Security

Preventive intelligence starts with protecting yours.

Security is embedded in the way we design, build, and operate Unit6. From data isolation to response runbooks, every decision is backed by operational rigor and transparency so you can run mission-critical programs with confidence.

SOC 2 Type IIZero Trust24/7 Monitoring

Safeguards

How we secure the Unit6 platform.

Controls span technology, people, and process because attackers search for weak seams. The highlights below map to our trust report and detailed documentation we provide to customers under NDA.

Layered infrastructure

Every production surface is segmented, monitored, and wrapped in automated guardrails to reduce lateral movement.

  • Role-scoped service meshes and dedicated VPCs per tenant.
  • Encryption with customer-specific keys managed through HSM backed KMS.
  • Restricted bastion access with short-lived certificates and session recording.

Platform hardening

Secure coding standards pair with automated scanning and manual reviews so vulnerabilities are addressed before release.

  • Static analysis, IaC scanning, and Software Bill of Materials (SBOM) on every merge.
  • Independent red-teaming of high-risk surfaces twice a year.
  • Signed artifacts and reproducible builds for every deployment.

People & process

Security awareness, insider-threat monitoring, and zero-trust access keep employees aligned with least privilege.

  • Quarterly training that mirrors the evolving attack landscape.
  • Fine-grained just-in-time access with auto-expiry for sensitive systems.
  • Continuous background and vendor screening tied to HR workflows.

Monitoring & response

24/7 operations center backed by threat intelligence.

Our responders use the same preventive intelligence platform customers rely on, letting us neutralize threats quickly and share useful context the moment something looks off.

DetectMinutes

Telemetry from the Watcher Intelligence Network feeds detections across cloud, workload, and SaaS layers. High-signal alerts page responders and create audit entries automatically.

Triage30 minutes

Cross-functional on-call teams review the signal, confirm scope, and decide whether to escalate to an incident. Customer tenants potentially impacted receive notice with initial guidance.

ContainHours

Automations isolate workloads, rotate credentials, and patch or roll back services. Dedicated liaisons keep customers informed with clear action plans and timestamped updates.

LearnDays

Every incident closes with a blameless review covering root cause, permanent fixes, and telemetry improvements. Findings flow into product sprints and customer advisories.

Trust & compliance

Independent oversight.

Third parties audit our controls, and customers can review the reports plus technical detail through their Unit6 representative.

  • SOC 2 Type II controls mapped across security, availability, confidentiality.
  • GDPR, CCPA, and critical infrastructure requirements baked into data flows.
  • Responsible disclosure program with <48h first response commitment.
  • Regional data residency options in North America, EU, and APAC.

Need more detail?

Customers and prospects under NDA can access penetration test summaries, architecture diagrams, and business continuity plans.

Request the trust package →