Comparison Overview

The Case Bowen Company

VS

Genpact Mortgage Services

The Case Bowen Company

6255 CORPORATE CENTER DR Dublin, Ohio 43016, US
Last Update: 2025-03-16 (UTC)
Between 900 and 1000

Excellent

The Case Bowen Company is a firm that offers more than 85 years of experience in the commercial real estate services field serving Columbus and Central Ohio. Case Bowen's clients enjoy The Case Bowen Advantage, which provides them with the best in condominium and HOA community management, brokerage and sales, commercial leasing, site selection, commercial property management and investment properties in Columbus and Central Ohio. Case Bowen's staff of professionals combine years of first-hand knowledge with creative ideas to find the best ways to serve your needs. At Case Bowen we work with each of our clients to provide individualized attention and round-the-clock service. The Case Bowen Company gives you peace of mind. If you're in the Columbus and Central Ohio area let The Case Bowen Company work with you and find out what The Case Bowen Advantage is all about. Show more Show less

NAICS: None
NAICS Definition:
Employees: 11-50
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Genpact Mortgage Services

Last Update: 2025-03-15 (UTC)

Excellent

Between 900 and 1000

The changing scope of today's mortgage landscape has lenders looking for innovative solutions to meet fluctuating demand and counter higher default levels. Genpact's mortgage processing services leverage worldwide delivery capabilities, modern technology, and smarter analytics to design, transform, and run mortgage lending operations to better manage costs and improve customer satisfaction. NMLS ID #178925

NAICS: None
NAICS Definition:
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/the-case-bowen-company.jpeg
The Case Bowen Company
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/genpact-mortgage-services.jpeg
Genpact Mortgage Services
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
The Case Bowen Company
100%
Compliance Rate
0/4 Standards Verified
Genpact Mortgage Services
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Real Estate Industry Average (This Year)

No incidents recorded for The Case Bowen Company in 2025.

Incidents vs Real Estate Industry Average (This Year)

No incidents recorded for Genpact Mortgage Services in 2025.

Incident History โ€” The Case Bowen Company (X = Date, Y = Severity)

The Case Bowen Company cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Genpact Mortgage Services (X = Date, Y = Severity)

Genpact Mortgage Services cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/the-case-bowen-company.jpeg
The Case Bowen Company
Incidents

No Incident

https://images.rankiteo.com/companyimages/genpact-mortgage-services.jpeg
Genpact Mortgage Services
Incidents

No Incident

FAQ

Both The Case Bowen Company company and Genpact Mortgage Services company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Genpact Mortgage Services company has disclosed a higher number of cyber incidents compared to The Case Bowen Company company.

In the current year, Genpact Mortgage Services company and The Case Bowen Company company have not reported any cyber incidents.

Neither Genpact Mortgage Services company nor The Case Bowen Company company has reported experiencing a ransomware attack publicly.

Neither Genpact Mortgage Services company nor The Case Bowen Company company has reported experiencing a data breach publicly.

Neither Genpact Mortgage Services company nor The Case Bowen Company company has reported experiencing targeted cyberattacks publicly.

Neither The Case Bowen Company company nor Genpact Mortgage Services company has reported experiencing or disclosing vulnerabilities publicly.

Neither The Case Bowen Company company nor Genpact Mortgage Services company has publicly disclosed detailed information about the number of their subsidiaries.

Neither The Case Bowen Company company nor Genpact Mortgage Services company has publicly disclosed the exact number of their employees.

Latest Global CVEs (Not Company-Specific)

Description

A security flaw has been discovered in Tipray ๅŽฆ้—จๅคฉ้”็ง‘ๆŠ€่‚กไปฝๆœ‰้™ๅ…ฌๅธ Data Leakage Prevention System ๅคฉ้”ๆ•ฐๆฎๆณ„้œฒ้˜ฒๆŠค็ณป็ปŸ 1.0. Impacted is the function doFilter of the file findDeptPage.do. Performing manipulation of the argument sort results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in Vanderlande Baggage 360 7.0.0. This issue affects some unknown processing of the file /api-addons/v1/messages. Such manipulation of the argument Message leads to cross site scripting. The attack may be performed from remote. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was found in qianfox FoxCMS up to 1.2. This affects an unknown part of the file /index.php/Search of the component Search Page. The manipulation of the argument keyword results in cross site scripting. The attack can be executed remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability has been found in UTT HiPER 840G up to 3.1.1-190328. Affected by this issue is the function strcpy of the file /goform/formTaskEdit. The manipulation of the argument txtMin2 leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in CodeCanyon/ui-lib Mentor LMS up to 1.1.1. Affected by this vulnerability is an unknown functionality of the component API. Executing manipulation can lead to permissive cross-domain policy with untrusted domains. The attack may be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X