Search by Algolia
Introducing new developer-friendly pricing
algolia

Introducing new developer-friendly pricing

Hey there, developers! At Algolia, we believe everyone should have the opportunity to bring a best-in-class search experience ...

Nick Vlku

VP of Product Growth

What is online visual merchandising?
e-commerce

What is online visual merchandising?

Eye-catching mannequins. Bright, colorful signage. Soothing interior design. Exquisite product displays. In short, amazing store merchandising. For shoppers in ...

Catherine Dee

Search and Discovery writer

Introducing the new Algolia no-code data connector platform
engineering

Introducing the new Algolia no-code data connector platform

Ingesting data should be easy, but all too often, it can be anything but. Data can come in many different ...

Keshia Rose

Staff Product Manager, Data Connectivity

Customer-centric site search trends
e-commerce

Customer-centric site search trends

Everyday there are new messages in the market about what technology to buy, how to position your company against the ...

Piyush Patel

Chief Strategic Business Development Officer

What is online retail merchandising? An introduction
e-commerce

What is online retail merchandising? An introduction

Done any shopping on an ecommerce website lately? If so, you know a smooth online shopper experience is not optional ...

Vincent Caruana

Sr. SEO Web Digital Marketing Manager

5 considerations for Black Friday 2023 readiness
e-commerce

5 considerations for Black Friday 2023 readiness

It’s hard to imagine having to think about Black Friday less than 4 months out from the previous one ...

Piyush Patel

Chief Strategic Business Development Officer

How to increase your sales and ROI with optimized ecommerce merchandising
e-commerce

How to increase your sales and ROI with optimized ecommerce merchandising

What happens if an online shopper arrives on your ecommerce site and: Your navigation provides no obvious or helpful direction ...

Catherine Dee

Search and Discovery writer

Mobile search UX best practices, part 3: Optimizing display of search results
ux

Mobile search UX best practices, part 3: Optimizing display of search results

In part 1 of this blog-post series, we looked at app interface design obstacles in the mobile search experience ...

Vincent Caruana

Sr. SEO Web Digital Marketing Manager

Mobile search UX best practices, part 2: Streamlining search functionality
ux

Mobile search UX best practices, part 2: Streamlining search functionality

In part 1 of this series on mobile UX design, we talked about how designing a successful search user experience ...

Vincent Caruana

Sr. SEO Web Digital Marketing Manager

Mobile search UX best practices, part 1: Understanding the challenges
ux

Mobile search UX best practices, part 1: Understanding the challenges

Welcome to our three-part series on creating winning search UX design for your mobile app! This post identifies developer ...

Vincent Caruana

Sr. SEO Web Digital Marketing Manager

Teaching English with Zapier and Algolia
engineering

Teaching English with Zapier and Algolia

National No Code Day falls on March 11th in the United States to encourage more people to build things online ...

Alita Leite da Silva

How AI search enables ecommerce companies to boost revenue and cut costs
ai

How AI search enables ecommerce companies to boost revenue and cut costs

Consulting powerhouse McKinsey is bullish on AI. Their forecasting estimates that AI could add around 16 percent to global GDP ...

Michelle Adams

Chief Revenue Officer at Algolia

What is digital product merchandising?
e-commerce

What is digital product merchandising?

How do you sell a product when your customers can’t assess it in person: pick it up, feel what ...

Catherine Dee

Search and Discovery writer

Scaling marketplace search with AI
ai

Scaling marketplace search with AI

It is clear that for online businesses and especially for Marketplaces, content discovery can be especially challenging due to the ...

Bharat Guruprakash

Chief Product Officer

The changing face of digital merchandising
e-commerce

The changing face of digital merchandising

This 2-part feature dives into the transformational journey made by digital merchandising to drive positive ecommerce experiences. Part 1 ...

Reshma Iyer

Director of Product Marketing, Ecommerce

What’s a convolutional neural network and how is it used for image recognition in search?
ai

What’s a convolutional neural network and how is it used for image recognition in search?

