Trust Center

Get access to this Trust Center
  • Review sensitive security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Overview

Sigma sits atop your existing cloud database and uses a secure connection to query your data warehouse directly. Sigma writes a query to access the data needed to answer your question and returns the result in the browser.

Sigma provides a single point of access for your data, so you can establish robust data governance, keep report sprawl to a minimum, and restrict access to sensitive information. Administrators can set permissions by team and namespace, and restrict data access directly from the database as well.

We built Sigma with security in mind, which is why we included features like immutable hosts, container checking, and threat detection. At Sigma, we make every effort to provide secure data analytics and ensure our platform is protected at every layer of the stack.

Compliance

CCPA Logo
CCPA
GDPR Logo
GDPR
HIPAA Logo
HIPAA
ISO 27001 Logo
ISO 27001
Privacy Shield Logo
Privacy Shield
SOC 1 Logo
SOC 1
SOC 2 Logo
SOC 2
SOC 3 Logo
SOC 3
Get access to this Trust Center
  • Review sensitive security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Sigma Computing is reviewed and trusted by

DoorDashDoorDash
BlackstoneBlackstone
US FoodsUS Foods
ExxonMobilExxonMobil
First Republic BankFirst Republic Bank
Colgate-PalmoliveColgate-Palmolive
EquinixEquinix
AMDAMD
CloverClover
Intercontinental ExchangeIntercontinental Exchange
LaceworkLacework
AutodeskAutodesk
Moffitt Cancer CenterMoffitt Cancer Center
Other Reports
HIPAA Report
Network Diagram
Pentest Report
SOC 1 Report
SOC 2 Report
SOC 3 Report
HIPAA
ISO 27001
SOC 3
CAIQ
SIG Core
SIG Lite
VSA Core
Cyber Insurance
Data Processing Agreement
Service-Level Agreement
Business Continuity Policy
General Incident Response Policy
Information Security Policy
Risk Management Policy
Software Development Lifecycle

Risk Profile

Data Access LevelInternal
Impact LevelLow
Recovery Time Objective12 hours
See more

Product Security

Audit Logging
Data Security
Integrations
See more

Reports

HIPAA Report
Network Diagram
Other Reports
See more

Self-Assessments

CAIQ
SIG Core
SIG Lite
See more

Data Security

Access Monitoring
Backups Enabled
Data Erasure
See more

App Security

Responsible Disclosure
Code Analysis
Credential Management
See more

Access Control

Data Access
Logging
Password Security

Infrastructure

Amazon Web Services
Anti-DDoS
Google Cloud Platform
See more

Endpoint Security

DNS Filtering
Endpoint Detection & Response
Mobile Device Management
See more

Network Security

DNSSEC
Firewall
IDS/IPS
See more

Corporate Security

Email Protection
Employee Training
Incident Response
See more

Policies

Business Continuity Policy
General Incident Response Policy
Information Security Policy
See more

Trust Center Updates

Powered BySafeBase Logo