Company Details
smith-engineering-inc-
17
1,444
None
smithengineeringinc.com
0
SMI_3135144
In-progress

Smith Engineering Inc. Company CyberSecurity Posture
smithengineeringinc.comSmith Engineering manufactures custom high purity water treatment equipment, supports all water treatment equipment with a fleet of field service technicians, and distributes products utilized in high purity process environments. Our manufacturing arm designs and builds treatment equipment with the precise requirements of our customer in mind. We offer no standard product line; our finished products are the result of process and purity requirements determined by our customer and our extensive knowledge of water purity requirements particular to given applications/industries. Medical Device, Biomedical and Microelectronics are key markets. Our service division is made up of veteran field technicians that average over 15 years of employment with the company. We offer on call and contracted service and are available to support your maintenance/repair requirements 24 hours a day, 7 days per week. Additionally, our route DI service represents a substantial portion of our service capability. Our in house regeneration plant allows us to quickly respond to all service requirements and provide ½ day service in most cases. Distributed Products have become a strength for Smith Engineering. Process Filtration and Piping, Instrumentation, Flow Control and Instrumentation, as well as Ultraviolet Technology make up only a portion of our distributed product offering. Most products are stocked in our Chaska, MN warehouse and available for same day shipping.
Company Details
smith-engineering-inc-
17
1,444
None
smithengineeringinc.com
0
SMI_3135144
In-progress
Between 750 and 799

SEI Global Score (TPRM)XXXX



No incidents recorded for Smith Engineering Inc. in 2025.
No incidents recorded for Smith Engineering Inc. in 2025.
No incidents recorded for Smith Engineering Inc. in 2025.
SEI cyber incidents detection timeline including parent company and subsidiaries

Smith Engineering manufactures custom high purity water treatment equipment, supports all water treatment equipment with a fleet of field service technicians, and distributes products utilized in high purity process environments. Our manufacturing arm designs and builds treatment equipment with the precise requirements of our customer in mind. We offer no standard product line; our finished products are the result of process and purity requirements determined by our customer and our extensive knowledge of water purity requirements particular to given applications/industries. Medical Device, Biomedical and Microelectronics are key markets. Our service division is made up of veteran field technicians that average over 15 years of employment with the company. We offer on call and contracted service and are available to support your maintenance/repair requirements 24 hours a day, 7 days per week. Additionally, our route DI service represents a substantial portion of our service capability. Our in house regeneration plant allows us to quickly respond to all service requirements and provide ½ day service in most cases. Distributed Products have become a strength for Smith Engineering. Process Filtration and Piping, Instrumentation, Flow Control and Instrumentation, as well as Ultraviolet Technology make up only a portion of our distributed product offering. Most products are stocked in our Chaska, MN warehouse and available for same day shipping.


Berotec är en plattform för entreprenöriellt företagande. Inom Berotecs sfär samlas ingenjörssverige för att verka, lära och utvecklas nära varandra, oavsett om man är kund eller konsult. Entreprenörskapet är kärnan i verksamheten – vi bygger företag tillsammans och är ett drivhus f

Detail Oriented, Technology Driven: We are a full service Plastic Injection Mold manufacturing company. We design, engineer Plastic Injection Molds, Trim Dies, Contract Machining, Wire & Sinker EDM, Fixtures, Specialty Machines and Laser Welding. Our experience includes modeling/prototyping and re

Por más de 25 años, ABASTERM S.A. ha sido sinónimo de respaldo y confianza en productos y servicio técnico para sus equipos térmicos, calderas y quemadores Misión: Superar las expectativas de nuestros clientes brindándoles confianza y un férreo compromiso. Por lo cual trabajamos agregando valor

Hill Engineering Inc., founded in 1990, is run by the father and son team of Chuck and Ted Hill. Both are licensed professional engineers specializing in the mechanical aspects of product design and development. Supported by a loyal core of clients, Hill Engineering provides engineering services, sp

MECAWA est une entreprise familiale belge spécialisée dans la conception, la production et l'installation d'ensembles et sous-ensembles mécanosoudés pour divers secteurs d'activités. De dimension humaine, nous vous offrons une relation personnalisée pour assurer une souplesse d'action et une rapidi

Welcome to Antifriction, the UK's premier supplier of high-quality bearings, power transmission components, and fluid power products. Since our establishment in 1976, we have been dedicated to helping our customers across various industries enhance their profitability through innovative and cost-eff
.png)
GREENWOOD VILLAGE, CO – November 19, 2025 – PRESSADVANTAGE –. Mountaintop Web Design announced today that it has reached its 12-year anniversary,...
Hacker's Movie Guide” with Foreword by Steve Wozniak, co-founder of Apple.
The University of Alabama System Board of Trustees approved budgets and contracts for two major projects on the UAH campus last week.
Ransomware attacks jumped by 46% from Q4 2024 to Q1 2025, according to Honeywell's (Nasdaq: HON) new 2025 Cybersecurity Threat Report.
Business Insider spoke to six cybersecurity recruiting experts to hear which companies are considered the top names to have on your résumé.
Cyber news in February 2025 was dominated by some egregious attacks (particularly impacting the crypto, healthcare and education sectors).
As we celebrate International Women's Day this March, we spotlight 10 trailblazing women who are shaping the future of the cybersecurity industry.
The incident comes after an attack on another company in the sector.
UK engineering firm IMI says it suffered a cyberattack that resulted in unauthorized access to some of its systems.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Smith Engineering Inc. is http://www.smithengineeringinc.com.
According to Rankiteo, Smith Engineering Inc.’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.
According to Rankiteo, Smith Engineering Inc. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Smith Engineering Inc. is not certified under SOC 2 Type 1.
According to Rankiteo, Smith Engineering Inc. does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Smith Engineering Inc. is not listed as GDPR compliant.
According to Rankiteo, Smith Engineering Inc. does not currently maintain PCI DSS compliance.
According to Rankiteo, Smith Engineering Inc. is not compliant with HIPAA regulations.
According to Rankiteo,Smith Engineering Inc. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Smith Engineering Inc. operates primarily in the Mechanical Or Industrial Engineering industry.
Smith Engineering Inc. employs approximately 17 people worldwide.
Smith Engineering Inc. presently has no subsidiaries across any sectors.
Smith Engineering Inc.’s official LinkedIn profile has approximately 1,444 followers.
No, Smith Engineering Inc. does not have a profile on Crunchbase.
Yes, Smith Engineering Inc. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/smith-engineering-inc-.
As of November 27, 2025, Rankiteo reports that Smith Engineering Inc. has not experienced any cybersecurity incidents.
Smith Engineering Inc. has an estimated 2,061 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Smith Engineering Inc. has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.