A social media user is shown snapshots of people he may know based on face-recognition technology and asked if ...

Catherine Dee

Search and Discovery writer

What’s organizational knowledge and how can you make it accessible to the right people?
product

What’s organizational knowledge and how can you make it accessible to the right people?

How’s your company’s organizational knowledge holding up? In other words, if an employee were to leave, would they ...

Catherine Dee

Search and Discovery writer

Adding trending recommendations to your existing e-commerce store
engineering

Adding trending recommendations to your existing e-commerce store

Recommendations can make or break an online shopping experience. In a world full of endless choices and infinite scrolling, recommendations ...

Ashley Huynh

Looking for something?

10 things to ask your search provider about security
facebookfacebooklinkedinlinkedintwittertwittermailmail

Back in the 1980s, American Tourister ran luggage ads with gorillas tossing around suitcases to demonstrate just how tough their products are. The product designers did a pretty good job ensuring resilience in the face of serious monkey (actually, ape…) business. I like the metaphor because it’s not too different for software. Similarly, SaaS applications are designed by engineers to handle all kinds of abuse — brute force attacks, data leakage, phishing, and more. 

Security is about protecting data, company IP, brand reputation, and more. Globally, the average cost of a data breach is $4.35 million. Many software buyers don’t have the knowledge, resources, or insights into what security best practices are in place, and so security questions often only come up near the tail-end of the buying cycle. We feel it’s a good approach to consider the acquisition of any software with security in mind from the start. 

If you’re evaluating search providers (or really any SaaS product), here are 10 questions you might want to start with to understand their security practices.

1. What considerations do you make when designing search software?

Security needs to be a part of the development planning process, not an afterthought. We are fortunate to have a dedicated security team that works with our engineers and product managers to review product architecture and related infrastructure. The team’s job is to ensure that the data flowing into the product from various possible sources and data centers — product catalogs, support-facing solutions, internal analytics, conversion events — is transported and stored securely using modern encryption technology and highest compliance standards. We also work hard to maintain transparency. For example, since 2017 we worked with the Cloud Security Alliance to continually train and certify our team on the highest standards of security, and TrustArc for ensuring data privacy. Security needs to be designed into the software from day one.

2. Where (and how) is my data stored?

Is data stored on premises or in the cloud? Who is watching over your data, and how is it secured? Algolia is a 100% hosted solution provider. We host data on bare metal servers on every continent in 70+ data centers around the world. Customers have the option to run Algolia either in EU-based or US-based data centers fully-managed on Microsoft Azure or AWS. Data is encrypted in transit (AES-256) and customers also have the option to encrypt their data ‘at rest’ using managed-per-server keys with Algolia Vault. Our data centers are continuously monitored, managed, and tested: 

  • We keep them only in PCI-DSS, ISO27001 and/or SOC2 certified data centers
  • We test them continuously with several vulnerability scanning tools
  • They’re pen-tested twice a year by a reliable, independent 3rd-party
  • We have a permanent bug bounty program running
  • All logs are sent to an SIEM solution for scanning and immediate reporting
  • All servers are running an EDR overwatched by a specialized SOC team
  • We’re developing new tools for overwatching them, with a whole specialized team
  • We’re reviewing every new feature to make sure it does not create new weaknesses

3. Is your software compliant?

All companies must comply with international and/or local laws. Or, they have customers who will only work with vendors whose services meet exacting standards. With more than 17,000 customers ranging from governments, corporations, medical enterprises and more, all with strict requirements, we have purposely designed our service to work across many public and private use cases. Today, Algolia is compliant with… 

  • ISO27001
  • ISO27017
  • BSI C5
  • HIPAA
  • GDPR
  • CPRA
  • SOC 2 Type 2
  • SOC 3 

4. How is data managed?

Your data is yours. So, you will want to work with providers who will manage your data with the utmost care so it’s not lost or leaked. Our services do not track your customers, and their identities stay under your control. We have a secure multi-tenant architecture — monitored 24/7 — to prevent leakage of data between our customers and continual monitoring of API access. We design our highly-available service with redundancy and backups, which allow us to provide 99.99% (and higher) reliability. 

