Introducing new developer-friendly pricing
Hey there, developers! At Algolia, we believe everyone should have the opportunity to bring a best-in-class search experience ...
VP of Product Growth
Hey there, developers! At Algolia, we believe everyone should have the opportunity to bring a best-in-class search experience ...
VP of Product Growth
Eye-catching mannequins. Bright, colorful signage. Soothing interior design. Exquisite product displays. In short, amazing store merchandising. For shoppers in ...
Search and Discovery writer
Ingesting data should be easy, but all too often, it can be anything but. Data can come in many different ...
Staff Product Manager, Data Connectivity
Everyday there are new messages in the market about what technology to buy, how to position your company against the ...
Chief Strategic Business Development Officer
Done any shopping on an ecommerce website lately? If so, you know a smooth online shopper experience is not optional ...
Sr. SEO Web Digital Marketing Manager
It’s hard to imagine having to think about Black Friday less than 4 months out from the previous one ...
Chief Strategic Business Development Officer
What happens if an online shopper arrives on your ecommerce site and: Your navigation provides no obvious or helpful direction ...
Search and Discovery writer
In part 1 of this blog-post series, we looked at app interface design obstacles in the mobile search experience ...
Sr. SEO Web Digital Marketing Manager
In part 1 of this series on mobile UX design, we talked about how designing a successful search user experience ...
Sr. SEO Web Digital Marketing Manager
Welcome to our three-part series on creating winning search UX design for your mobile app! This post identifies developer ...
Sr. SEO Web Digital Marketing Manager
National No Code Day falls on March 11th in the United States to encourage more people to build things online ...
Consulting powerhouse McKinsey is bullish on AI. Their forecasting estimates that AI could add around 16 percent to global GDP ...
Chief Revenue Officer at Algolia
How do you sell a product when your customers can’t assess it in person: pick it up, feel what ...
Search and Discovery writer
It is clear that for online businesses and especially for Marketplaces, content discovery can be especially challenging due to the ...
Chief Product Officer
This 2-part feature dives into the transformational journey made by digital merchandising to drive positive ecommerce experiences. Part 1 ...
Director of Product Marketing, Ecommerce
A social media user is shown snapshots of people he may know based on face-recognition technology and asked if ...
Search and Discovery writer
How’s your company’s organizational knowledge holding up? In other words, if an employee were to leave, would they ...
Search and Discovery writer
Recommendations can make or break an online shopping experience. In a world full of endless choices and infinite scrolling, recommendations ...
Feb 6th 2023 product
Back in the 1980s, American Tourister ran luggage ads with gorillas tossing around suitcases to demonstrate just how tough their products are. The product designers did a pretty good job ensuring resilience in the face of serious monkey (actually, ape…) business. I like the metaphor because it’s not too different for software. Similarly, SaaS applications are designed by engineers to handle all kinds of abuse — brute force attacks, data leakage, phishing, and more.
Security is about protecting data, company IP, brand reputation, and more. Globally, the average cost of a data breach is $4.35 million. Many software buyers don’t have the knowledge, resources, or insights into what security best practices are in place, and so security questions often only come up near the tail-end of the buying cycle. We feel it’s a good approach to consider the acquisition of any software with security in mind from the start.
If you’re evaluating search providers (or really any SaaS product), here are 10 questions you might want to start with to understand their security practices.
Security needs to be a part of the development planning process, not an afterthought. We are fortunate to have a dedicated security team that works with our engineers and product managers to review product architecture and related infrastructure. The team’s job is to ensure that the data flowing into the product from various possible sources and data centers — product catalogs, support-facing solutions, internal analytics, conversion events — is transported and stored securely using modern encryption technology and highest compliance standards. We also work hard to maintain transparency. For example, since 2017 we worked with the Cloud Security Alliance to continually train and certify our team on the highest standards of security, and TrustArc for ensuring data privacy. Security needs to be designed into the software from day one.
