Unicks Security

Secure by design

We base our activity on robust data security and privacy practices and incorporate these principles into the design, implementation and management of our products and services.

Data protection

We know that we are the custodians of very sensitive data owned by our clients, which is why we ensure a robust security model supported by constantly updated data protection architectures and highly resilient service platforms.

ISO 27001

We have been ISO 27001 certified since July 2019, covering the activities of composition, production, personalization, multichannel distribution and digital archiving of documents.

ISO 27001

We have been ISO 27001 certified since July 2019, covering the activities of composition, production, personalization, multichannel distribution and digital archiving of documents.

Access control

Access is assigned according to roles and responsibilities and profiles are managed in an auditable and traceable way.

Secure email sending

Emails are sent with a TLS certificate and using DMARC, SPF and DKIM protocols.

Own datacenter

Our digital custody solution guarantees file immutability through the WORM (Write Once Read Many) system and is supported on DELL ECS (Elastic Cloud Storage) equipment.

Perimeter security

Rules are applied that define permissions for communication and data transactions between systems.

Encryption

AES 252 bit encryption is guaranteed for data at rest and HTTPS with TLS 1.2 encryption for data in transit.

Management backoffice

Access to the secure backoffice is only available to authorized connections for management purposes.

Protection against malware

Malware protection is applied based on the most recently identified threat listings that support real-time scanning.

Data anonymization

The personal data stored in our databases is encrypted, allowing it to be anonymized.

Access control

Access is assigned according to roles and responsibilities and profiles are managed in an auditable and traceable way.

Secure email sending

Emails are sent with a TLS certificate and using DMARC, SPF and DKIM protocols.

Own datacenter

Our digital custody solution guarantees file immutability through the WORM (Write Once Read Many) system and is supported on DELL ECS (Elastic Cloud Storage) equipment.

Perimeter security

Rules are applied that define permissions for communication and data transactions between systems.

Encryption

AES 252 bit encryption is guaranteed for data at rest and HTTPS with TLS 1.2 encryption for data in transit.

Management backoffice

Access to the secure backoffice is only available to authorized connections for management purposes.

Protection against malware

Malware protection is applied based on the most recently identified threat listings that support real-time scanning.

Data anonymization

The personal data stored in our databases is encrypted, allowing it to be anonymized.

Resilient service platforms

Component redundancy

All components are installed in 'n + 1' mode in Lisbon and Aveiro, configured in "active - active" mode and supported by a load balancing service that allows for business continuity.

Internet access redundancy

We have an internet service contract with two telecommunications operators.

Service redundancy

Automatic traffic distribution is ensured, supporting high availability, scalability and robust security.

Data replication

Data is synchronized in datacentres located in different geographies.

Capacity management

Proactive monitoring is carried out based on conservative limits and there is the possibility of expansion.

Safe development

Product roadmap

The product roadmap is defined and reviewed periodically. Security fixes are prioritized and grouped into the fastest possible sprint.

Version control

The source code is managed centrally with version control and restricted access based on the teams assigned to specific sprints. Logs are kept for code changes and code check-ins and check-outs.

Quality Assurance

All changes are tested by the quality control team and criteria are established for code reviews. The builds are subjected to functionality tests, performance tests and stability tests before being certified as "ready for use".

Segregation of duties

Access to production is restricted to a very limited set of users based on their roles. Access to the production environment for developers and members of the quality control team is restricted based on their job responsibilities.

Secure datacenter

5

Physical infrastructure supported by a CF60 safe room.

5

High physical security room with steel walls and MSITR panel.

5

CF60 fire insulation panels.

5

High mechanical resistance and physical security.

5

Socketed switchboards, with double busbar - 2N, with inter-bar system.

5

Datacentre general switchboard.

5

2N uninterruptible power supply units (20KVA).

5

Air conditioning - 2N - with a total of 46 KW of cooling power, in two units of 23KW each.

5

Fire detection and extinguishing system.

5

Dedicated generator set.

Our partners
technology

Shall we improve your communication flows?