Sigma Logo

Overview
Overview

Sigma sits atop your existing cloud database and uses a secure connection to query your data warehouse directly. Sigma writes a query to access the data needed to answer your question and returns the result in the browser.

Sigma provides a single point of access for your data, so you can establish robust data governance, keep report sprawl to a minimum, and restrict access to sensitive information. Administrators can set permissions by team and namespace, and restrict data access directly from the database as well.

We built Sigma with security in mind, which is why we included features like immutable hosts, container checking, and threat detection. At Sigma, we make every effort to provide secure data analytics and ensure our platform is protected at every layer of the stack.

Risk Profile
Risk Profile

Data Access LevelInternal
Impact LevelLow
Recovery Time Objective< 24 Hours
View 3 More Items

Product Security
Product Security

Role-Based Access Control
Audit Logging
Data Security
View 4 More Items

Certifications & Compliance
Certifications & Compliance

CCPA Logo
CCPA
GDPR Logo
GDPR
HIPAA Logo
HIPAA
Privacy Shield Logo
Privacy Shield
SOC 1 Logo
SOC 1
SOC 2 Logo
SOC 2
SOC 3 Logo
SOC 3
TruSight Logo
TruSight

Reports
Reports

HIPAA Report
Network Diagram
Pentest Report
View 5 More Items

Completed Forms
Completed Forms

CAIQ Full
VSA Core

Data Security
Data Security

Access Monitoring
Backups Enabled
Data Erasure
View 3 More Items

App Security
App Security

Bug Bounty
Code Analysis
Software Development Lifecycle
View 3 More Items

Access Control
Access Control

Data Access
Logging
Password Security

Infrastructure
Infrastructure

Anti-DDoS
Amazon Web Services
Google Cloud Platform
View 2 More Items

Endpoint Security
Endpoint Security

DNS Filtering
Endpoint Detection & Response
Mobile Device Management
View 1 More Item

Network Security
Network Security

DNSSEC
Firewall
IDS/IPS
View 2 More Items

Corporate Security
Corporate Security

Employee Training
Incident Response
Internal Assessments
View 3 More Items

Policies
Policies

Business Continuity Policy
Information Security Policy
Risk Management Policy
View 1 More Item