Careers
Login

Content / Discovery

Product Discovery and CMS

Engagement platform

Please login through the link in your invite email

English
DeutschFrançais
Bloomreach
Bloomreach
  • Products
    Products

    Personalize marketing

    in real-time across email, sms, app, website, and more

    • Email Marketing
    • SMS & Messaging
    • Ads & Retargeting
    • Web Personalization
    • Mobile APP Marketing
    • Marketing Intelligence & AI
    • Omnichannel Orchestration
    • Experiments & A/B testing
    • Plug & Play Use Cases
    • See All Engagement products

    Ecommerce search

    and merchandising focused on maximizing revenue

    • Search Intelligence
    • Merchandising
    • Search APIs
    • Product Recommendations
    • SEO
    • Personalized search
    • What's New from Discovery
    • See All Discovery products

    Build, manage and personalize

    experiences with headless CMS for every commerce platform

    • Headless Content
    • Page Building
    • Site Management
    • Content Personalization
    • Headless Commerce Use Case
    • See All Content products
  • Data & Integrations
    Data & Integrations
    • Loomi, AI for ecommerce

      Loomi is the AI that fuels connected commerce experiences.

    • Customer Data Engine

      Customer data management, and advanced analytics for omnichannel personalization

    • Integrations

      Explore integrations for Bloomreach products

    • Partner Agencies

      Engage with Bloomreach Partners to Help Create World-Class Customer Experiences

    • Technology Partners

      Enrich customer experiences with these vendor partners

    • Connected Commerce Platforms

      Get value faster, with simpler integration for select commerce platforms

    • Shopify
    • Twilio
    • Magento
    • Salesforce Commerce
  • Case Studies
  • Pricing
    Pricing

    Marketing Automation

    Packages and Pricing

    • Email Marketing
    • SMS & Mobile Messaging
    • Web & App Personalization
    • Intelligence & Orchestration
    • Ad Optimization
    • Enterprise Engagement
    • See All Engagement products

    Product Discovery

    Packages and Pricing

    • Ecommerce Site Search
    • Merchandising
    • Recommendations
    • SEO
    • See All Discovery products

    Headless CMS

    Packages and Pricing

    • Grow
    • Scale
    • Enterprise

    All Pricing Options
  • Learn
    Learn

    Resource Library

    Content and resources to help formulate and execute your digital strategy

    All Resources
    Videos
    Blog
    Analyst Reports
    Whitepapers
    Podcasts
    Webinars
    Events
    Analyst Reports
    Whitepapers
    Podcasts
    Webinars
    Events
    See All Library Resources

    Product Resources

    Get the most out of Bloomreach products with these resources

    Documentation
    Assessment Tools
    Integrations
    Plug & Play Library
    Privacy at Bloomreach
    Bloomreach Academy
    Security
    Bloomreach Partners
    Plug & Play Library
    Privacy at Bloomreach
    Bloomreach Academy
    Security
    Bloomreach Partners
    See All Product Resources

    Use Cases

    See Bloomreach in action

    All Use Cases
    Ecommerce Personalization
    Leverage AI
    Grow AOV
    Retention and Loyalty
    Increase Profitability
    Acquire More Customers
    Understand Customer Data
    Grow AOV
    Retention and Loyalty
    Increase Profitability
    Acquire More Customers
    Understand Customer Data
    See All Use Cases
About Us
Careers
Contact Us
Login
Get a Demo
Languages:
ENDEFR
Get a Demo

Security at Bloomreach

Ensure stability by enabling your team to create, send, test, and analyze campaigns, all within the same user-friendly platform.

Think Outside the Search Box

  • Our Certificates
  • Strong Security Culture
  • Secure Development Practices

SOC2 Type II

Bloomreach officially earned its SOC 2 Type II Certification as of March 14, 2023, and has met the rigorous standards set by the American Institute of Certified Public Accountants (AICPA) for the company.

The SOC 2 Type II report verifies the effectiveness of our information security controls that ensure the security, availability, and confidentiality of the data in our care, and consists of an opinion letter from the auditor, management's assertion of compliance, the description of the systems being reviewed, the description of the test of controls and the results of that testing.

Our SOC2 Type II certificate can be provided upon request with proper confidentiality assurance.

Depending on the type of business and related services, Bloomreach holds multiple independent third-party Security Program and Operating Environment certifications including:


ISO 9001
ISO 27001
ISO 27017
ISO 27018
ISO 22301
GDPR certification

We create a strong security culture here at Bloomreach, as each and every employee is an essential part of our defense against potential breaches.

This culture is present at all stages, including the hiring process, employee on‑boarding, and ongoing training and company events. All new employees are required to agree to our NDA and go through OWASP training. This shows our commitment to keeping the data of our customers secure.

