Trust & security
How Unified Systems Intelligence protects customer data, operates the Unify platform on AWS, and provides assurance materials for your vendor security process. This page summarizes our SOC 2 Type I (Security & Availability, design) narrative and related practices.
SOC 2 reports are restricted use documents. Public summaries here do not replace the full report. Request access through Contact Us under NDA or your procurement channel.
Unified Systems Intelligence (USI) delivers the Unify suite as cloud software with a security program designed around least privilege, strong authentication for administrative paths, network segmentation, continuous monitoring, and a documented software development lifecycle. The following summary reflects commitments and system design described in our SOC 2 materials and is intended as a high-level overview for customers and prospects.
Application data is primarily user-generated—information your organization enters, uploads, or processes through Unify. Data flows through front-end and API components into managed database services; logs and monitoring telemetry are aggregated for security and operations.
The in-scope system is AWS-hosted, with staging environments that mirror production in functionality and general architecture. Edge traffic is protected by AWS WAF; compute includes EC2 running Apache Tomcat-based applications interacting with managed databases (including MongoDB in the described data flows) and Amazon RDS-class patterns where applicable.
Users → TLS → Web application → Application / API tier (EC2) → Databases & object storage; parallel paths for logging/SIEM (Wazuh, CloudWatch, CloudTrail, GuardDuty) and support tooling (Unify.CRM) consistent with the SOC 2 system description.
The following reflects common enterprise controls across Unify products. Exact availability can vary by edition and configuration—validate in your order form or security addendum.
Unify.AI provides AI-enabled automation. Our SOC 2 system description references self-hosted LLM components and third-party LLM integrations connected through the application tier. Secure coding practices explicitly include AI-integrated services.
Unify.AI’s agent store and orchestration are designed as a controlled automation layer—combining governance, logging, and least-privilege tool access as a differentiator for regulated and operational workloads.
We welcome responsible disclosure of security vulnerabilities. Please report issues through Contact Us with enough detail to reproduce (no public disclosure until we agree on coordinated disclosure).
Enterprise security teams can request assurance artifacts and standardized questionnaire responses through the channels below.
Return to Home · Contact · Privacy Policy