Comparison Overview

BildGroup

VS

REXEL USA

BildGroup

133 Metrolink Circuit , Campbellfield, Victoria, 3061, AU
Last Update: 2025-03-05 (UTC)
Between 750 and 799

We're BildGroup and we're built differently. BildGroup is a wholly Australian owned business, building the infrastructure and facilities our communities need to thrive. Today that involves over 600 people delivering solutions as diverse as civil infrastructure, urban development, landscaping, sports fields and road profiling and asphalt paving. We are a business fuelled by family, here to fulfil the potential of our people and community. We achieve this through our passionate focus on safety and care for our people, our commitment to partnership with every one of our clients and drive to do things better every single day.

NAICS: 23
NAICS Definition: Construction
Employees: 284
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

REXEL USA

None
Last Update: 2025-03-15 (UTC)
Between 750 and 799

REXEL, LEADING DISTRIBUTOR WORLDWIDE OF ELECTRICAL SUPPLIES Rexel, a global leader in the distribution of electrical supplies and services, serves three main end markets: industrial, commercial and residential. The Group operates in 38 countries, with a network of some 2,200 branches, a distribution network of more than 40 banners and employs over 30,000 people. Rexel's sales were €13.1 billion in 2014. For more information, visit Rexel's web site at www.rexel.com. Rexel's ability to offer its customers innovative services ensures that it remains one step ahead as the uncontested leader in its markets. Rexel was listed on the Paris stock exchange until 2005 as a subsidiary of the PPR group and has since been owned by a private equity consortium led by Clayton Dubillier & Rice, Eurazeo and Merrill Lynch Global Private Equity. Rexel returned to the Paris stock exchange through an IPO in April 2007. For construction, renovation and maintenance projects, Rexel supplies three profitable markets: Industrial: systems integrators, equipment manufacturers, production sites. To better serve its customers, Rexel has developed specialized banners all over the world. Commercial: shopping centers, sports facilities, hospitals, airports. Rexel also supplies to generalist and specialized contractors who equip these different sectors. Residential: climate control, security, home automation etc. The product offer and quality of services proposed by Rexel are decisive commercial advantages.

NAICS: 23
NAICS Definition:
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/the-bitu-mill-group.jpeg
BildGroup
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/rexel-usa.jpeg
REXEL USA
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
BildGroup
100%
Compliance Rate
0/4 Standards Verified
REXEL USA
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Construction Industry Average (This Year)

No incidents recorded for BildGroup in 2025.

Incidents vs Construction Industry Average (This Year)

No incidents recorded for REXEL USA in 2025.

Incident History — BildGroup (X = Date, Y = Severity)

BildGroup cyber incidents detection timeline including parent company and subsidiaries

Incident History — REXEL USA (X = Date, Y = Severity)

REXEL USA cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/the-bitu-mill-group.jpeg
BildGroup
Incidents

No Incident

https://images.rankiteo.com/companyimages/rexel-usa.jpeg
REXEL USA
Incidents

No Incident

FAQ

REXEL USA company demonstrates a stronger AI Cybersecurity Score compared to BildGroup company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, REXEL USA company has disclosed a higher number of cyber incidents compared to BildGroup company.

In the current year, REXEL USA company and BildGroup company have not reported any cyber incidents.

Neither REXEL USA company nor BildGroup company has reported experiencing a ransomware attack publicly.

Neither REXEL USA company nor BildGroup company has reported experiencing a data breach publicly.

Neither REXEL USA company nor BildGroup company has reported experiencing targeted cyberattacks publicly.

Neither BildGroup company nor REXEL USA company has reported experiencing or disclosing vulnerabilities publicly.

Neither BildGroup nor REXEL USA holds any compliance certifications.

Neither company holds any compliance certifications.

Neither BildGroup company nor REXEL USA company has publicly disclosed detailed information about the number of their subsidiaries.

BildGroup company employs more people globally than REXEL USA company, reflecting its scale as a Construction.

Neither BildGroup nor REXEL USA holds SOC 2 Type 1 certification.

Neither BildGroup nor REXEL USA holds SOC 2 Type 2 certification.

Neither BildGroup nor REXEL USA holds ISO 27001 certification.

Neither BildGroup nor REXEL USA holds PCI DSS certification.

Neither BildGroup nor REXEL USA holds HIPAA certification.

Neither BildGroup nor REXEL USA holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘percentage’ parameter in all versions up to, and including, 5.4.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Risk Information
cvss3
Base: 6.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Description

The ComboServlet in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions does not limit the number or size of the files it will combine, which allows remote attackers to create very large responses that lead to a denial of service attack via the URL query string.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary directories on the target machine.

Risk Information
cvss3
Base: 4.0
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and create arbitrary directories on the target machine.

Risk Information
cvss3
Base: 4.0
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary files on the target machine.

Risk Information
cvss3
Base: 7.5
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H
cvss4
Base: 8.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X