Security

Data Security with SearchUnify

Security is of paramount importance for an enterprise search solution. SearchUnify’s technology makes sure that it maintains data security and integrity at all times

Data Integrity

SearchUnify only maintains your content indexes. It does not write back into or modify any source content, which ensures that your data is never corrupted.

Data Encryption

SearchUnify uses AES-256 encryption while storing the indexes in the middleware. To ensure that no unauthorized person accesses the information, we use multifactor authentication.

Transport Layer Security

We understand data in transit is more vulnerable and prone to attacks than data at rest. SearchUnify uses TLS 1.2 encryption to protect data in transit.

Tenancy

SearchUnify is a single-tenant solution, which guarantees additional security to the content when maintaining its indexes.

Role-Based Access Control

SearchUnify provides role-based access to information. It makes sure that only authorized users can access information specific to their role.

Company Security

SearchUnify is an enterprise search product created by Grazitti Interactive – a digital innovation company committed to maintaining the confidentiality, integrity and availability of our customers’ data.

Grazitti Interactive has achieved the regulatory compliance with ISO 27001:2013, HIPAA, PIMS, and SSAE 16. We are committed to support the highest standards for business process control, data security, and privacy.

ISO 27001:2013

ISO 27001:2013

Grazitti Interactive is ISO 27001:2013 certified which follows a systematic and proactive approach to protect confidentiality, integrity, and availability of our/customers sensitive information.

HIPAA Compliance

HIPAA

Team Grazitti is committed to protect sensitive patient data and ensures that all the required measures are in place and followed.

PIMS

PIMS

Grazitti Interactive adopts reasonable security practices and procedures, in line with the international standard of PIMS in order to protect customers PII “Personal Identifiable Information”.

SSAE 16

SSAE 16

Grazitti has undergone SOC 1 TYPE 2 and SOC 2 TYPE 2 process and successfully completed the rigorous independent audit.

Cloud Security

We understand how essential it is to carry out debugging processes and eliminate any potential security vulnerabilities. Taking this into consideration, we conduct automated as well as manual security analysis, and partner with third-party security experts to audit and safeguard the SearchUnify Cloud.

Employee Credibility

At Grazitti Interactive, we perform a thorough employee background check and regularly train them to uphold our information security standards and comply with our data security policies. Our industry certifications and compliance reports are a proof of our commitment to customer data security.

Incident Management

We adhere to stringent disaster management policies, conduct regular drills to make sure there is no security breach. If there is any—suspected or reported—we provide 24/7 support to ensure that it is resolved immediately.

Data Availability

Data availability is as important as data security. We take regular snapshots of content indexes and store them for backup. We maintain multiple servers with load balancers to make sure there are no downtimes.

Vulnerability Testing

Our Customer Agreement forbids any kind of security, performance, stress, or vulnerability testing on any of our services without receiving Grazitti Interactive’s permission in advance. If you need to access our logs, you can reach out to us and we will share them with you via a log sharing solution like Splunk.