The developers in the IT segment receive instructions on topics like best coding and development practices, the principle of least privilege when granting access rights, etc. The IT department also attends technical presentations on security‑related topics, and receives regular updates on the newest issues from the Cybersecurity space in our security channel.

Security Management

Endpoint Security Vulnerability Management Quality Assurance Monitoring Incident Management Reassurance

Endpoint Security

We ensure all of our endpoint devices are protected according to our Endpoint Security Policy. This includes disc encryption, malware protection, guest access disabled, firewall, and regularly updated operating systems. In addition, we perform regular checks to make sure that we maintain this high level of security.

Vulnerability Management

Bloomreach has a vulnerability management policy that includes processes such as regular web scans and scans for potential threats. Once a vulnerability requiring our attention has been identified, it is tracked and assigned for resolution.

Quality Assurance

It is vital for us to properly test all new features before implementing them so that we make sure no unexpected vulnerabilities are introduced to the application. The QA team guarantees that all new additions to our application are bug‑free prior to release. They also test private instances for our fresh clients just before they get into the hands of our Client Services team.

Monitoring

Our security monitoring is performed on information collected from internal network traffic and the knowledge of our vulnerabilities. Internal traffic is checked for any suspicious behavior. Network analysis and examination of system logs in order to identify unusual behavior are a vital part of monitoring. We place search alerts on public data repositories to look for security incidents and analyze system logs.

Incident Management

Bloomreach has well‑defined incident management processes for security events that may affect the confidentiality, integrity, or availability of our clients' resources or data. If an incident occurs, the security team identifies it, reports it, assigns it, and gives it a resolution priority based on its urgency. Events that directly impact our customers are always assigned the highest priority and shortest resolution time. This process involves plans of action, procedures for identification, escalation, mitigation, and reporting.

Reassurance

To ensure our Security Management is transparent and the details are shared with those who need to see it the most, we also hold a SOC 2 Report. This report can be provided on request under an NDA and gives an overview of Bloomreach’s technical and organizational security measures.

WHITEPAPER

Bloomreach Engagement Security Whitepaper

Read More

Protecting Our Clients' Data

  • Data Encryption
  • GDPR Compliant

Whenever we store data in the cloud, there are several layers of encryption. By default, data is encrypted both at rest and in transit. Additional security controls are implemented depending on the requirements of our customers.

Without any further implementations, our cloud providers encrypt and authenticate all data in transit at one or more network layers when data moves outside physical boundaries not controlled by or on behalf of the cloud provider. Google and Amazon use the Advanced Encryption Standard (AES) algorithm to encrypt data at rest. Transport Layer Security (TLS) is used to encrypt data in transit for transport security.

Bloomreach supports our customers in finding the best ways to be compliant with the GDPR. The engagement pillar works in such a way that the clients have complete control of consent management (they set a purpose for processing), data subject rights management (they can download all customer data, anonymize a customer, or delete a customer).

Bloomreach has access management that enables the users to select specific data types as PII and then set/revoke permission to see PII per user. For every event, it is possible to manage its retention and set expiration separately. In addition, data API enables the clients to integrate their systems to enable fast execution of data subjects requests.

Read Bloomreach Experience reviews on Gartner
Read reviewsSubmit review
Read reviews of Bloomreach Experience on G2
Read reviews of Bloomreach Experience on Trustradius
Read Bloomreach Experience reviews on ReacCDP
Products
  • Engagement
    Personalize marketing in real-time across email, sms, app, website, and more
  • Discovery
    Ecommerce search and merchandising focused on maximizing revenue
  • Content
    Build, manage, and personalize experiences with headless CMS for every commerce platform
  • Bloomreach Products Powered by aCustomer Data Engine
Company
  • Our Story
  • Contact Us
  • News
  • Leadership Team
  • Careers
  • Experience Strategy Group
Industries
  • Fashion
  • D2C
  • Food & Beverage
  • Travel
  • Restaurants
  • FinTech
  • Pets
  • Beauty
  • Grocery
  • Distributors (B2B)
  • Manufacturers (B2B)
Product resources
  • Bloomreach Partners
  • Documentation
  • Integrations
  • Bloomreach Academy
  • Assessment Tools
  • Security
  • Privacy at Bloomreach
Learn
  • All Resources
  • Blog
  • Whitepapers
  • Webinars
  • Videos
  • Analyst Reports
  • Podcasts
  • Events
Legal
  • Terms of Service
    |
  • Privacy Policy
    |
  • Contact DPO
    |
  • Control Your Data
    |
  • Cookie Settings
    |
  • Quality, Infosec, BCM policy
    |
  • UK Modern Slavery Act
© 2023 Bloomreach, Inc. All rights reserved.
E-MailLinkedInTwitterInstagramMetaYoutube