Comparison Overview

Zoom

VS

HCLTech

Zoom

55 Almaden Blvd., 6th Floor, San Jose, CA 95113, San Jose, CA, US, 95113
Last Update: 2025-12-09
Between 750 and 799

Bring teams together, reimagine workspaces, engage new audiences, and delight your customers –– all on the Zoom AI-first work platform you know and love. 💙 Zoomies help people stay connected so they can get more done together. We set out on a mission to make video communications frictionless and secure by building the world’s best video product for the enterprise, but we didn’t stop there. With products like AI Companion, Team Chat, Contact Center, Phone, Events, Rooms, Webinar, Contact Center and more, we bring innovation to a wide variety of customers, from the conference room to the classroom, from doctor’s offices to financial institutions to government agencies, from global brands to small businesses. We do what we do because of our core value of Care: care for our community, our customers, our company, our teammates, and ourselves. Our global employees help our customers meet happier, communicate better, and create meaningful connections the world over. Zoomies are problem-solvers and self-starters, working hard to get results and moving quickly to design solutions with our customers and users in mind. Here, you'll find room to grow with opportunities to stretch your skills and advance your career in a collaborative, growth-focused environment. Learn more about careers at Zoom by visiting our careers site: https://careers.zoom.us/home

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 11,719
Subsidiaries: 1
12-month incidents
1
Known data breaches
1
Attack type number
2

HCLTech

undefined, Noida, Uttar Pradesh, 201301, IN
Last Update: 2025-12-09
Between 800 and 849

HCLTech is a global technology company, home to more than 220,000 people across 60 countries, delivering industry-leading capabilities centered around digital, engineering, cloud and AI, powered by a broad portfolio of technology services and products. We work with clients across all major verticals, providing industry solutions for Financial Services, Manufacturing, Life Sciences and Healthcare, Technology and Services, Telecom and Media, Retail and CPG, and Public Services. Consolidated revenues as of 12 months ending December 2024 totaled $13.8 billion. To learn how we can supercharge progress for you, visit hcltech.com.

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 246,894
Subsidiaries: 28
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/zoom.jpeg
Zoom
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/hcl-technologies.jpeg
HCLTech
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Zoom
100%
Compliance Rate
0/4 Standards Verified
HCLTech
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT Services and IT Consulting Industry Average (This Year)

Zoom has 78.57% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for HCLTech in 2025.

Incident History — Zoom (X = Date, Y = Severity)

Zoom cyber incidents detection timeline including parent company and subsidiaries

Incident History — HCLTech (X = Date, Y = Severity)

HCLTech cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/zoom.jpeg
Zoom
Incidents

Date Detected: 6/2025
Type:Vulnerability
Attack Vector: Buffer Overflow
Motivation: Disruption of Service
Blog: Blog

Date Detected: 6/1967
Type:Breach
Motivation: Financial Gain (Litigation), Regulatory Enforcement, Consumer Protection
Blog: Blog
https://images.rankiteo.com/companyimages/hcl-technologies.jpeg
HCLTech
Incidents

No Incident

FAQ

HCLTech company demonstrates a stronger AI Cybersecurity Score compared to Zoom company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Zoom company has historically faced a number of disclosed cyber incidents, whereas HCLTech company has not reported any.

In the current year, Zoom company has reported more cyber incidents than HCLTech company.

Neither HCLTech company nor Zoom company has reported experiencing a ransomware attack publicly.

Zoom company has disclosed at least one data breach, while the other HCLTech company has not reported such incidents publicly.

Neither HCLTech company nor Zoom company has reported experiencing targeted cyberattacks publicly.

Zoom company has disclosed at least one vulnerability, while HCLTech company has not reported such incidents publicly.

Neither Zoom nor HCLTech holds any compliance certifications.

Neither company holds any compliance certifications.

HCLTech company has more subsidiaries worldwide compared to Zoom company.

HCLTech company employs more people globally than Zoom company, reflecting its scale as a IT Services and IT Consulting.

Neither Zoom nor HCLTech holds SOC 2 Type 1 certification.

Neither Zoom nor HCLTech holds SOC 2 Type 2 certification.

Neither Zoom nor HCLTech holds ISO 27001 certification.

Neither Zoom nor HCLTech holds PCI DSS certification.

Neither Zoom nor HCLTech holds HIPAA certification.

Neither Zoom nor HCLTech holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Versions 3.5.4 and below contain a Stored Cross-Site Scripting (XSS) vulnerability in the /WeGIA/html/geral/configurar_senhas.php endpoint. The application does not sanitize user-controlled data before rendering it inside the employee selection dropdown. The application retrieves employee names from the database and injects them directly into HTML <option> elements without proper escaping. This issue is fixed in version 3.5.5.

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

ZITADEL is an open-source identity infrastructure tool. Versions 4.0.0-rc.1 through 4.7.0 are vulnerable to DOM-Based XSS through the Zitadel V2 logout endpoint. The /logout endpoint insecurely routes to a value that is supplied in the post_logout_redirect GET parameter. As a result, unauthenticated remote attacker can execute malicious JS code on Zitadel users’ browsers. To carry out an attack, multiple user sessions need to be active in the same browser, however, account takeover is mitigated when using Multi-Factor Authentication (MFA) or Passwordless authentication. This issue is fixed in version 4.7.1.

Risk Information
cvss3
Base: 8.0
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
Description

ZITADEL is an open-source identity infrastructure tool. Versions 4.7.0 and below are vulnerable to an unauthenticated, full-read SSRF vulnerability. The ZITADEL Login UI (V2) treats the x-zitadel-forward-host header as a trusted fallback for all deployments, including self-hosted instances. This allows an unauthenticated attacker to force the server to make HTTP requests to arbitrary domains, such as internal addresses, and read the responses, enabling data exfiltration and bypassing network-segmentation controls. This issue is fixed in version 4.7.1.

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
Description

NiceGUI is a Python-based UI framework. Versions 3.3.1 and below are vulnerable to directory traversal through the App.add_media_files() function, which allows a remote attacker to read arbitrary files on the server filesystem. This issue is fixed in version 3.4.0.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Description

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions are vulnerable to authentication bypass when the authentication type is set to "webserver." When providing an Authorization header with an arbitrary value, a session is associated with the target user regardless of valid credentials. This issue is fixed in versions 16.0.44 and 17.0.23.

Risk Information
cvss4
Base: 9.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X