Overview
Sigma sits atop your existing cloud database and uses a secure connection to query your data warehouse directly. Sigma writes a query to access the data needed to answer your question and returns the result in the browser.
Sigma provides a single point of access for your data, so you can establish robust data governance, keep report sprawl to a minimum, and restrict access to sensitive information. Administrators can set permissions by team and namespace, and restrict data access directly from the database as well.
We built Sigma with security in mind, which is why we included features like immutable hosts, container checking, and threat detection. At Sigma, we make every effort to provide secure data analytics and ensure our platform is protected at every layer of the stack.
Compliance




Documents
Risk Profile
Product Security
Reports
Self-Assessments
Data Security
App Security
Legal
Access Control
Infrastructure
Endpoint Security
Network Security
Corporate Security
Policies
Trust Center Updates
Sigma Computing not impacted by MOVEit Vulnerability
We have recently been made aware of a significant MOVEit vulnerability that has garnered attention in the security community. Reports from reputable threat intelligence sources indicate that customers of this solution may be affected. You can find more information about this incident here: link to Security Week article.
We want to assure our valued customers that Sigma Computing is not susceptible to this vulnerability. Our product does not rely on or incorporate this technology/software, which means that the confidentiality, integrity, and availability of our systems remain uncompromised. Moreover, we have taken additional measures to ensure and validate that none of Sigma's critical sub-processors are affected by this vulnerability.