Unicks Security
Secure by design
We base our activity on robust data security and privacy practices and incorporate these principles into the design, implementation and management of our products and services.
Data protection
We know that we are the custodians of very sensitive data owned by our clients, which is why we ensure a robust security model supported by constantly updated data protection architectures and highly resilient service platforms.
ISO 27001
We have been ISO 27001 certified since July 2019, covering the activities of composition, production, personalization, multichannel distribution and digital archiving of documents.
ISO 27001
We have been ISO 27001 certified since July 2019, covering the activities of composition, production, personalization, multichannel distribution and digital archiving of documents.
Access control
Access is assigned according to roles and responsibilities and profiles are managed in an auditable and traceable way.
Secure email sending
Emails are sent with a TLS certificate and using DMARC, SPF and DKIM protocols.
Own datacenter
Our digital custody solution guarantees file immutability through the WORM (Write Once Read Many) system and is supported on DELL ECS (Elastic Cloud Storage) equipment.
Perimeter security
Rules are applied that define permissions for communication and data transactions between systems.
Encryption
AES 252 bit encryption is guaranteed for data at rest and HTTPS with TLS 1.2 encryption for data in transit.
Management backoffice
Access to the secure backoffice is only available to authorized connections for management purposes.
Protection against malware
Malware protection is applied based on the most recently identified threat listings that support real-time scanning.
Data anonymization
The personal data stored in our databases is encrypted, allowing it to be anonymized.
Access control
Access is assigned according to roles and responsibilities and profiles are managed in an auditable and traceable way.
Secure email sending
Emails are sent with a TLS certificate and using DMARC, SPF and DKIM protocols.
Own datacenter
Our digital custody solution guarantees file immutability through the WORM (Write Once Read Many) system and is supported on DELL ECS (Elastic Cloud Storage) equipment.
Perimeter security
Rules are applied that define permissions for communication and data transactions between systems.
Encryption
AES 252 bit encryption is guaranteed for data at rest and HTTPS with TLS 1.2 encryption for data in transit.
Management backoffice
Access to the secure backoffice is only available to authorized connections for management purposes.
Protection against malware
Malware protection is applied based on the most recently identified threat listings that support real-time scanning.
Data anonymization
The personal data stored in our databases is encrypted, allowing it to be anonymized.
Resilient service platforms
Component redundancy
All components are installed in 'n + 1' mode in Lisbon and Aveiro, configured in "active - active" mode and supported by a load balancing service that allows for business continuity.
Internet access redundancy
We have an internet service contract with two telecommunications operators.
Service redundancy
Automatic traffic distribution is ensured, supporting high availability, scalability and robust security.
Data replication
Data is synchronized in datacentres located in different geographies.
Capacity management
Proactive monitoring is carried out based on conservative limits and there is the possibility of expansion.
Safe development
Product roadmap
The product roadmap is defined and reviewed periodically. Security fixes are prioritized and grouped into the fastest possible sprint.
Version control
The source code is managed centrally with version control and restricted access based on the teams assigned to specific sprints. Logs are kept for code changes and code check-ins and check-outs.
Quality Assurance
All changes are tested by the quality control team and criteria are established for code reviews. The builds are subjected to functionality tests, performance tests and stability tests before being certified as "ready for use".
Segregation of duties
Access to production is restricted to a very limited set of users based on their roles. Access to the production environment for developers and members of the quality control team is restricted based on their job responsibilities.
Secure datacenter
Physical infrastructure supported by a CF60 safe room.
High physical security room with steel walls and MSITR panel.
CF60 fire insulation panels.
High mechanical resistance and physical security.
Socketed switchboards, with double busbar - 2N, with inter-bar system.
Datacentre general switchboard.
2N uninterruptible power supply units (20KVA).
Air conditioning - 2N - with a total of 46 KW of cooling power, in two units of 23KW each.
Fire detection and extinguishing system.
Dedicated generator set.
Our partners
technology