• Home
  • Content
  • Page Tools
    Show pageOld revisionsBacklinks
  • Site Tools
    Recent ChangesMedia ManagerSitemap
  • User Tools
    Log In
≪ View Page

Search

You can find the results of your search below.

Ends with
  • Exact match
  • Starts with
  • Ends with
  • Contains
@pub
  • Any namespace
  • pub:trust_center (6)
  • pub:company (4)
  • pub:development (4)
  • pub:operations (1)
  • pub:recruitment (1)
Any time
  • Any time
  • Past week
  • Past month
  • Past year
Sort by hits
  • Sort by hits
  • Sort by last modified

Fulltext results:

Communications @pub:company
8 Hits, Last modified: 5 months ago
ts, webinars, interviews, and podcast appearances by - Unicis and its team members. ^Platform ^H... can be used to promote original posts on LinkedIn by Unicis staff. Follow these steps if you think you... eye out for approval. Your post will be reviewed by the team and used in a promoted post if it’s deem... tsi]]. </WRAP> ==== Modifying an event organized by someone else ==== You can edit, duplicate or del
Introduction to Development
6 Hits, Last modified: 11 months ago
ment|Agile]], but not limited to and not strictly by the book. ++++ Iterative, incremental, and evolu... trating software to customers regularly, at least by the end of each iteration. ++++ ====== Developm... ity and readability across our development teams. By following established guidelines and conventions,... e system responsiveness and resource utilization. By continually monitoring and optimizing our applica
Products @pub:company
6 Hits, Last modified: 11 months ago
, and quality testers. Product groups are grouped by business goal and designed to operate in parallel... uct group is responsible for security and privacy by default and by design, performance, stability, scalability, database migrations, release compatibilit... PR), each code change or logic should be reviewed by the lead or someone else. The reviewer is require
What is Unicis?
4 Hits, Last modified: 11 months ago
nsparent for every business. We strive to do this by providing a single, comprehensive application tha... ==== Our mission is to empower startups and SMBs by offering a comprehensive solution that streamline... o improve compliance, security, risk, and privacy by automating and simplifying workflows. We are stri... an open-source solution for compliance management by the end of the fiscal year. This shows how commit
Unicis SOC Plan
3 Hits, Last modified: 9 months ago
lyse incident trends and response times, enhanced by enriched threat data from MISP and Cortex. * Sh... les. * Updating MISP with new IoCs detected by Wazuh or validated by Cortex. * Quarantining affected endpoints using Wazuh triggers. * The
Unicis.Tech @pub:company
3 Hits, Last modified: 3 months ago
ag>remote}} ==== Open source ==== Unicis is open by design. Unicis Platform Community Edition is [[ht... ested? You can read the job description and apply by clicking on one of the positions. Please share a... ===== You can learn about the history of Unicis by looking at the timeline on our [[https://www.unic
Source Code @pub:development
3 Hits, Last modified: 11 months ago
=== The repository is public and can be accessed by anyone at: [[https://github.com/UnicisTech/unicis... ingly. * **Merge Conflicts**: Resolve conflicts by pulling the latest changes and merging them into ... s://www.unicis.tech/community|Unicis Community]] By following this handbook, you will be well-equippe
Privacy Policy @pub:trust_center:policies
3 Hits, Last modified: 10 months ago
| We keep our privacy policy under regular review by applying privacy by default and by design approach. ++++ ++++ How to contact us| [[https://unicis.tech/contact|Contact f
Minimum Viable Secure Product (MVSP) Implementation Overview @pub:trust_center
2 Hits, Last modified: 2 months ago
| CSP, X-Frame, HSTS, etc. enforced by server and app; tested on CI/CD deploys. ... ecurity Controls**. Inactive accounts deactivated by n8n. | | Operational Controls | Sub-processors
IT Security Policy @pub:trust_center:policies
2 Hits, Last modified: 10 months ago
tech/dpa|Data Processing Agreement]] example, and by [[https://unicis.tech/contact|contacting us]]. {... days for medium risk vulnerabilities (as defined by their CVSS score). ===== Application Implementat
Welcome to Unicis Handbook
1 Hits, Last modified: 2 months ago
s welcome to contribute. You can change this page by clicking the edit link. A request will be made fo
Leadership @pub:company
1 Hits, Last modified: 11 months ago
d a direct message to the Founder and co-founders by mentioning them in a comment under the file or th
DevOps @pub:development
1 Hits, Last modified: 11 months ago
[https://docs.gitlab.com/ee/ci/|GitLab CI Docs]] By following this handbook, you will be well-equippe
Environments @pub:development
1 Hits, Last modified: 11 months ago
ion is deployed and made available for actual use by end-users. It is the environment in which all ope
Software Development Lifecycle @pub:development
1 Hits, Last modified: 4 months ago
unctional. * Available for purchase or download by all users. * Transition from development to ong
Tech Stack Applications @pub:operations
1 Hits, Last modified: 8 weeks ago
Unicis Open Positions @pub:recruitment
1 Hits, Last modified: 4 weeks ago
Processes and Procedures @pub:trust_center
1 Hits, Last modified: 5 weeks ago
Trusted Subprocessors and Infrastructure Overview @pub:trust_center
1 Hits, Last modified: 5 weeks ago
Vendor Questionnaires @pub:trust_center
1 Hits, Last modified: 11 months ago