Comparison Overview

VOIS

VS

AeC

VOIS

London, GB
Last Update: 2026-01-19

VOIS (Vodafone Intelligent Solutions) is a strategic arm of Vodafone Group Plc, creating value for customers by delivering intelligent solutions through Talent, Technology & Transformation. As the largest shared services organisation in the global telco industry, our portfolio of next-generation solutions and services are designed in partnership with customers across Vodafone Group, local markets, and partner markets to simplify and drive growth. We are pioneering a new Partnership model for the Telco industry, where the sharing of ideas, innovation, platforms and services will unlock opportunities for our people and value for our customers. With our strategic partner Accenture, we work alongside our Vodafone customers, other Telco and tech companies to drive transformation, meet the challenges of our industry and ensure we stay relevant and resilient. This partnership is a unique, industry-first model which brings together the best of in-house and 3rd party capability. We deliver value and results at scale by leveraging technology, data and our talented international team of 30K professionals in the following services: Technology, Business, B2B, Corporate Services, Customer Care. Our commercial model creates clear, benchmarked and competitively-priced services so that we can offer guaranteed outcomes for customers with flexibility and optionality. Bringing together our combined strengths with our strategic partner Accenture our strategy is to: Commercialise: Create cost transparency and foster trust and growth for our customers Re-platform: To simplify, streamline and scale our business Extend beyond our borders: deepening our relationships, growing our services and expanding our customer base across new customers & new geographies We work with customers across 28 countries from 10 VOIS locations: Albania, Egypt, Hungary, India, Romania, Spain, Turkey, UK, Germany, Ireland, and with a network of teams in Czech Republic, Italy, Greece, and Portugal.

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 20,303
Subsidiaries: 20
12-month incidents
0
Known data breaches
4
Attack type number
4

AeC

Rua Espírito Santo, 871 - Bairro Centro, Belo Horizonte, 30160-031, BR
Last Update: 2026-01-17
Between 750 and 799

A AeC é apontada consistentemente como a líder brasileira na entrega de soluções de experiência do cliente e gestão de processos terceirizados. Servindo as principais marcas do mercado nacional, conquistou nos três últimos anos a posição de Empresa do Ano de BPO pela conceituada Frost and Sullivan. Líder também nas práticas de ESG, recebe há oito anos consecutivos o título de Melhor Empresa de Serviços pelo Prêmio Época Negócios 360°. Com um olhar inovador, o seu diferencial está no modo como integra o cuidado com as pessoas e aplica tecnologia de ponta em seus processos, como inteligência artificial, robotic process automation, serviços em nuvem e ferramentas de analytics e segurança. Atualmente, a AeC conta com mais de 52 mil colaboradores em 20 unidades distribuídas por sete estados do país. É certificada pelo instituto Great Place to Work como uma das melhores empresas para se trabalhar. Com uma combinação única de Tecnologia e Calor Humano, a mais de 30 anos de história conquistando, apenas no último ano, 27 importantes prêmios e reconhecimentos do mercado. Venha evoluir conosco! Entre em contato com a gente através do e-mail: [email protected]

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 34,614
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/vois.jpeg
VOIS
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/aec.jpeg
AeC
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
VOIS
100%
Compliance Rate
0/4 Standards Verified
AeC
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for VOIS in 2026.

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for AeC in 2026.

Incident History — VOIS (X = Date, Y = Severity)

VOIS cyber incidents detection timeline including parent company and subsidiaries

Incident History — AeC (X = Date, Y = Severity)

AeC cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/vois.jpeg
VOIS
Incidents

Date Detected: 06/2023
Type:Breach
Attack Vector: Data Breach
Motivation: Unauthorized Access to Sensitive Data
Blog: Blog

Date Detected: 04/2023
Type:Ransomware
Blog: Blog

Date Detected: 09/2022
Type:Breach
Blog: Blog
https://images.rankiteo.com/companyimages/aec.jpeg
AeC
Incidents

No Incident

FAQ

VOIS company demonstrates a stronger AI Cybersecurity Score compared to AeC company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

VOIS company has historically faced a number of disclosed cyber incidents, whereas AeC company has not reported any.

In the current year, AeC company and VOIS company have not reported any cyber incidents.

VOIS company has confirmed experiencing a ransomware attack, while AeC company has not reported such incidents publicly.

VOIS company has disclosed at least one data breach, while the other AeC company has not reported such incidents publicly.

VOIS company has reported targeted cyberattacks, while AeC company has not reported such incidents publicly.

Neither VOIS company nor AeC company has reported experiencing or disclosing vulnerabilities publicly.

Neither VOIS nor AeC holds any compliance certifications.

Neither company holds any compliance certifications.

VOIS company has more subsidiaries worldwide compared to AeC company.

AeC company employs more people globally than VOIS company, reflecting its scale as a IT Services and IT Consulting.

Neither VOIS nor AeC holds SOC 2 Type 1 certification.

Neither VOIS nor AeC holds SOC 2 Type 2 certification.

Neither VOIS nor AeC holds ISO 27001 certification.

Neither VOIS nor AeC holds PCI DSS certification.

Neither VOIS nor AeC holds HIPAA certification.

Neither VOIS nor AeC holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).

Risk Information
cvss3
Base: 8.1
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H