Search
You can find the results of your search below.
Fulltext results:
- Introduction to Development @pub
- without compromising performance or reliability. Through scalable architecture patterns, load testing, and... d education and skill enhancement are facilitated through ongoing training programs that cover emerging tec... mechanisms for collecting and analyzing feedback through surveys, usability tests, and direct interactions... ongoing refinement of our processes and products. Through retrospectives, metrics analysis, and proactive p
- Products @pub:company
- s ==== Planned changes are scheduled and managed through our standard change management process. Unplanned... etailed release notes are provided to guide users through the transition. ==== Drafting ==== Drafting mea... eatures we add to our products. Each feature goes through a lifecycle from request to release, ensuring it ... op priority at Unicis. We maintain high standards through rigorous testing, code reviews, and continuous im
- Communications @pub:company
- ods of promoting Unicis products and solutions is through participation in events. This presents an opportu... ires, Unicis strives to provide full transparency through our security policies, trust, and application sec... gress tracking and additional support are ensured through regular check-ins. This approach fosters a cultu
- What is Unicis? @pub
- d. Our commitment to this purpose is demonstrated through our provision of complimentary access to our solu... ompliance, security, risk, and privacy management through the integration of Unicis Platform, and Unicis At
- Unicis SOC Plan @pub
- . * TheHive Playbooks: * Guide analysts through consistent incident response workflows: * E... s ===== ==== Wazuh ==== * Intrusion detection through log monitoring, anomaly detection, and file integ
- Formatting Syntax @wiki
- "). * For Mozilla and Firefox it can be enabled through different workaround mentioned in the [[http://kb... ngle' and "double quotes". They can be turned off through a [[doku>config:typography|config option]]. ====
- Leadership @pub:company
- * do NOT receive company equipment. * do NOT go through training using the contributor onboarding issue. ... by mentioning them in a comment under the file or through the internal messaging system, requesting a revie
- Unicis.Tech @pub:company
- Automating security, data privacy, and compliance through the utilization of open standards and data. * A... requirements. * Building credibility and trust through open-source software. ===== Culture ===== Unici
- Processes and Procedures @pub:trust_center
- Acknowledge and celebrate community contributions through regular shout-outs, contributor spotlights, and o... eedback:** Provide regular, constructive feedback through one-on-one meetings and performance reviews. *
- Welcome to your new DokuWiki @wiki
- DokuWiki is an Open Source project that thrives through user contributions. A good way to stay informed o
- Source Code @pub:development
- stency. * **Code Reviews**: All changes must go through a code review process before being merged. ====
- Unicis Open Positions @pub:recruitment
- that all security alerts are reported and managed through the Zabbix interface. ==== Key Responsibilities
- Vendor Questionnaires @pub:trust_center
- === Do you have information on the flow of data through systems available for threat modeling or incident
- IT Security Policy @pub:trust_center:policies
- platform. Each and every incident at Unicis goes through the rigorous internal incident management process
- Privacy Policy @pub:trust_center:policies
- we may collect information from you automatically through cookies or similar technology We use cookies onl