• Home
  • Content
  • Page Tools
    Show pageOld revisionsBacklinks
  • Site Tools
    Recent ChangesMedia ManagerSitemap
  • User Tools
    Log In
≪ View Page

Search

You can find the results of your search below.

Ends with
  • Exact match
  • Starts with
  • Ends with
  • Contains
Any namespace
  • Any namespace
  • pub (20)
  • user (1)
  • wiki (1)
Any time
  • Any time
  • Past week
  • Past month
  • Past year
Sort by hits
  • Sort by hits
  • Sort by last modified

Matching pagenames:

  • IT Security Policy

Fulltext results:

IT Security Policy @pub:trust_center:policies
34 Hits, Last modified: 10 months ago
====== IT Security Policy ====== //Effective date: 17.05.2024.// Security is very important to Unicis and everyone here is ... data secure. This document describes our internal security policies, and minimum security baseline and how those translate into creating a secure platform, add-ons an
Releasing @pub:development
19 Hits, Last modified: 11 months ago
rged PRs from bumped dependencies unless they fix security issues or are otherwise notable. Remove merged PR... rged PRs from bumped dependencies unless they fix security issues or are otherwise notable. Remove merged PR... rate Release Notes// feature ===== Preparing a Security Release ===== * Create a draft GitHub Security advisory ++++ Template | ==== Summary ==== Short summar
Minimum Viable Secure Product (MVSP) Implementation Overview @pub:trust_center
15 Hits, Last modified: 2 months ago
tion and communication. It adheres to modern cybersecurity standards through built-in security features, open-core governance, and integration with trusted open-sourc... implementation strategy leverages the Unicis Cybersecurity Controls module for audit tracking, and integrate... management), and the Unicis Awareness module (for security training and compliance). This table provides a
Unicis Open Positions @pub:recruitment
13 Hits, Last modified: 4 weeks ago
About Us ==== Unicis is building a cutting-edge Security Operations Center (SOC) using an open-source tech... re seamlessly integrated to provide comprehensive security monitoring and alert management capabilities. You... ng up automation workflows, and ensuring that all security alerts are reported and managed through the Zabbi... igure Zabbix to handle, display, and act upon all security alerts. * Develop and maintain Docker Compose s
Predrag Tasevski (predrag) - Public Page @user
10 Hits, Last modified: 8 weeks ago
Ü • Founder and CEO// <row> <col> <card> **Cyber Security & Privacy by Design Advocate | Certified CISO, IS... , and more** Predrag has worked in cyber and IT security for more than a decade. He knows how to make security and privacy work by design and default. He also knows... chain projects. Working as a director, head of IT security, CISO, senior cloud security engineer, and consul
Vendor Questionnaires @pub:trust_center
10 Hits, Last modified: 11 months ago
n place to accept and process external reports of security issues in your products and/or services? //If ye... Do you perform annual reviews of your application security controls for each qualifying product or service t... Training === Do you provide regular and ongoing security awareness training for your employees? //If yes,... ocesses in place to ensure the smooth handling of security and privacy incidents? //If yes, please describe
What is Unicis? @pub
8 Hits, Last modified: 11 months ago
al intelligence to change the way legal, privacy, security, and risk teams work. We are committed to providi... serves as a hub that simplifies the management of security, privacy, risk, and compliance functions. We ar... that addresses all compliance, privacy, risk, and security concerns. {{tag>vision}} ===== Mission ===== Ou... mprehensive solution that streamlines compliance, security, risk, and privacy management through the integra
Communications @pub:company
7 Hits, Last modified: 5 months ago
sified according to the [[https://www.unicis.tech/security#data-classification|Security Policy]] and the categories define who can access the information. * **Publ... rations, and/or the people involved. e.g., social security numbers during hiring ===== Email relays ===== ... ===== Vendor questionnaires ===== In response to security questionnaires, Unicis strives to provide full tr
Introduction to Development @pub
6 Hits, Last modified: 11 months ago
testing to ensure functionality, performance, and security. ++++ ++++ Continuous Integration/Continuous Dep... maintainable, and easy to collaborate on. ===== Security Practices ===== Security is paramount in safeguarding sensitive data and ensuring compliance with industry regulations. Implementing robust security measures, such as encryption protocols, access co
DevOps @pub:development
5 Hits, Last modified: 11 months ago
ud (VPC) for secure networking. * **Subnets and Security Groups**: Define subnets and configure security groups to control inbound and outbound traffic. * **Load ... process to ensure quality and consistency. * **Security**: Regularly update dependencies and apply security patches. * **Backup and Recovery**: Set up regular ba
Processes and Procedures @pub:trust_center
4 Hits, Last modified: 5 weeks ago
tings and via communication tools. ===== 8. Data Security and Confidentiality ===== * **IT Security Policy:** Follow the [[it_security_policy/|IT Security Policy]]. ===== 9. Technical Support ===== * **Help Desk:** Provide a [[tech_stack_
Trusted Subprocessors and Infrastructure Overview @pub:trust_center
4 Hits, Last modified: 5 weeks ago
our services while maintaining high standards of security, data protection, and compliance. Most of our in... billing and payments. * **Wazuh** – Open-source security platform used for SIEM, security control monitoring, and vulnerability management. * **IRIS** – Self-host... our operations and always with strict privacy and security reviews: * **Atlassian** – Jira Service Desk,
Trust Center @pub
3 Hits, Last modified: 2 months ago
~~NOTOC~~ ====== Trust Center ====== As a security, privacy, and compliance company, Unicis conducts period... ust-center compliance privacy policies guidelines security}} ====== Controls ====== Explore the controls, t... our services while maintaining high standards of security, data protection, and compliance. <button primar
Products @pub:company
3 Hits, Last modified: 11 months ago
arallel. Every product group is responsible for security and privacy by default and by design, performance... | | IANASP | "I am not a security & privacy expert", but I smell security and privacy issues | ==== Planned and unplanned chang
Tech Stack Applications @pub:operations
3 Hits, Last modified: 8 weeks ago
ssible. If it is not possible, please request the Security and Privacy Review. </WRAP> ====== Yunohost - SS... 2) **URL:** https://wazuh.com/ The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads. {{tag>siem xdr security vulnerability compliance}}
Content Unicis Handbook
2 Hits, Last modified: 11 months ago
Unicis Onboarding Training
2 Hits, Last modified: 10 months ago
Welcome to Unicis Handbook @pub
2 Hits, Last modified: 2 months ago
Unicis SOC Plan @pub
2 Hits, Last modified: 9 months ago
Unicis.Tech @pub:company
2 Hits, Last modified: 3 months ago
Source Code @pub:development
2 Hits, Last modified: 11 months ago
Formatting Syntax @wiki
1 Hits, Last modified: 5 weeks ago
Environments @pub:development
1 Hits, Last modified: 11 months ago
Unicis Policies @pub:trust_center
1 Hits, Last modified: 10 months ago