Unicks Security

Secure by design

We support our activity in robust data security and privacy practices and we incorporate these principles in the design, implementation and management of our products and services.

Data protection

We know that we are custodians of very sensitive data owned by our customers, and that is why we ensure a robust security model supported by constantly updating data protection architectures and highly resilient service platforms.

ISO 27001

We are ISO 27001 certified since July 2019 covering the activities of composition, production, personalization, multi-channel distribution and digital document archiving.

Access control

The allocation of access is carried out according to roles and responsibilities and profiles are managed in an auditable manner with traceability.

Secure email sending

Emails are sent with a TLS certificate and using DMARC, SPF and DKIM protocols.

Own data center

Our digital custody solution guarantees file immutability through the WORM (Write Once Read Many) system and supported on DELL ECS (Elastic Cloud Storage) equipment.

Perimeter security

Rules that define communication and data transaction permissions between systems are applied.

Encryption

AES 252 bit encryption is ensured for data at rest and HTTPS with TLS 1.2 encryption for data in transit.

Management backoffice

Access to the secure backoffice is only available to authorized connections for management purposes.

Malware Protection

Malware protection is applied based on the latest identified threat listings that support real-time scanning.

Data anonymization

The personal data stored in our databases are encrypted, thus allowing their anonymization.

Resilient service platforms

Component redundancy

All components are installed in ‘n + 1’ mode in Lisbon and Aveiro, configured in “active – active” mode and supported by a load balancing service that allows business continuity.

Internet access redundancy

We have an internet service agreement with two telecommunications operators.

Service redundancy

Automatic traffic distribution that supports high availability, scalability and robust security is ensured.

Data replica

Data is synchronized in datacentres located in different geographies.

Capacity management

Proactive monitoring is done based on conservative limits and there is scope for expansion.

Secure development

Product roadmap

The product roadmap is defined and periodically reviewed. Security fixes are prioritized and grouped into the sprint as quickly as possible.

Version control

Source code is centrally managed with version control and restricted access based on teams assigned to specific sprints. Logs are maintained for code changes and code check-ins and check-outs.

Quality warranty

All changes are tested by the QA team and criteria are set for performing code reviews. Builds undergo functionality testing, performance testing, and stability testing before being certified as “ready to use”.

Segregation of duties

Production access is restricted to a very limited set of users based on their roles. Access to the production environment for developers and QA team members is restricted based on their job responsibilities.

Secure Datacentre

5

Physical infrastructure supported in a CF60 safe room.

5

High physical security room with steel walls and MSITR panel.

5

CF60 fire insulating panels.

5

High mechanical strength and physical safety.

5

Rescued electrical panels, with double busbar – 2N, with inter-busbar system.

5

General electrical panel of datacentre.

5

2 2N uninterruptible power supply units (20KVA).

5

Climatization – 2N – with 46 KW of total cooling power, in two units of 23KW each.

5

Fire detection and extinguishing system.

5

Dedicated generator set.

Our technology partners

Let’s streamline your customer communications?