.

Danaher Corporation company has more subsidiaries worldwide compared to SARSTEDT Group company.

Danaher Corporation company employs more people globally than SARSTEDT Group company, reflecting its scale as a Medical Equipment Manufacturing.

Latest Global CVEs (Not Company-Specific)

Description

Volto is a ReactJS-based frontend for the Plone Content Management System. Versions 16.34.0 and below, 17.0.0 through 17.22.1, 18.0.0 through 18.27.1, and 19.0.0-alpha.1 through 19.0.0-alpha.5, an anonymous user could cause the NodeJS server part of Volto to quit with an error when visiting a specific URL. This issue is fixed in versions 16.34.1, 17.22.2, 18.27.2 and 19.0.0-alpha.6.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Traccar is an open source GPS tracking system. Default installs of Traccar on Windows between versions 6.1- 6.8.1 and non default installs between versions 5.8 - 6.0 are vulnerable to unauthenticated local file inclusion attacks which can lead to leakage of passwords or any file on the file system including the Traccar configuration file. Versions 5.8 - 6.0 are only vulnerable if <entry key='web.override'>./override</entry> is set in the configuration file. Versions 6.1 - 6.8.1 are vulnerable by default as the web override is enabled by default. The vulnerable code is removed in version 6.9.0.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Stalwart is a mail and collaboration server. Versions 0.13.3 and below contain an unbounded memory allocation vulnerability in the IMAP protocol parser which allows remote attackers to exhaust server memory, potentially triggering the system's out-of-memory (OOM) killer and causing a denial of service. The CommandParser implementation enforces size limits on its dynamic buffer in most parsing states, but several state handlers omit these validation checks. This issue is fixed in version 0.13.4. A workaround for this issue is to implement rate limiting and connection monitoring at the network level, however this does not provide complete protection.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain a Broken Access Control vulnerability, identified in the get_relatorios_socios.php endpoint. This vulnerability allows unauthenticated attackers to directly access sensitive personal and financial information of members without requiring authentication or authorization. This issue is fixed in version 3.5.0.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain an Open Redirect vulnerability, identified in the control.php endpoint, specifically in the nextPage parameter (metodo=listarUmnomeClasse=FuncionarioControle). This vulnerability allows attackers to redirect users to arbitrary external domains, enabling phishing campaigns, malicious payload distribution, or user credential theft. This issue is fixed in version 3.5.0.

Risk Information
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X