Comparison Overview

Watkins Wellness

VS

Henkel

Watkins Wellness

1280 Park Center Drive, Vista, CA, 92081, US
Last Update: 2025-05-05 (UTC)
Between 800 and 900

Strong

Watkins Wellness®, established in 1977 in Vista, Calif., is dedicated to promoting wellness to consumers who live active lifestyles and are health conscious. The company manufactures the Endless Pools® line of aquatic fitness products, and is also the world's largest manufacturer of hot tubs, including Hot Spring® Spas, Hot Spot® Spas, Caldera® Spas, and the American Hydrotherapy Systems spa brands. The Watkins Wellness dealer network extends into all 50 states and more than 70 countries. Watkins Wellness is a wholly-owned subsidiary of Masco Corporation (NYSE: MAS), a Fortune 500 company whose products include Behr® paint; Delta® and Hansgrohe® faucets, bath and shower fixtures; Kichler® lighting.

NAICS: 30
NAICS Definition: Manufacturing
Employees: 643
Subsidiaries: 28
12-month incidents
0
Known data breaches
0
Attack type number
0

Henkel

Henkelstraße 67, Düsseldorf, North Rhine-Westphalia, 40589, DE
Last Update: 2025-05-06 (UTC)

Excellent

Between 900 and 1000

Henkel operates worldwide with leading innovations, brands and technologies in two business areas: Adhesive Technologies and Consumer Brands. Founded in 1876, Henkel looks back on more than 145 years of success. The company holds leading positions with its two business units in both industrial and consumer businesses thanks to strong brands, innovations and technologies such as Persil, Schwarzkopf and Loctite. Henkel, headquartered in Düsseldorf / Germany, counts among the most internationally aligned German-based companies in the global marketplace. Our company purpose expresses what unites us all at Henkel: Pioneers at heart for the good of generations. We are a diverse team of around 48,000 colleagues worldwide, striving to enrich and improve life every day through our products, services, and solutions. Our Purpose is built from our roots and carries a long-standing legacy of innovation, responsibility, and sustainability into the future. Our shared values and Leadership Commitments guide our decisions and actions every day. Imprint: http://www.henkel.com/imprint Data Privacy: https://www.henkel.com/data-protection-statement-social-media

NAICS: 30
NAICS Definition: Manufacturing
Employees: 38,425
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/watkins-wellness.jpeg
Watkins Wellness
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/henkel.jpeg
Henkel
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
Compliance Summary
Watkins Wellness
100%
Compliance Rate
0/4 Standards Verified
Henkel
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Manufacturing Industry Average (This Year)

No incidents recorded for Watkins Wellness in 2025.

Incidents vs Manufacturing Industry Average (This Year)

No incidents recorded for Henkel in 2025.

Incident History — Watkins Wellness (X = Date, Y = Severity)

Watkins Wellness cyber incidents detection timeline including parent company and subsidiaries

Incident History — Henkel (X = Date, Y = Severity)

Henkel cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/watkins-wellness.jpeg
Watkins Wellness
Incidents

No Incident

https://images.rankiteo.com/companyimages/henkel.jpeg
Henkel
Incidents

No Incident

FAQ

Henkel company company demonstrates a stronger AI risk posture compared to Watkins Wellness company company, reflecting its advanced AI governance and monitoring frameworks.

Historically, Henkel company has disclosed a higher number of cyber incidents compared to Watkins Wellness company.

In the current year, Henkel company and Watkins Wellness company have not reported any cyber incidents.

Neither Henkel company nor Watkins Wellness company has reported experiencing a ransomware attack publicly.

Neither Henkel company nor Watkins Wellness company has reported experiencing a data breach publicly.

Neither Henkel company nor Watkins Wellness company has reported experiencing targeted cyberattacks publicly.

Neither Watkins Wellness company nor Henkel company has reported experiencing or disclosing vulnerabilities publicly.

Watkins Wellness company has more subsidiaries worldwide compared to Henkel company.

Henkel company employs more people globally than Watkins Wellness company, reflecting its scale as a Manufacturing.

Latest Global CVEs (Not Company-Specific)

Description

A security flaw has been discovered in Tipray 厦门天锐科技股份有限公司 Data Leakage Prevention System 天锐数据泄露防护系统 1.0. Impacted is the function doFilter of the file findDeptPage.do. Performing manipulation of the argument sort results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in Vanderlande Baggage 360 7.0.0. This issue affects some unknown processing of the file /api-addons/v1/messages. Such manipulation of the argument Message leads to cross site scripting. The attack may be performed from remote. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was found in qianfox FoxCMS up to 1.2. This affects an unknown part of the file /index.php/Search of the component Search Page. The manipulation of the argument keyword results in cross site scripting. The attack can be executed remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability has been found in UTT HiPER 840G up to 3.1.1-190328. Affected by this issue is the function strcpy of the file /goform/formTaskEdit. The manipulation of the argument txtMin2 leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in CodeCanyon/ui-lib Mentor LMS up to 1.1.1. Affected by this vulnerability is an unknown functionality of the component API. Executing manipulation can lead to permissive cross-domain policy with untrusted domains. The attack may be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X