Company Details
the-opennms-group
18
1,319
51125
opennms.com
0
THE_4297588
In-progress

The OpenNMS Group Company CyberSecurity Posture
opennms.comOpenNMS provides a comprehensive fault, performance and traffic monitoring solution that integrates with business applications and workflows to monitor and visualize everything in a network. The platform monitors some of the largest networks in existence, covering the healthcare, technology, finance, government, education, retail and industrial sectors, many with tens of thousands of networked devices. Customers include three of the top 5 companies on the Fortune 100, as well as multiple large and multi-state health providers and one of the largest electronic medical record providers in the United States.
Company Details
the-opennms-group
18
1,319
51125
opennms.com
0
THE_4297588
In-progress
Between 750 and 799

OG Global Score (TPRM)XXXX



No incidents recorded for The OpenNMS Group in 2025.
No incidents recorded for The OpenNMS Group in 2025.
No incidents recorded for The OpenNMS Group in 2025.
OG cyber incidents detection timeline including parent company and subsidiaries

OpenNMS provides a comprehensive fault, performance and traffic monitoring solution that integrates with business applications and workflows to monitor and visualize everything in a network. The platform monitors some of the largest networks in existence, covering the healthcare, technology, finance, government, education, retail and industrial sectors, many with tens of thousands of networked devices. Customers include three of the top 5 companies on the Fortune 100, as well as multiple large and multi-state health providers and one of the largest electronic medical record providers in the United States.


CCS has over 20 years of combined experience in the field of data network installation. We can install both wired (copper and fibre) and wireless networks Our installation teams are used to working in any environment from home or home office installs to large corporate offices and everywhere in be

We are totally & completely focused on technology solutions that benefit today's small business owner. We bridge the gap between Apple & Microsoft... between premise & the cloud... between capital expenditures & operating expenditures. Our mission is to manage your technology so you can manage your

Unicor S.A. es una empresa tecnológica de Argentina. Con mas de 18 años de experiencia brindando productos y soluciones en telecomunicaciones al lo largo y ancho del país. En Unicor asumimos el compromiso de brindar soluciones de calidad tanto en nuestros productos como servicios. Intentando estar a

Technolink is the IT company in Azerbaijan Market. Official distributor of Q-matic company. Helping to Financial, Heath. Retail and Government (Public) sector to solve the problem with big Q lines. Giving CFM solution which is useful for the future business and marketing activities with customer. Wi

Glencom Systems, Inc. is a value added provider of internetworking and security solutions for business, nonprofit and educational organizations. Our mission has changed little since our founding in 1986 -- to help our customers use networking as a strategic asset, to help them serve their customers

CYber SYtes provides custom solutions to businesses and organizations that seek effective exposure on the Internet. We build our sites individually, each one as unique as your company. http://www.cysy.com * Custom website design * Hosting * E-Commerce Solutions * Web Site Promotion * Socia
.png)
Network Monitoring Tools: 1. Nagios 2. Wireshark 3. Paessler PRTG 4. Zabbix 5. SolarWinds 6. WhatsUp Gold 7. Icinga 8. ManageEngine.
SNMP Monitoring Tools: 1. SolarWinds Network Performance Monitor 2. PRTG Network Monitor 3. Zabbix 4. Nagios 5. ManageEngine OpManager.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of The OpenNMS Group is http://www.opennms.com/.
According to Rankiteo, The OpenNMS Group’s AI-generated cybersecurity score is 750, reflecting their Fair security posture.
According to Rankiteo, The OpenNMS Group currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, The OpenNMS Group is not certified under SOC 2 Type 1.
According to Rankiteo, The OpenNMS Group does not hold a SOC 2 Type 2 certification.
According to Rankiteo, The OpenNMS Group is not listed as GDPR compliant.
According to Rankiteo, The OpenNMS Group does not currently maintain PCI DSS compliance.
According to Rankiteo, The OpenNMS Group is not compliant with HIPAA regulations.
According to Rankiteo,The OpenNMS Group is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
The OpenNMS Group operates primarily in the Computer Networking Products industry.
The OpenNMS Group employs approximately 18 people worldwide.
The OpenNMS Group presently has no subsidiaries across any sectors.
The OpenNMS Group’s official LinkedIn profile has approximately 1,319 followers.
The OpenNMS Group is classified under the NAICS code 51125, which corresponds to Software Publishers.
No, The OpenNMS Group does not have a profile on Crunchbase.
Yes, The OpenNMS Group maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/the-opennms-group.
As of November 28, 2025, Rankiteo reports that The OpenNMS Group has not experienced any cybersecurity incidents.
The OpenNMS Group has an estimated 949 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, The OpenNMS Group has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.