Get full access to this Security Portal
  • Review all security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Overview

Sigma sits atop your existing cloud database and uses a secure connection to query your data warehouse directly. Sigma writes a query to access the data needed to answer your question and returns the result in the browser.

Sigma provides a single point of access for your data, so you can establish robust data governance, keep report sprawl to a minimum, and restrict access to sensitive information. Administrators can set permissions by team and namespace, and restrict data access directly from the database as well.

We built Sigma with security in mind, which is why we included features like immutable hosts, container checking, and threat detection. At Sigma, we make every effort to provide secure data analytics and ensure our platform is protected at every layer of the stack.

Compliance

CCPA Logo
CCPA
GDPR Logo
GDPR
HIPAA Logo
HIPAA
Privacy Shield Logo
Privacy Shield
SOC 1 Logo
SOC 1
SOC 2 Logo
SOC 2
SOC 3 Logo
SOC 3
TruSight Logo
TruSight
Get full access to this Security Portal
  • Review all security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Documents

16 Documents
HIPAA Report
Network Diagram
Pentest Report
SOC 1 Report
SOC 2 Report
SOC 3 Report
CAIQ
VSA Core
Cyber Insurance
Business Continuity Policy
General Incident Response Policy
Information Security Policy
Risk Management Policy
Software Development Lifecycle

Risk Profile

Data Access LevelInternal
Impact LevelLow
Recovery Time Objective< 24 Hours
See more

Product Security

Role-Based Access Control
Audit Logging
Data Security
See more

Reports

HIPAA Report
Network Diagram
Pentest Report
See more

Completed Forms

CAIQ
VSA Core

Data Security

Access Monitoring
Backups Enabled
Data Erasure
See more

App Security

Bug Bounty
Code Analysis
Software Development Lifecycle
See more

Access Control

Data Access
Logging
Password Security

Infrastructure

Anti-DDoS
Amazon Web Services
Google Cloud Platform
See more

Endpoint Security

DNS Filtering
Endpoint Detection & Response
Mobile Device Management
See more

Network Security

DNSSEC
Firewall
IDS/IPS
See more

Corporate Security

Email Protection
Employee Training
Incident Response
See more

Policies

Business Continuity Policy
General Incident Response Policy
Information Security Policy
See more