Company Details
trustarray
249
2,281
541
trustarray.com
0
ARR_2787761
In-progress

Array Company CyberSecurity Posture
trustarray.comOur name, Array, reflects both the spectrum of services we provide and the industry-leading subject-matter experts who comprise our team. Together, we apply our creativity, dedication and experience to solve our clients’ problems and exceed their expectations. Unlike other providers, we are founder owned: This empowers us to deliver effective custom solutions that allow lawyers to focus on winning their cases. What We Do. We manage the logistics of litigation so lawyers can focus on winning their cases. Our range of services span eDiscovery, managed review, traditional discovery, and court reporting support for depositions, arbitrations, hearings or trials nationwide; and alternative dispute resolution and subpoena services in California. How We Do It. We combine the latest technology with battle-tested human know-how: In every engagement, our team of experts provides custom solutions and attentive, responsive service. As one of the first service providers to adopt RelativityOne, Array offers unmatched depth and breadth of experience in this industry-leading platform: ➡️Six RelativityOne Certified Pros on staff ➡️Project management and client services teams with years of experience working in RelativityOne and administering a RelativityOne environment ➡️Hundreds of migrations completed from Relativity Server to RelativityOne ➡️Early adopter of Relativity’s Aero UI; adept at functionality and features Why We Do It. We believe that just as the facts of every matter differ, so should the litigation support strategy. We take pride in delivering smart, purposeful and responsive service, and in saving our clients time, stress and unnecessary spend. Array was created by the 2020 merger of Innovative Litigation and iNSERViO3, two independent litigation support providers that shared a common vision for service, commitment and excellence.
Company Details
trustarray
249
2,281
541
trustarray.com
0
ARR_2787761
In-progress
Between 750 and 799

Array Global Score (TPRM)XXXX



No incidents recorded for Array in 2025.
No incidents recorded for Array in 2025.
No incidents recorded for Array in 2025.
Array cyber incidents detection timeline including parent company and subsidiaries

Our name, Array, reflects both the spectrum of services we provide and the industry-leading subject-matter experts who comprise our team. Together, we apply our creativity, dedication and experience to solve our clients’ problems and exceed their expectations. Unlike other providers, we are founder owned: This empowers us to deliver effective custom solutions that allow lawyers to focus on winning their cases. What We Do. We manage the logistics of litigation so lawyers can focus on winning their cases. Our range of services span eDiscovery, managed review, traditional discovery, and court reporting support for depositions, arbitrations, hearings or trials nationwide; and alternative dispute resolution and subpoena services in California. How We Do It. We combine the latest technology with battle-tested human know-how: In every engagement, our team of experts provides custom solutions and attentive, responsive service. As one of the first service providers to adopt RelativityOne, Array offers unmatched depth and breadth of experience in this industry-leading platform: ➡️Six RelativityOne Certified Pros on staff ➡️Project management and client services teams with years of experience working in RelativityOne and administering a RelativityOne environment ➡️Hundreds of migrations completed from Relativity Server to RelativityOne ➡️Early adopter of Relativity’s Aero UI; adept at functionality and features Why We Do It. We believe that just as the facts of every matter differ, so should the litigation support strategy. We take pride in delivering smart, purposeful and responsive service, and in saving our clients time, stress and unnecessary spend. Array was created by the 2020 merger of Innovative Litigation and iNSERViO3, two independent litigation support providers that shared a common vision for service, commitment and excellence.


Hornberger & Brewer is considered one of the premier law firms in California. With multiple verdicts in the $20 to $30 million range, our trial lawyers have a proven reputation for effectively connecting with juries and expertly representing our client's best interests. We are a small firm of

A boutique entertainment, business, and intellectual property-focused law practice based in Nashville, TN. Licensed to practice law in California, New York and Tennessee, Daniel Novick represents entertainment and entrepreneurial clients worldwide in matters related to business development, tradema

Innovative Discovery, LLC (“ID”) was founded in 2005 and has grown into a leading provider of technology forward digital forensics and eDiscovery solutions. In practice with a technology-agnostic philosophy, ID integrates the premier litigation platforms available with the best IT and programming pe

For more information on AALNC, please join the American Association of Legal Nurse Consultants group or visit our website, www.aalnc.org. Founded in 1989, the American Association of Legal Nurse Consultants (AALNC) is a not for profit membership organization dedicated to the professional enhancem

