It’s easy to criticize vendors for the number of known exploited vulnerabilities in their software, but raw counts lack context. A company with 100 software products will naturally have more vulnerabilities than one with a smaller portfolio. However, product count alone doesn’t account for a company’s size or resources.
Microsoft is a prime example: as of this writing, it accounts for 311 entries in CISA’s Known Exploited Vulnerabilities (KEV) catalog—25% of all entries. This is often dismissed because of Microsoft’s size and expansive product portfolio. However, a common counterpoint is that its scale affords the company more resources for product security than most.
How do we perform a simple comparison of product security effectiveness across organizations of various sizes, making different types of products for different types of customers? We use the great equalizer: United States Dollars.
Here’s how the CISA KEV leaderboard—specifically the 10 publicly traded companies with the most KEV entries—appears when normalized by market cap:
| Vendor |
KEVs |
Market Cap (USD) |
KEVs per $1B Market Cap |
| Adobe |
73 |
$181,670,000,000 |
0.402 |
| Cisco |
74 |
$236,300,000,000 |
0.313 |
| Fortinet |
15 |
$70,890,000,000 |
0.212 |
| Atlassian |
13 |
$64,200,000,000 |
0.202 |
| Microsoft |
311 |
$3,090,000,000,000 |
0.101 |
| Palo Alto Networks |
11 |
$114,300,000,000 |
0.096 |
| Oracle |
38 |
$437,190,000,000 |
0.087 |
| Samsung |
11 |
$245,566,881,889 |
0.045 |
| SAP |
11 |
$323,720,000,000 |
0.034 |
| Google |
73 |
$2,330,000,000,000 |
0.031 |
| Apple |
77 |
$3,510,000,000,000 |
0.022 |
| D-Link |
20 |
$404,068,003 |
0.000 |
Updated 2025-01-15 // Notes: Google = Google + Android; D-Link is a conversion from TWD; Samsung is a conversion from KRW
Nothing’s perfect, but this approach offers a fair way to compare product security effectiveness without relying on subjective or manipulatable criteria. A known exploited vulnerability represents an objectively poor security outcome. Using market cap as the denominator avoids debates over distinctions like product lines, software versions, platforms, and more.