Is data stored on premises or in the cloud? Who is watching over your data, and how is it secured? Algolia is a 100% hosted solution provider. We host data on bare metal servers on every continent in 70+ data centers around the world. Customers have the option to run Algolia either in EU-based or US-based data centers fully-managed on Microsoft Azure or AWS. Data is encrypted in transit (AES-256) and customers also have the option to encrypt their data ‘at rest’ using managed-per-server keys with Algolia Vault. Our data centers are continuously monitored, managed, and tested:
All companies must comply with international and/or local laws. Or, they have customers who will only work with vendors whose services meet exacting standards. With more than 17,000 customers ranging from governments, corporations, medical enterprises and more, all with strict requirements, we have purposely designed our service to work across many public and private use cases. Today, Algolia is compliant with…
Your data is yours. So, you will want to work with providers who will manage your data with the utmost care so it’s not lost or leaked. Our services do not track your customers, and their identities stay under your control. We have a secure multi-tenant architecture — monitored 24/7 — to prevent leakage of data between our customers and continual monitoring of API access. We design our highly-available service with redundancy and backups, which allow us to provide 99.99% (and higher) reliability.
Is the provider you’re speaking with prepared for worse-case scenarios, and if so, how? Of course we do everything we can to ensure this never happens, including semi-annual independent penetration testing of our services. However, should this happen, we will quickly determine the cause, understand what data (if any) has been compromised, contact affected customers in less than 24 hours, and work to remediate the issue as soon as possible.
An interruption in service can happen for a lot of reasons — cloud provider disruption, a customer exceeding their own usage, local ISP issues, etc. How cloud vendors guarantee their services can vary widely. However, if the issue is with Algolia, our Algolia service level agreement (SLA) covers standard and premium plans with guaranteed remuneration. Should we fail to meet the stands we’ve set for ourselves, customers are eligible for credits.
Enterprise-scale software is built from thousands of components — open source and proprietary — usually with microservices for different capabilities. The orchestration of such complex systems is not without risk; a lot can go wrong as new vulnerabilities are discovered. We place a lot of effort into having the best security. For instance, it took us only a few hours after the disclosure of an OpenSSL HeartBleed vulnerability to fix it. We’re performing regular independent penetration testing and have a public bug bounty program on HackerOne that helps us ensure ongoing security.
As your needs change, you may need to switch providers. What happens to your data when you leave? Of course, we will do everything we can to keep you as a customer, but we know that’s not always possible. At Algolia, we retain information in accordance with our subscription agreements. We may also retain and use certain personal information for a reasonable period as necessary — to pursue our legitimate business interests, conduct audits, comply with our legal obligations, resolve disputes, and so forth. You’ll find it all spelled out transparently in our Privacy Policy.
It’s important to know who is coming and going and when data is in transit. Security is a shared responsibility between Algolia and our customers. On one hand, we do what we can to lock down access, and on the other we ask our customers to manage access responsibly. For example, we have controlled access to infrastructure and offer features for secure API key management, 2FA, and application permission levels. We also implement the latest best practices to ensure that your data is safe, secure, and isolated from the data of other Algolia users. However, it’s equally incumbent on our customers to follow security best practices, manage access and permissions for their users, and keep their Admin API keys secret and hidden. By managing access as a team, we can be more secure together. The terms of service customers agree to spells out their expectations for managing access and information sharing.
Security is not just managed by the security team. Everyone at an organization should be made aware of the risks and responsibilities. When everyone is made aware of the possible risks and rewards, we can provide a safer, more secure service. At Algolia, new hires are given training before accessing any systems when they’re onboarded and everyone must pass a security test each year. Our IT team also maintains administrative safeguards on company-owned equipment, ensuring the devices and applications are up-to-date. We have a shared security channel in Slack to report incidents, concerns, or just ask questions; when it comes to security, there are no stupid questions!
Of course, there’s much, much more to our security policies. Above all, as you investigate a provider’s security measures, look for transparency. For a provider to be less than transparent means, more than likely, that they’re obfuscating something important.
Here are a bunch of additional resources to learn more about security at Algolia.
Powered by Algolia Recommend