Search
You can find the results of your search below.
Fulltext results:
- Communications @pub:company
- ts, webinars, interviews, and podcast appearances by - Unicis and its team members. ^Platform ^H... can be used to promote original posts on LinkedIn by Unicis staff. Follow these steps if you think you... eye out for approval. Your post will be reviewed by the team and used in a promoted post if it’s deem... tsi]]. </WRAP> ==== Modifying an event organized by someone else ==== You can edit, duplicate or del
- Introduction to Development
- ment|Agile]], but not limited to and not strictly by the book. ++++ Iterative, incremental, and evolu... trating software to customers regularly, at least by the end of each iteration. ++++ ====== Developm... ity and readability across our development teams. By following established guidelines and conventions,... e system responsiveness and resource utilization. By continually monitoring and optimizing our applica
- Products @pub:company
- , and quality testers. Product groups are grouped by business goal and designed to operate in parallel... uct group is responsible for security and privacy by default and by design, performance, stability, scalability, database migrations, release compatibilit... PR), each code change or logic should be reviewed by the lead or someone else. The reviewer is require
- What is Unicis?
- nsparent for every business. We strive to do this by providing a single, comprehensive application tha... ==== Our mission is to empower startups and SMBs by offering a comprehensive solution that streamline... o improve compliance, security, risk, and privacy by automating and simplifying workflows. We are stri... an open-source solution for compliance management by the end of the fiscal year. This shows how commit
- Unicis SOC Plan
- lyse incident trends and response times, enhanced by enriched threat data from MISP and Cortex. * Sh... les. * Updating MISP with new IoCs detected by Wazuh or validated by Cortex. * Quarantining affected endpoints using Wazuh triggers. * The
- Unicis.Tech @pub:company
- ag>remote}} ==== Open source ==== Unicis is open by design. Unicis Platform Community Edition is [[ht... ested? You can read the job description and apply by clicking on one of the positions. Please share a... ===== You can learn about the history of Unicis by looking at the timeline on our [[https://www.unic
- Source Code @pub:development
- === The repository is public and can be accessed by anyone at: [[https://github.com/UnicisTech/unicis... ingly. * **Merge Conflicts**: Resolve conflicts by pulling the latest changes and merging them into ... s://www.unicis.tech/community|Unicis Community]] By following this handbook, you will be well-equippe
- Privacy Policy @pub:trust_center:policies
- | We keep our privacy policy under regular review by applying privacy by default and by design approach. ++++ ++++ How to contact us| [[https://unicis.tech/contact|Contact f
- IT Security Policy @pub:trust_center:policies
- tech/dpa|Data Processing Agreement]] example, and by [[https://unicis.tech/contact|contacting us]]. {... days for medium risk vulnerabilities (as defined by their CVSS score). ===== Application Implementat
- Welcome to Unicis Handbook
- s welcome to contribute. You can change this page by clicking the edit link. A request will be made fo
- Leadership @pub:company
- d a direct message to the Founder and co-founders by mentioning them in a comment under the file or th
- DevOps @pub:development
- [https://docs.gitlab.com/ee/ci/|GitLab CI Docs]] By following this handbook, you will be well-equippe
- Environments @pub:development
- ion is deployed and made available for actual use by end-users. It is the environment in which all ope
- Software Development Lifecycle @pub:development
- unctional. * Available for purchase or download by all users. * Transition from development to ong
- Unicis Open Positions @pub:recruitment
- Docker for a robust security monitoring solution. By integrating these tools, the SOC will centralize