Search by Algolia
Feature Spotlight: Query Rules
product

Feature Spotlight: Query Rules

You’re running an ecommerce site for an electronics retailer, and you’re seeing in your analytics that users keep ...

Jaden Baptista

Technical Writer

An introduction to transformer models in neural networks and machine learning
ai

An introduction to transformer models in neural networks and machine learning

What do OpenAI and DeepMind have in common? Give up? These innovative organizations both utilize technology known as transformer models ...

Vincent Caruana

Sr. SEO Web Digital Marketing Manager

What’s the secret of online merchandise management? Giving store merchandisers the right tools
e-commerce

What’s the secret of online merchandise management? Giving store merchandisers the right tools

As a successful in-store boutique manager in 1994, you might have had your merchandisers adorn your street-facing storefront ...

Catherine Dee

Search and Discovery writer

New features and capabilities in Algolia InstantSearch
engineering

New features and capabilities in Algolia InstantSearch

At Algolia, our business is more than search and discovery, it’s the continuous improvement of site search. If you ...

Haroen Viaene

JavaScript Library Developer

Feature Spotlight: Analytics
product

Feature Spotlight: Analytics

Analytics brings math and data into the otherwise very subjective world of ecommerce. It helps companies quantify how well their ...

Jaden Baptista

Technical Writer

What is clustering?
ai

What is clustering?

Amid all the momentous developments in the generative AI data space, are you a data scientist struggling to make sense ...

Vincent Caruana

Sr. SEO Web Digital Marketing Manager

What is a vector database?
product

What is a vector database?

Fashion ideas for guest aunt informal summer wedding Funny movie to get my bored high-schoolers off their addictive gaming ...

Vincent Caruana

Sr. SEO Web Digital Marketing Manager

Unlock the power of image-based recommendation with Algolia’s LookingSimilar
engineering

Unlock the power of image-based recommendation with Algolia’s LookingSimilar

Imagine you're visiting an online art gallery and a specific painting catches your eye. You'd like to find ...

Raed Chammam

Senior Software Engineer

Empowering Change: Algolia's Global Giving Days Impact Report
algolia

Empowering Change: Algolia's Global Giving Days Impact Report

At Algolia, our commitment to making a positive impact extends far beyond the digital landscape. We believe in the power ...

Amy Ciba

Senior Manager, People Success

Retail personalization: Give your ecommerce customers the tailored shopping experiences they expect and deserve
e-commerce

Retail personalization: Give your ecommerce customers the tailored shopping experiences they expect and deserve

In today’s post-pandemic-yet-still-super-competitive retail landscape, gaining, keeping, and converting ecommerce customers is no easy ...

Vincent Caruana

Sr. SEO Web Digital Marketing Manager

Algolia x eTail | A busy few days in Boston
algolia

Algolia x eTail | A busy few days in Boston

There are few atmospheres as unique as that of a conference exhibit hall: the air always filled with an indescribable ...

Marissa Wharton

Marketing Content Manager

What are vectors and how do they apply to machine learning?
ai

What are vectors and how do they apply to machine learning?

To consider the question of what vectors are, it helps to be a mathematician, or at least someone who’s ...

Catherine Dee

Search and Discovery writer

Why imports are important in JS
engineering

Why imports are important in JS

My first foray into programming was writing Python on a Raspberry Pi to flicker some LED lights — it wasn’t ...

Jaden Baptista

Technical Writer

What is ecommerce? The complete guide
e-commerce

What is ecommerce? The complete guide

How well do you know the world of modern ecommerce?  With retail ecommerce sales having exceeded $5.7 trillion worldwide ...

Vincent Caruana

Sr. SEO Web Digital Marketing Manager

Data is king: The role of data capture and integrity in embracing AI
ai

Data is king: The role of data capture and integrity in embracing AI

In a world of artificial intelligence (AI), data serves as the foundation for machine learning (ML) models to identify trends ...

Alexandra Anghel

Director of AI Engineering

What are data privacy and data security? Why are they  critical for an organization?
product

What are data privacy and data security? Why are they critical for an organization?

Imagine you’re a leading healthcare provider that performs extensive data collection as part of your patient management. You’re ...

Catherine Dee

Search and Discovery writer

Achieving digital excellence: Algolia's insights from the GDS Retail Digital Summit
e-commerce

Achieving digital excellence: Algolia's insights from the GDS Retail Digital Summit

In an era where customer experience reigns supreme, achieving digital excellence is a worthy goal for retail leaders. But what ...

Marissa Wharton

Marketing Content Manager

AI at scale: Managing ML models over time & across use cases
ai

AI at scale: Managing ML models over time & across use cases

Just a few years ago it would have required considerable resources to build a new AI service from scratch. Of ...

Benoit Perrot

VP, Engineering

Looking for something?

facebookfacebooklinkedinlinkedintwittertwittermailmail

From the early days, Algolia has made information security and privacy not just a priority, but a point of pride. We have a highly specialized team that is entirely dedicated to security, our servers are located in data centers that follow highest industry security standards, and our infrastructure is protected by multilayer access control. We run continuous security testing through a public bounty program and regular pen tests, and are SOC 2 certified.

To this list of accomplishments, today we proudly add the ISO/IEC 27001:2013 and ISO/IEC 27017:2015 certifications.

What are ISO 27000 certifications?

Handling our customers’ data and our company’s data is at the core of our business. For this reason, we adhere to a series of information security standards that govern how we navigate our environment, our requirements and our restrictions.

The ISO 27000 is an internationally recognized family of standards outlining best practices for managing information security and privacy.

More specifically, ISO 27001 helps organizations manage the security of services, data, intellectual property or any information entrusted by a third party. It formally specifies an Information Security Management System (ISMS): a set of defined policies, processes, and systems to manage organizational data.

The ISO/IEC 27017:2015 code of practice is designed for organizations to use as a reference for selecting and implementing cloud services information security controls, and addresses cloud-specific information security threats and risks. For example, it defines and regulates:

  • Shared roles and responsibilities within a cloud computing environment
  • Protection and separation of a customer’s virtual environment from that of other customers
  • Virtual machine hardening requirements to meet business needs
  • Procedures for administrative operations of a cloud computing environment
  • Enabling customers to monitor relevant activities within a cloud computing environment
  • Alignment of security management for virtual and physical networks
  • Removal and return of cloud service customer assets upon contract termination

What this means for our customers

According to Forbes, the annual global cost of cybercrime is expected to exceed $6 trillion by 2021, rendering the safety of sensitive consumer and company information a critical business topic. We believe this is an important part of the value we provide to our customers. Companies who choose to build their own search solution must also implement their own security practices, and there have been many examples of data security breaches where companies have not done this well enough.

Simply put, we want your data to be as safe as possible. Incorporating these latest security standards is particularly valuable to large enterprises that process and handle large volumes of personally identifiable information: banks, healthcare and e-commerce companies, but will benefit companies of all sizes and industries.

As always, don’t hesitate to ask us any question on this or other security topics: security@algolia.com.

About the author
Sanjay Gupta

Senior Manager, Technology Compliance

linkedin

Recommended Articles

Powered byAlgolia Algolia Recommend

10 things to ask your search provider about security
product

Denis Petit

Senior Manager, Security

What are data privacy and data security? Why are they  critical for an organization?
product

Catherine Dee

Search and Discovery writer

What to look for in a Search API
product

Benoit Perrot

Director, Engineering