Search
You can find the results of your search below.
Matching pagenames:
- Introduction to Development
- Recruitment
- Trust Center
- DevOps
- Environments
- Releasing
- Software Development Lifecycle
- Source Code
- Service and Vendor providers
- Unicis Open Positions
- Minimum Viable Secure Product (MVSP) Implementation Overview
- Unicis Policies
- Processes and Procedures
- Trusted Subprocessors and Infrastructure Overview
- Vendor Questionnaires
- IT Security Policy
- Privacy Policy
Fulltext results:
- Introduction to Development
- ethodology, team structure, and best practices to ensure our products meet the highest standards. ===... lopment Philosophy and Approach ====== [[https://en.wikipedia.org/wiki/Agile_software_development|Agi... eks. Each sprint involves a cross-functional team engaged in planning, analysis, design, coding, unit ... mizes initial planning, reduces overall risk, and enables the product to swiftly adapt to modification
- Communications @pub:company
- tion |CEO | |Engineering output and architecture |CTO ... disseminate information to a broader audience and encourage greater involvement within communities. Th... events. This presents an opportunity to directly engage with potential users and contributers, build ... s and demo videos. These videos provide community engagement, educational resources, and essential inf
- Environments @pub:development
- =====Environments===== <WRAP warning> Each of these environments is important in the software development li... hanges are tested and validated before they reach end-users in the Production environment, where stability and reliability are important. </WRAP> =====
- Products @pub:company
- erson(s) ^ | Product Designer, Engineering Manager, Product Manager, Quality Assura... Quality Assurance | Predrag - CEO and Founder | | Engineering Manager | Peter -... em in a controlled and systematic way. This helps ensure the reliability and integrity of our services... documentation and a post-implementation review to ensure no negative impact on the system. ==== Break
- Unicis SOC Plan
- * Analysts triage Wazuh alerts in TheHive and enrich them with observables from threat intelligenc... e IoCs from MISP with incidents in TheHive. * Enrich TheHive cases with detailed threat actor prof... : * Leverage Cortex analyzers to validate and enrich MISP IoCs (e.g., domain reputation, IP geoloc... domains, hashes), Cortex analyzers automatically enrich them with actionable intelligence. * TheHiv
- IT Security Policy @pub:trust_center:policies
- Viable Secure Product (MVSP)]] as a baseline for enterprise-ready products and services. {{tag>MVSP}... ractices on their cloud security page. ==== Data Encryption at Rest ==== We use hybrid cloud services, and configured to use AES-256 encryption for all data at rest. ==== Data Classifi... ogic and information flows of each new feature to ensure no security vulnerabilities are introduced. B
- Unicis Open Positions @pub:recruitment
- logy stack. We are looking for an experienced SOC Engineer who has hands-on experience in setting up a... with Docker. ==== Job Description ==== As a SOC Engineer, you will be responsible for designing, dep... e latest versions of Zabbix, Wazuh, and MISP, and ensure these tools are seamlessly integrated to prov... ntegrations, setting up automation workflows, and ensuring that all security alerts are reported and m
- Minimum Viable Secure Product (MVSP) Implementation Overview @pub:trust_center
- ting | Clients may request sandbox environments; tests are isolated and monitored. Guid... s Cybersecurity Controls**. Regional segmentation enforced via Mautic. ... ess Controls | Data handling | End-of-life handling logged in OpenProject. Data del... trols | Single Sign-On (SSO) | SSO enforced across platform. Self-hosted clients can co
- Vendor Questionnaires @pub:trust_center
- questionnaire is based on [[https://mvsp.dev/mvsp.en/|MVSP controls]] and provides a clear set of requirements for enterprise-ready products and services. <WRAP info>... t Handling === Do you have processes in place to ensure the smooth handling of security and privacy i... be the process.// === 2.2 HTTPS-only === Do you ensure sensitive data is encrypted in transit betwee
- Source Code @pub:development
- Business Edition of the Unicis Platform includes enterprise features and custom integrations. === Re... components ├── data ├── hooks ├── lib └── locales/en └── models └── pages └── prisma └── public └── st... repository is restricted to authorized personnel. Ensure you have the necessary permissions to clone a... ssages**: Follow the commit message guidelines to ensure clarity and consistency. * **Code Reviews**
- Processes and Procedures @pub:trust_center
- a meeting, away). * **Community Interaction:** Engage with the community on open-source platforms r... least 24 hours in advance. Stick to the agenda to ensure efficient use of time. * **Minutes:** Assig... g and brainstorming sessions. ===== 6. Community Engagement ===== * **Contribution Guidelines:** P... eScout]] virtual help desk for technical support. Ensure employees and community members know how to s
- Leadership @pub:company
- I have setup with you. I am fully accountable for enhancing the items listed below, and listing them i... onal Management:** Overseeing daily operations to ensure smooth and efficient business processes. * ... pen position. * must be onboarded (complete the entire, unabridged onboarding process in Fleet's "On... Mutual Non-Disclosure Agreement === Contract or engagement such as a consortium with any other compa
- Software Development Lifecycle @pub:development
- d characteristics. Following this guide will help ensure that our software is thoroughly tested and re... user feedback. * Often used for games or other engagement-driven software. ==== Guidelines ==== ... ularly update the software based on feedback. * Engage with the community to understand their needs ... intenance and support. ==== Guidelines ==== * Ensure all critical and major bugs are fixed. * Fi
- Right to Erasure Request Form
- ired fields are marked with an asterisk* You are entitled to request us to erase any personal data we... further information we may ask you to provide to enable us to comply with your request, whichever hap... "Data subject?" "YES: I am the data subject. I enclose proof of my identity (see below). (Please go... I am acting on behalf of the data subject. I have enclosed the data subject’s written authority and pr
- DevOps @pub:development
- ience. Our infrastructure is hosted on OVH Cloud, ensuring reliability and scalability. The CI/CD proc... r images or directly from Git repositories. * **Environment Variables**: Configure environment variables for each application as needed. ==== 3. CI/CD ... automatically deploy new builds to the respective environments. ===== Website and Handbook Deployment