We are a boutique law firm focused on Litigation and Legal Counseling businesses and individuals. Our firm is dedicated to providing high-quality client services in achieving proven results. The firm is proud of its commitment to cost-effective and personalized representation. Nashua | Boston We

We understand that clients want straightforward, practical advice from people they trust. Gordons is a firm that values relationships above all, because we know they underpin our continued success and that of our clients. We work in partnership with businesses and individuals needing fast, eff
.png)
FSeC-CaaS Provides Enterprise-Level Cybersecurity Services for SMEs; APU Connects Academia and Industry to Cultivate Malaysia's Future...
Kampala, Uganda | DAVID MUWONGE | “We conclude this workshop with sharper knowledge, stronger networks and a new sense of collective...
The Department of Defense's Cybersecurity Maturity Model Certification program is likely a harbinger of things to come for state and local...
Three reports released this week show that supply chain cyberattacks were the most likely to disrupt care delivery, with cloud account...
Google Chrome's V8 JavaScript engine has long balanced speed and security for billions of users worldwide.
Tribes can tap an array of resources to address their cybersecurity questions.
There's a staggering array of cybersecurity vendors in the market today. Like with all security controls and tools, CISOs should assess...
Cybersecurity practitioners in the public sector need more powerful tools to contend with a growing array of threats.
The School of Information Technology, Artificial Intelligence, and Cyber Security (SITAICS) of Rashtriya Raksha University (RRU) launched a...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Array is http://www.trustarray.com.
According to Rankiteo, Array’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.
According to Rankiteo, Array currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Array is not certified under SOC 2 Type 1.
According to Rankiteo, Array does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Array is not listed as GDPR compliant.
According to Rankiteo, Array does not currently maintain PCI DSS compliance.
According to Rankiteo, Array is not compliant with HIPAA regulations.
According to Rankiteo,Array is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Array operates primarily in the Legal Services industry.
Array employs approximately 249 people worldwide.
Array presently has no subsidiaries across any sectors.
Array’s official LinkedIn profile has approximately 2,281 followers.
No, Array does not have a profile on Crunchbase.
Yes, Array maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/trustarray.
As of November 30, 2025, Rankiteo reports that Array has not experienced any cybersecurity incidents.
Array has an estimated 7,392 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Array has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A vulnerability was determined in motogadget mo.lock Ignition Lock up to 20251125. Affected by this vulnerability is an unknown functionality of the component NFC Handler. Executing manipulation can lead to use of hard-coded cryptographic key . The physical device can be targeted for the attack. A high complexity level is associated with this attack. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the interview attachment retrieval endpoint in the Recruitment module serves files based solely on an authenticated session and user-supplied identifiers, without verifying whether the requester has permission to access the associated interview record. Because the server does not perform any recruitment-level authorization checks, an ESS-level user with no access to recruitment workflows can directly request interview attachment URLs and receive the corresponding files. This exposes confidential interview documents—including candidate CVs, evaluations, and supporting files—to unauthorized users. The issue arises from relying on predictable object identifiers and session presence rather than validating the user’s association with the relevant recruitment process. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application’s recruitment attachment retrieval endpoint does not enforce the required authorization checks before serving candidate files. Even users restricted to ESS-level access, who have no permission to view the Recruitment module, can directly access candidate attachment URLs. When an authenticated request is made to the attachment endpoint, the system validates the session but does not confirm that the requesting user has the necessary recruitment permissions. As a result, any authenticated user can download CVs and other uploaded documents for arbitrary candidates by issuing direct requests to the attachment endpoint, leading to unauthorized exposure of sensitive applicant data. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application does not invalidate existing sessions when a user is disabled or when a password change occurs, allowing active session cookies to remain valid indefinitely. As a result, a disabled user, or an attacker using a compromised account, can continue to access protected pages and perform operations as long as a prior session remains active. Because the server performs no session revocation or session-store cleanup during these critical state changes, disabling an account or updating credentials has no effect on already-established sessions. This makes administrative disable actions ineffective and allows unauthorized users to retain full access even after an account is closed or a password is reset, exposing the system to prolonged unauthorized use and significantly increasing the impact of account takeover scenarios. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the password reset workflow does not enforce that the username submitted in the final reset request matches the account for which the reset process was originally initiated. After obtaining a valid reset link for any account they can receive email for, an attacker can alter the username parameter in the final reset request to target a different user. Because the system accepts the supplied username without verification, the attacker can set a new password for any chosen account, including privileged accounts, resulting in full account takeover. This issue has been patched in version 5.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.