Comparison Overview

TJ Westlake, LLC

VS

Ingram Micro

TJ Westlake, LLC

46175 Westlake Drive, Potomac Falls, Virginia, 20165, US
Last Update: 2025-05-04 (UTC)
Between 800 and 900

Strong

TJ Westlake is a proud Service Disabled Veteran Owned Small Business providing Information Technology Services and Solutions to clients in the public and private sectors. We offer technology products, professional services, and IT infrastructure solutions assisting organizations in achieving their technology objectives. Our certified engineers and project managers are experts at designing, deploying, managing, and supporting integrated IT infrastructure solutions. TJ Westlake leverages expertise in enterprise computing, security, networking, and digital forensics. We have been engaged by government and commercial organizations to help implement complex solutions for Anti-virus, endpoint encryption, host intrusion prevention, data loss prevention, firewalls, network intrusion prevention and vulnerability management.

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 9
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Ingram Micro

3351 Michelson Drive, Suite 100, None, Irvine, CA, US, 92612
Last Update: 2025-09-08 (UTC)

Strong

Between 800 and 900

Ingram Micro is a leading technology company for the global information technology ecosystem. With the ability to reach nearly 90% of the global population, we play a vital role in the worldwide IT sales channel, bringing products and services from technology manufacturers and cloud providers to a highly diversified base of business-to-business technology experts. Through Ingram Micro Xvantageโ„ข, our AI-powered digital platform, we offer what we believe to be the industryโ€™s first comprehensive business-to-consumer-like experience, integrating hardware and cloud subscriptions, personalized recommendations, instant pricing, order tracking, and billing automation. We also provide a broad range of technology services, including financing, specialized marketing, and lifecycle management, as well as technical pre- and post-sales professional support. Learn more at www.ingrammicro.com.

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 28,653
Subsidiaries: 15
12-month incidents
3
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/tj-westlake.jpeg
TJ Westlake, LLC
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/ingram-micro.jpeg
Ingram Micro
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
TJ Westlake, LLC
100%
Compliance Rate
0/4 Standards Verified
Ingram Micro
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for TJ Westlake, LLC in 2025.

Incidents vs IT Services and IT Consulting Industry Average (This Year)

Ingram Micro has 435.71% more incidents than the average of same-industry companies with at least one recorded incident.

Incident History โ€” TJ Westlake, LLC (X = Date, Y = Severity)

TJ Westlake, LLC cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Ingram Micro (X = Date, Y = Severity)

Ingram Micro cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/tj-westlake.jpeg
TJ Westlake, LLC
Incidents

No Incident

https://images.rankiteo.com/companyimages/ingram-micro.jpeg
Ingram Micro
Incidents

Date Detected: 7/2025
Type:Ransomware
Motivation: Extortion
Blog: Blog

Date Detected: 7/2025
Type:Ransomware
Attack Vector: Undisclosed attack vectors, DLL side-loading techniques, Process hollowing techniques
Motivation: Financial gain
Blog: Blog

Date Detected: 7/2025
Type:Ransomware
Motivation: financial extortion (presumed)
Blog: Blog

FAQ

Both TJ Westlake, LLC company and Ingram Micro company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Ingram Micro company has historically faced a number of disclosed cyber incidents, whereas TJ Westlake, LLC company has not reported any.

In the current year, Ingram Micro company has reported more cyber incidents than TJ Westlake, LLC company.

Ingram Micro company has confirmed experiencing a ransomware attack, while TJ Westlake, LLC company has not reported such incidents publicly.

Neither Ingram Micro company nor TJ Westlake, LLC company has reported experiencing a data breach publicly.

Neither Ingram Micro company nor TJ Westlake, LLC company has reported experiencing targeted cyberattacks publicly.

Neither TJ Westlake, LLC company nor Ingram Micro company has reported experiencing or disclosing vulnerabilities publicly.

Ingram Micro company has more subsidiaries worldwide compared to TJ Westlake, LLC company.

Ingram Micro company employs more people globally than TJ Westlake, LLC company, reflecting its scale as a IT Services and IT Consulting.

Latest Global CVEs (Not Company-Specific)

Description

go-witness and witness are Go modules for generating attestations. In go-witness versions 0.8.6 and earlier and witness versions 0.9.2 and earlier the AWS attestor improperly verifies AWS EC2 instance identity documents. Verification can incorrectly succeed when a signature is not present or is empty, and when RSA signature verification fails. The attestor also embeds a single legacy global AWS public certificate and does not account for newer region specific certificates issued in 2024, making detection of forged documents difficult without additional trusted region data. An attacker able to supply or intercept instance identity document data (such as through Instance Metadata Service impersonation) can cause a forged identity document to be accepted, leading to incorrect trust decisions based on the attestation. This is fixed in go-witness 0.9.1 and witness 0.10.1. As a workaround, manually verify the included identity document, signature, and public key with standard tools (for example openssl) following AWSโ€™s verification guidance, or disable use of the AWS attestor until upgraded.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A logic issue was addressed with improved restrictions. This issue is fixed in macOS Ventura 13.7.7, macOS Sonoma 14.7.7, macOS Sequoia 15.6. An app may be able to access sensitive user data.

Risk Information
cvss3
Base: 5.5
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Description

A double free issue was addressed with improved memory management. This issue is fixed in macOS Sequoia 15.6, iOS 18.6 and iPadOS 18.6, watchOS 11.6, tvOS 18.6, visionOS 2.6, macOS Ventura 13.7.7, macOS Sonoma 14.7.7, iPadOS 17.7.9. An app may be able to cause unexpected system termination.

Risk Information
cvss3
Base: 5.5
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Description

The issue was addressed with improved authentication. This issue is fixed in macOS Sequoia 15.6. A local attacker may be able to elevate their privileges.

Description

The issue was resolved by not loading remote images This issue is fixed in iOS 18.6 and iPadOS 18.6. Forwarding an email could display remote images in Mail in Lockdown Mode.