Why data security sensitive organizations choose SearchBlox?
User Security, Authentication, Authorization, Data Encryption, and Audit available by default.
SearchBlox gives you the most comprehensive security architecture to help keep your data secure and compliant with regulations such as GDPR, HIPAA, PCI, and ISO. Whether you need encryption in transit, authentication for users, or monitoring and logging for all data access, SearchBlox offers the most secure enterprise search platform.
Encryption in-transit is essential to prevent your data from being intercepted during transit between servers within your cluster setup. SearchBlox supports OpenSSL and TLS 1.2/1.3, allowing you to meet stringent security standards and compliance requirements while providing easy integration within your internal data center or cloud infrastructure. SearchBlox allows you to encrypt columns within a data record to ensure sensitive PII values are protected yet searchable and accessible only to authorized users.
SearchBlox can leverage your existing authentication infrastructure such as LDAP/Active Directory, SAML, Kerberos, JSON web tokens, TLS certificates, and Proxy authentication/SSO for user authentication. An internal user management realm with support for Basic HTTP authentication is also available for easy security setup. SearchBlox also supports secure and authenticated crawling of your data sources for ingestion and ensures your data is secure at all times.
Our role-based access control enables you to control the actions a user can perform on your search collection. Groups/Roles control user access to indices, documents, and can be granular even down to the field-level. SearchBlox supports multi-department and company wide controls, allowing organizations to share the same search setup while only being able to access their team's data and search results.
With our audit logging, you can record and track all the actions performed by users within SearchBlox and monitor any suspicious activity, which is essential for security incident response. Audit logging also helps you remain compliant with government and industry regulations such as GDPR, HIPAA, PCI, and ISO.