Comparison Overview

TF Fulfillment

VS

Warehouse Services, Inc.

TF Fulfillment

Lebanon, 46052, US
Last Update: 2025-12-19
Between 750 and 799

3PL Storage & Warehousing, Fulfillment Services, E-commerce, Subscription Box Kitting, Order Processing, Amazon Prep and more! TF Fulfillment, a division of TFI, Inc., is a third-party warehouse and fulfillment company strategically located in Lebanon (Indianapolis metro), Indiana. We efficiently service the entire United States and international markets. Our secure, climate-controlled building has 170,000 square feet and is located one mile from Interstate 65. Since 1996, we have been shipping direct to consumers as well as retailers like Walmart, Target, Kohl's, Kroger, Walgreens, CVS, Rite Aid, Michaels, Sam's Club, Costco, Staples, Office Depot, Meijer, Big Lots, Safeway, and e-commerce - Amazon, Amazon FBA, Ebay, Jet, Walmart.com, Staples.com, Zulily, and many more. Our Midwest location allows our clients to centralize their inventory and put products in customers' hands quicker. We offer a full suite of services to meet your needs now and in the future - from receipt of your inventory to delighting your customers with their order. Our service goal is have all web orders picked, packed and shipped within 24 hours. We are your fulfillment center NOW and as you grow. Warehousing Short & Long Term Storage Conveniently Located just off Interstate 65 Flexible Space & Labor 180,000 square feet of clean, temperature controlled, secure space Cross-docking Fulfillment B2B (Retail) Order Fulfillment B2C (Web) Order Fulfillment Packaging / Re-Packaging Point Of Sale Displays Kitting Product Rework Shrink Wrapping Labeling / Re-Labeling Sorting and Inspection Bagging/Heat Sealing Subscription Box Amazon FBA Prep Distribution Centrally Located in U.S. – Faster Ship Times – Cheaper Freight Costs B2B – FTL/LTL – UPS/FedEx B2C – UPS/FedEx – USPS

NAICS: None
NAICS Definition: Others
Employees: 6
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Warehouse Services, Inc.

58 South Burty Road, Piedmont, South Carolina, 29673, US
Last Update: 2025-12-20

As a privately held, Certified WBE, Warehouse Services, Inc. (WSI) has national 3PL coverage offering warehousing, transportation and added value services for many Fortune 100 and 500 Companies. Currently WSI has over 100 operations in 18 states with a strong presence in the West, Mid-West, South, and South East U.S. Utilizing 6-sigma methodology WSI's expertise is proven in distribution, client system integration and domestic and international supply chain (SC) enhancement. The WSI Consultant Team is available to evaluate your current SC, determine risk and efficiency variables and identify opportunities for improvement; the WSI asset management team can bring flexible asset utilization allowing for business challenges and variability; and the WSI operational team will meet your day-to-day operational excellence requirements. WSI - an aggressive solution driven supply chain partner.

NAICS: None
NAICS Definition: Others
Employees: 2,438
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/tf-fulfillment.jpeg
TF Fulfillment
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/warehouse-services-inc-.jpeg
Warehouse Services, Inc.
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
TF Fulfillment
100%
Compliance Rate
0/4 Standards Verified
Warehouse Services, Inc.
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Warehousing Industry Average (This Year)

No incidents recorded for TF Fulfillment in 2025.

Incidents vs Warehousing Industry Average (This Year)

No incidents recorded for Warehouse Services, Inc. in 2025.

Incident History — TF Fulfillment (X = Date, Y = Severity)

TF Fulfillment cyber incidents detection timeline including parent company and subsidiaries

Incident History — Warehouse Services, Inc. (X = Date, Y = Severity)

Warehouse Services, Inc. cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/tf-fulfillment.jpeg
TF Fulfillment
Incidents

No Incident

https://images.rankiteo.com/companyimages/warehouse-services-inc-.jpeg
Warehouse Services, Inc.
Incidents

No Incident

FAQ

Warehouse Services, Inc. company demonstrates a stronger AI Cybersecurity Score compared to TF Fulfillment company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Warehouse Services, Inc. company has disclosed a higher number of cyber incidents compared to TF Fulfillment company.

In the current year, Warehouse Services, Inc. company and TF Fulfillment company have not reported any cyber incidents.

Neither Warehouse Services, Inc. company nor TF Fulfillment company has reported experiencing a ransomware attack publicly.

Neither Warehouse Services, Inc. company nor TF Fulfillment company has reported experiencing a data breach publicly.

Neither Warehouse Services, Inc. company nor TF Fulfillment company has reported experiencing targeted cyberattacks publicly.

Neither TF Fulfillment company nor Warehouse Services, Inc. company has reported experiencing or disclosing vulnerabilities publicly.

Neither TF Fulfillment nor Warehouse Services, Inc. holds any compliance certifications.

Neither company holds any compliance certifications.

Neither TF Fulfillment company nor Warehouse Services, Inc. company has publicly disclosed detailed information about the number of their subsidiaries.

Warehouse Services, Inc. company employs more people globally than TF Fulfillment company, reflecting its scale as a Warehousing.

Neither TF Fulfillment nor Warehouse Services, Inc. holds SOC 2 Type 1 certification.

Neither TF Fulfillment nor Warehouse Services, Inc. holds SOC 2 Type 2 certification.

Neither TF Fulfillment nor Warehouse Services, Inc. holds ISO 27001 certification.

Neither TF Fulfillment nor Warehouse Services, Inc. holds PCI DSS certification.

Neither TF Fulfillment nor Warehouse Services, Inc. holds HIPAA certification.

Neither TF Fulfillment nor Warehouse Services, Inc. holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Versa SASE Client for Windows versions released between 7.8.7 and 7.9.4 contain a local privilege escalation vulnerability in the audit log export functionality. The client communicates user-controlled file paths to a privileged service, which performs file system operations without impersonating the requesting user. Due to improper privilege handling and a time-of-check time-of-use race condition combined with symbolic link and mount point manipulation, a local authenticated attacker can coerce the service into deleting arbitrary directories with SYSTEM privileges. This can be exploited to delete protected system folders such as C:\\Config.msi and subsequently achieve execution as NT AUTHORITY\\SYSTEM via MSI rollback techniques.

Risk Information
cvss4
Base: 8.5
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to unauthorized modification of data due to a missing capability check on the 'cs_update_application_status_callback' function in all versions up to, and including, 7.7. This makes it possible for authenticated attackers, with Candidate-level access and above, to inject cross-site scripting into the 'status' parameter of applied jobs for any user.

Risk Information
cvss3
Base: 7.6
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
Description

The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 7.7 via the 'cs_update_application_status_callback' due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Candidate-level access and above, to send a site-generated email with injected HTML to any user.

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Description

The FiboSearch – Ajax Search for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `thegem_te_search` shortcode in all versions up to, and including, 1.32.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This vulnerability requires TheGem theme (premium) to be installed with Header Builder mode enabled, and the FiboSearch "Replace search bars" option enabled for TheGem integration.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Description

The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.0 via the ajax_get_members function. This is due to the use of a predictable low-entropy token (5 hex characters derived from md5 of post ID) to identify member directories and insufficient authorization checks on the unauthenticated AJAX endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including usernames, display names, user roles (including administrator accounts), profile URLs, and user IDs by enumerating predictable directory_id values or brute-forcing the small 16^5 token space.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N