Comparison Overview

Tiercon

VS

Belhasa Car Rental

Tiercon

591 Arvin Avenue, Stoney Creek, Ontario, L8E 5N7, CA
Last Update: 2025-03-07 (UTC)
Between 900 and 1000

Excellent

Tiercon is a supplier of exterior components & systems to the automotive industry. We are committed to grow our business through innovation, disciplined execution, lean manufacturing principles, continuous improvement in technology, cost, quality & delivery. The contribution and development of our employees is the foundation of our success. Molding Tiercon molds parts for painting, mold-in-color, or insert molded in a large range of resins. Paint Our paint process uses robotic application systems. The paint line can handle a broad range of plastic and steel using its low or high bake temperature capabilities. Quality Tiercon has a fully functioning inspection lab including a state of the art CMM machine with 9f table and a volumetric accuracy of 5ยต. Engineering Tiercon is capable of supporting our customers from design concept through to production. Innovation Tiercon is capable of supporting all our customers and their development needs from design concept through to production. Sketches, renderings, FEA, MOLD FLOW, CAD and development testing are all core to our development process. Assembly Tiercon is capable of meeting all the post mold and post paint assembly needs for our customers. We provide error-proofing solutions for installing clips, fasteners and tape.

NAICS: None
NAICS Definition:
Employees: 256
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Belhasa Car Rental

Al Quoz Industrial Area 3 368 / 29 B street Office timing 08:00- 20:00 Al Quoz, Dubai, AE
Last Update: 2025-03-15 (UTC)

Excellent

Belhasa Car Rental L.L.C is a UAE based company, operating in the emirates of Dubai since 2007. it is owned by "SAIF BELHASA HOLDING" which is chaired by businessman and entrepreneur Mr. Saif Ahmed Belhasa. We are one of the leading and most professional car rental companies in the UAE, with 6 successful branches and a fleet of over 2000 vehicles. Belhasa is renowned for its quality line-up of brand new vehicles ranging from compact economy cars to standard sedans and premium luxury vehicles, vans and buses. Be it your daily rental or short/long term lease you can rely on us. We believe there is no limit to the growth potential of our company. We are constantly gaining competitive intelligence about market leaders, to track key industry trends, opportunities and threats, in order to transform them into business ventures and help us improve our marketing, branding and sales strategies, which would systematically result in better sales, supply and customer service experience. Being strategically located in the emirates of Dubai, we have now shifted our focus to Abudhabi with our new office at Musaffah ICAD. We are planning a phase wise expansion into the West coast, northern emirates and East Coast in the near future, while at the same time eying neighboring GCC countries. We intend to grow our fleet by 20 - 25 % in the next 12 months, through new sales locations and service centers to better facilitate our customers and provide them exceptional experience.

NAICS: None
NAICS Definition:
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/tiercon.jpeg
Tiercon
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/belhasa-car-rental.jpeg
Belhasa Car Rental
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Tiercon
100%
Compliance Rate
0/4 Standards Verified
Belhasa Car Rental
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Automotive Industry Average (This Year)

No incidents recorded for Tiercon in 2025.

Incidents vs Automotive Industry Average (This Year)

No incidents recorded for Belhasa Car Rental in 2025.

Incident History โ€” Tiercon (X = Date, Y = Severity)

Tiercon cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Belhasa Car Rental (X = Date, Y = Severity)

Belhasa Car Rental cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/tiercon.jpeg
Tiercon
Incidents

No Incident

https://images.rankiteo.com/companyimages/belhasa-car-rental.jpeg
Belhasa Car Rental
Incidents

No Incident

FAQ

Both Tiercon company and Belhasa Car Rental company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Belhasa Car Rental company has disclosed a higher number of cyber incidents compared to Tiercon company.

In the current year, Belhasa Car Rental company and Tiercon company have not reported any cyber incidents.

Neither Belhasa Car Rental company nor Tiercon company has reported experiencing a ransomware attack publicly.

Neither Belhasa Car Rental company nor Tiercon company has reported experiencing a data breach publicly.

Neither Belhasa Car Rental company nor Tiercon company has reported experiencing targeted cyberattacks publicly.

Neither Tiercon company nor Belhasa Car Rental company has reported experiencing or disclosing vulnerabilities publicly.

Neither Tiercon company nor Belhasa Car Rental company has publicly disclosed detailed information about the number of their subsidiaries.

Tiercon company employs more people globally than Belhasa Car Rental company, reflecting its scale as a Automotive.

Latest Global CVEs (Not Company-Specific)

Description

An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.

Description

A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X