Comparison Overview

Watkins Wellness

VS

Alpargatas S.A.

Watkins Wellness

1280 Park Center Drive, Vista, CA, 92081, US
Last Update: 2025-05-05 (UTC)
Between 800 and 900

Strong

Watkins Wellness®, established in 1977 in Vista, Calif., is dedicated to promoting wellness to consumers who live active lifestyles and are health conscious. The company manufactures the Endless Pools® line of aquatic fitness products, and is also the world's largest manufacturer of hot tubs, including Hot Spring® Spas, Hot Spot® Spas, Caldera® Spas, and the American Hydrotherapy Systems spa brands. The Watkins Wellness dealer network extends into all 50 states and more than 70 countries. Watkins Wellness is a wholly-owned subsidiary of Masco Corporation (NYSE: MAS), a Fortune 500 company whose products include Behr® paint; Delta® and Hansgrohe® faucets, bath and shower fixtures; Kichler® lighting.

NAICS: 30
NAICS Definition: Manufacturing
Employees: 643
Subsidiaries: 28
12-month incidents
0
Known data breaches
0
Attack type number
0

Alpargatas S.A.

Av. das Nações Unidas, 14.261, São Paulo, São Paulo, 04794-000, BR
Last Update: 2025-03-04 (UTC)

Strong

Between 800 and 900

We are a global company, founded and based in Brazil for over 115 years. We are committed to delight the world with amazing brands, that convey lightness and joy to the everyday lives of our consumers. We own Havaianas brand, world leader in open shoes, known for the iconic flip-flops that represent Brazilianness, comfort and style. We have 49.2% of Rothy’s a north-american sustainable footwear Brand. The Havaianas brand is one of the largest open-toe footwear brands in the world, with a significant presence and operation in dozens of countries. Rothy’s is present in the United States. Our growth is based on sustainability and economy, always valuing the socio-environmental responsibility of our operations. Our supply chain is vertical, with four manufacturing units in Brazil, and we own ioasys, our digital transformation company. We are more than 10 thousand employees, passionate about make it happen, who want to inspire the world to walk a lighter path. #WeAreAlpaLovers – Inspired by consumers and we walk together to make it happen!

NAICS: 30
NAICS Definition: Manufacturing
Employees: 13,540
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/watkins-wellness.jpeg
Watkins Wellness
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/alpargatas.jpeg
Alpargatas S.A.
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
Compliance Summary
Watkins Wellness
100%
Compliance Rate
0/4 Standards Verified
Alpargatas S.A.
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Manufacturing Industry Average (This Year)

No incidents recorded for Watkins Wellness in 2025.

Incidents vs Manufacturing Industry Average (This Year)

No incidents recorded for Alpargatas S.A. in 2025.

Incident History — Watkins Wellness (X = Date, Y = Severity)

Watkins Wellness cyber incidents detection timeline including parent company and subsidiaries

Incident History — Alpargatas S.A. (X = Date, Y = Severity)

Alpargatas S.A. cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/watkins-wellness.jpeg
Watkins Wellness
Incidents

No Incident

https://images.rankiteo.com/companyimages/alpargatas.jpeg
Alpargatas S.A.
Incidents

No Incident

FAQ

Both Watkins Wellness company and Alpargatas S.A. company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Alpargatas S.A. company has disclosed a higher number of cyber incidents compared to Watkins Wellness company.

In the current year, Alpargatas S.A. company and Watkins Wellness company have not reported any cyber incidents.

Neither Alpargatas S.A. company nor Watkins Wellness company has reported experiencing a ransomware attack publicly.

Neither Alpargatas S.A. company nor Watkins Wellness company has reported experiencing a data breach publicly.

Neither Alpargatas S.A. company nor Watkins Wellness company has reported experiencing targeted cyberattacks publicly.

Neither Watkins Wellness company nor Alpargatas S.A. company has reported experiencing or disclosing vulnerabilities publicly.

Watkins Wellness company has more subsidiaries worldwide compared to Alpargatas S.A. company.

Alpargatas S.A. company employs more people globally than Watkins Wellness company, reflecting its scale as a Manufacturing.

Latest Global CVEs (Not Company-Specific)

Description

A security flaw has been discovered in Tipray 厦门天锐科技股份有限公司 Data Leakage Prevention System 天锐数据泄露防护系统 1.0. Impacted is the function doFilter of the file findDeptPage.do. Performing manipulation of the argument sort results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in Vanderlande Baggage 360 7.0.0. This issue affects some unknown processing of the file /api-addons/v1/messages. Such manipulation of the argument Message leads to cross site scripting. The attack may be performed from remote. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was found in qianfox FoxCMS up to 1.2. This affects an unknown part of the file /index.php/Search of the component Search Page. The manipulation of the argument keyword results in cross site scripting. The attack can be executed remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability has been found in UTT HiPER 840G up to 3.1.1-190328. Affected by this issue is the function strcpy of the file /goform/formTaskEdit. The manipulation of the argument txtMin2 leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in CodeCanyon/ui-lib Mentor LMS up to 1.1.1. Affected by this vulnerability is an unknown functionality of the component API. Executing manipulation can lead to permissive cross-domain policy with untrusted domains. The attack may be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X