Blueprint for AI-powered Customer Learning Experiences

Watch Now

Data Privacy and Security is in Our DNA

Conformity with the strictest security compliance allows SearchUnify to protect your data and fortify your business against threats & attacks with a foundation of top-notch security.

Integrate with LLMs Securely and Guardrail against Decision Bias

When sharing customer data with third-party LLMs like OpenAI, SearchUnify prioritizes data security and confidentiality with its FRAGTM framework. Our measures include:

Data Compatibility: The Semantic Encoder ensures that input data is compatible with LLMs while maintaining data integrity.

Sensitive Data Removal: Critical or sensitive information is removed from the data before sending it to third-party LLMs.

Response Refinement: The Response Refiner refines LLM-generated responses, ensuring the output is free from sensitive information. This protects customer data and ensures the presentation of relevant and contextually appropriate information.

Be Assured of Compliance

SearchUnify’s parent company, Grazitti Interactive, has achieved regulatory compliance with ISO 27001:2013, HIPAA, ISO27701:2019, and SSAE 18. The SOC 1 and SOC 2 reports can be made available to customers upon demand, whereas SOC 3 report is publically available and can be accessed directly at Grazitti SOC 3 report.

Ensure Secure Native Connectivity with OAuth 2.0 Authentication

SearchUnify provides industry standard OAuth 2.0 for authenticating access to different content source platforms. It ensures native installation for every content source by respecting object and field level access. Also, the users do not have to release their personal information but still have the ability to share data with ease.

Control Who Can Access Your SearchUnify Instance

SearchUnify supports role-based access control (RBAC) where access can be controlled via UI, API, or other means. SearchUnify supports three kinds of admin users :

Super Admin: There can be one, or at most two super administrators in an instance. A super admin can add or remove any admin or moderator, and change access control settings.

Admin: an admin can add and delete moderator and can set the moderator access.

Moderator: a moderator can never add or remove users. The permissions are limited to what an admin has assigned.

Top-Tier Security Companies Entrust SeachUnify with Their Security

Supporting the Highest Standards for Information Security and Privacy

incidents of data breach and downtime experienced by almost all our clients

factor score awarded by global leader in cybersecurity ranking, Security Scorecard

Protect Your Data in Transit and at Rest

SearchUnify uses Amazon EBS encryption and AES-256 encryption while storing the indexes in the middleware. We understand data in transit is more vulnerable and prone to attacks than data at rest. SearchUnify uses TLS 1.3 and IPSEC VPN tunnels to protect data in transit.

Maintain Reliability with a Single-tenant Solution

SearchUnify is a single-tenant solution, which guarantees additional security of the content when maintaining its indices and prevents any accidental information leakage.

Stay Prepared for Back Up & Disaster Recovery

SearchUnify uses the EBS snapshot policy to back up the data. The backups are encrypted with the AES-256 cryptographic algorithm. SearchUnify uses a daily snapshot policy to recover from any fault or disaster. It also backs up data in multiple geographical locations with the help of AWS to prevent any data loss during a natural disaster.

Keep Tabs On Your Instance’s Well-being

You get a separate application Status Page that tells you about the current health of your SearchUnify instance. These include the operational health of your admin panel, help center, content & search API. In case of any errors or malfunctions, the system generates an automatic alert to the admin via phone or email.

Have a VAPT Audited Product

SearchUnify conducts vulnerability assessment and penetration tests, both internal & external, on its products on a regular basis to ensure their performance is to their best at all times. Our Customer Agreement, therefore, forbids one from delving into any kind of security, performance, vulnerability, and stress testing on the product without prior permission.