Comparison Overview

SmarterTools

VS

Thomson Reuters

SmarterTools

1903 W. Parkside Lane, #106, Phoenix, 85027, US
Last Update: 2025-12-31

Founded in 2003, SmarterTools Inc. is an information technology management software company that builds applications to help companies communicate, measure, and support their worldwide business operations. SmarterTools products serve thousands of companies across the globe in a broad base of market segments—including those in the technology, financial, education, and hosting industries. Today, SmarterTools has more than 15 million end users and a strong, global network of channel partnerships. In addition, SmarterTools has targeted various small and enterprise-level businesses, Web hosts, and service providers to grow its install base to include customers in more than 100 countries. With industry-leading products, a strong financial position, an international customer base, and enviable referral and retention rates, SmarterTools is aligned to remain an industry leader now and for years to come.

NAICS: 5112
NAICS Definition: Software Publishers
Employees: 23
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

Thomson Reuters

19 Duncan Street , Toronto, ON, M5H 3G6, CA
Last Update: 2025-12-25
Between 750 and 799

Thomson Reuters is the world’s leading provider of news and information-based tools to professionals. Our worldwide network of journalists and specialist editors keep customers up to speed on global developments, with a particular focus on legal, regulatory and tax changes. Our customers operate in complex arenas that move society forward — tax, law, compliance, government, media. In a disruptive digital age, we help professionals reinvent themselves. Thomson Reuters shares are listed on the Toronto and New York Stock Exchanges (symbol: TRI).

NAICS: 5112
NAICS Definition: Software Publishers
Employees: 35,141
Subsidiaries: 26
12-month incidents
0
Known data breaches
1
Attack type number
2

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/smartertools.jpeg
SmarterTools
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/thomson-reuters.jpeg
Thomson Reuters
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
SmarterTools
100%
Compliance Rate
0/4 Standards Verified
Thomson Reuters
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for SmarterTools in 2026.

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for Thomson Reuters in 2026.

Incident History — SmarterTools (X = Date, Y = Severity)

SmarterTools cyber incidents detection timeline including parent company and subsidiaries

Incident History — Thomson Reuters (X = Date, Y = Severity)

Thomson Reuters cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/smartertools.jpeg
SmarterTools
Incidents

Date Detected: 12/2025
Type:Vulnerability
Attack Vector: Unauthenticated arbitrary file upload
Blog: Blog
https://images.rankiteo.com/companyimages/thomson-reuters.jpeg
Thomson Reuters
Incidents

Date Detected: 01/2024
Type:Cyber Attack
Attack Vector: Unspecified Infiltration
Motivation: Retaliation for a cyber attack by Russia against Kyivstar
Blog: Blog

Date Detected: 10/2022
Type:Breach
Attack Vector: Unsecured Database
Blog: Blog

FAQ

Thomson Reuters company demonstrates a stronger AI Cybersecurity Score compared to SmarterTools company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Thomson Reuters company has faced a higher number of disclosed cyber incidents historically compared to SmarterTools company.

In the current year, Thomson Reuters company and SmarterTools company have not reported any cyber incidents.

Neither Thomson Reuters company nor SmarterTools company has reported experiencing a ransomware attack publicly.

Thomson Reuters company has disclosed at least one data breach, while SmarterTools company has not reported such incidents publicly.

Thomson Reuters company has reported targeted cyberattacks, while SmarterTools company has not reported such incidents publicly.

SmarterTools company has disclosed at least one vulnerability, while Thomson Reuters company has not reported such incidents publicly.

Neither SmarterTools nor Thomson Reuters holds any compliance certifications.

Neither company holds any compliance certifications.

Thomson Reuters company has more subsidiaries worldwide compared to SmarterTools company.

Thomson Reuters company employs more people globally than SmarterTools company, reflecting its scale as a Software Development.

Neither SmarterTools nor Thomson Reuters holds SOC 2 Type 1 certification.

Neither SmarterTools nor Thomson Reuters holds SOC 2 Type 2 certification.

Neither SmarterTools nor Thomson Reuters holds ISO 27001 certification.

Neither SmarterTools nor Thomson Reuters holds PCI DSS certification.

Neither SmarterTools nor Thomson Reuters holds HIPAA certification.

Neither SmarterTools nor Thomson Reuters holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in MadrasThemes MAS Videos allows PHP Local File Inclusion.This issue affects MAS Videos: from n/a through 1.3.2.

Risk Information
cvss3
Base: 7.5
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

Cross-Site Request Forgery (CSRF) vulnerability in Hoernerfranz WP-CalDav2ICS allows Stored XSS.This issue affects WP-CalDav2ICS: from n/a through 1.3.4.

Risk Information
cvss3
Base: 7.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Description

Ksenia Security Lares 4.0 Home Automation version 1.6 contains a critical security flaw that exposes the alarm system PIN in the 'basisInfo' XML file after authentication. Attackers can retrieve the PIN from the server response to bypass security measures and disable the alarm system without additional authentication.

Risk Information
cvss3
Base: 9.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 9.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Ksenia Security Lares 4.0 Home Automation version 1.6 contains an unprotected endpoint vulnerability that allows authenticated attackers to upload MPFS File System binary images. Attackers can exploit this vulnerability to overwrite flash program memory and potentially execute arbitrary code on the home automation system's web server.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 8.5
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Ksenia Security Lares 4.0 version 1.6 contains a URL redirection vulnerability in the 'cmdOk.xml' script that allows attackers to manipulate the 'redirectPage' GET parameter. Attackers can craft malicious links that redirect authenticated users to arbitrary websites when clicking on a specially constructed link hosted on a trusted domain.

Risk Information
cvss3
Base: 8.0
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X