5. What happens if there’s a data breach? 

Is the provider you’re speaking with prepared for worse-case scenarios, and if so, how? Of course we do everything we can to ensure this never happens, including semi-annual independent penetration testing of our services. However, should this happen, we will quickly determine the cause, understand what data (if any) has been compromised, contact affected customers in less than 24 hours, and work to remediate the issue as soon as possible. 

6. What guarantees do you offer?

An interruption in service can happen for a lot of reasons — cloud provider disruption, a customer exceeding their own usage, local ISP issues, etc. How cloud vendors guarantee their services can vary widely. However, if the issue is with Algolia, our Algolia service level agreement (SLA) covers standard and premium plans with guaranteed remuneration. Should we fail to meet the stands we’ve set for ourselves, customers are eligible for credits. 

7. What happens when a product vulnerability is discovered?

Enterprise-scale software is built from thousands of components — open source and proprietary — usually with microservices for different capabilities. The orchestration of such complex systems is not without risk; a lot can go wrong as new vulnerabilities are discovered. We place a lot of effort into having the best security. For instance, it took us only a few hours after the disclosure of an OpenSSL HeartBleed vulnerability to fix it. We’re performing regular independent penetration testing and have a public bug bounty program on HackerOne that helps us ensure ongoing security. 

8. What happens to your company data if you decide to terminate the subscription?

As your needs change, you may need to switch providers. What happens to your data when you leave? Of course, we will do everything we can to keep you as a customer, but we know that’s not always possible. At Algolia, we retain information in accordance with our subscription agreements. We may also retain and use certain personal information for a reasonable period as necessary — to pursue our legitimate business interests, conduct audits, comply with our legal obligations, resolve disputes, and so forth. You’ll find it all spelled out transparently in our Privacy Policy

9. Who has access to data and systems? 

It’s important to know who is coming and going and when data is in transit. Security is a shared responsibility between Algolia and our customers. On one hand, we do what we can to lock down access, and on the other we ask our customers to manage access responsibly. For example, we have controlled access to infrastructure and offer features for secure API key management, 2FA, and application permission levels. We also implement the latest best practices to ensure that your data is safe, secure, and isolated from the data of other Algolia users. However, it’s equally incumbent on our customers to follow security best practices, manage access and permissions for their users, and keep their Admin API keys secret and hidden. By managing access as a team, we can be more secure together. The terms of service customers agree to spells out their expectations for managing access and information sharing. 

10. How do your employees approach security?

Security is not just managed by the security team. Everyone at an organization should be made aware of the risks and responsibilities. When everyone is made aware of the possible risks and rewards, we can provide a safer, more secure service. At Algolia, new hires are given training before accessing any systems when they’re onboarded and everyone must pass a security test each year. Our IT team also maintains administrative safeguards on company-owned equipment, ensuring the devices and applications are up-to-date. We have a shared security channel in Slack to report incidents, concerns, or just ask questions; when it comes to security, there are no stupid questions!

Of course, there’s much, much more to our security policies. Above all, as you investigate a provider’s security measures, look for transparency. For a provider to be less than transparent means, more than likely, that they’re obfuscating something important.

Here are a bunch of additional resources to learn more about security at Algolia. 

About the author
Denis Petit

Senior Manager, Security

linkedin

Recommended Articles

Powered byAlgolia Algolia Recommend

Algolia is now ISO 27001 and ISO 27017 certified
product

Sanjay Gupta

Senior Manager, Technology Compliance

What to look for in a Search API
product

Benoit Perrot

Director, Engineering

Algolia's Checklist for Selecting a Critical SaaS Service
engineering

Julien Lemoine

Co-founder & CTO at Algolia