Trust Center

Start your security review
View & download sensitive information
Ask for information
Search items

Overview

Sigma sits atop your existing cloud database and uses a secure connection to query your data warehouse directly. Sigma writes a query to access the data needed to answer your question and returns the result in the browser.

Sigma provides a single point of access for your data, so you can establish robust data governance, keep report sprawl to a minimum, and restrict access to sensitive information. Administrators can set permissions by team and namespace, and restrict data access directly from the database as well.

We built Sigma with security in mind, which is why we included features like immutable hosts, container checking, and threat detection. At Sigma, we make every effort to provide secure data analytics and ensure our platform is protected at every layer of the stack.

Compliance

CCPA Logo
CCPA
GDPR Logo
GDPR
HIPAA Logo
HIPAA
ISO 27001 Logo
ISO 27001
Privacy Shield Logo
Privacy Shield
SOC 1 Logo
SOC 1
SOC 2 Logo
SOC 2
SOC 3 Logo
SOC 3
Start your security review
View & download sensitive information
Ask for information

Sigma Computing is reviewed and trusted by

DoorDash-company-logoDoorDash
Blackstone-company-logoBlackstone
US Foods-company-logoUS Foods
ExxonMobil-company-logoExxonMobil
First Republic Bank-company-logoFirst Republic Bank
Colgate-Palmolive-company-logoColgate-Palmolive
Equinix-company-logoEquinix
AMD-company-logoAMD
Clover-company-logoClover
Intercontinental Exchange-company-logoIntercontinental Exchange
Autodesk-company-logoAutodesk
Moffitt Cancer Center-company-logoMoffitt Cancer Center
Other Reports
HIPAA Report
Network Diagram
Pentest Report
SOC 1 Report
SOC 2 Report
SOC 3 Report
HIPAA
ISO 27001
SOC 1
SOC 2
SOC 3
CAIQ - Pre-filled Questionnaire
SIG Core - Pre-filled Questionnaire
SIG Lite - Pre-filled Questionnaire
VSA Core
Cyber Insurance
Data Processing Agreement
Service-Level Agreement
Business Continuity Policy
General Incident Response Policy
Information Security Policy
Risk Management Policy
Software Development Lifecycle

Risk Profile

Data Access LevelInternal
Impact LevelLow
Recovery Time Objective12 hours
View more

Product Security

Audit Logging
Data Security
Integrations
View more

Reports

HIPAA Report
Network Diagram
Other Reports
View more

Self-Assessments

CAIQ - Pre-filled Questionnaire
SIG Core - Pre-filled Questionnaire
SIG Lite - Pre-filled Questionnaire
View more

Data Security

Access Monitoring
Backups Enabled
Data Erasure
View more

App Security

Responsible Disclosure
Code Analysis
Credential Management
View more

Access Control

Data Access
Logging
Password Security

Infrastructure

Amazon Web Services
Anti-DDoS
Azure
View more

Endpoint Security

DNS Filtering
Endpoint Detection & Response
Mobile Device Management
View more

Network Security

DNSSEC
Firewall
IDS/IPS
View more

Corporate Security

Email Protection
Employee Training
Incident Response
View more

Policies

Business Continuity Policy
General Incident Response Policy
Information Security Policy
View more

Trust Center Updates

Sigma Computing Not Impacted by MOVEit Vulnerability

VulnerabilitiesCopy link

Sigma Computing not impacted by MOVEit Vulnerability

We have recently been made aware of a significant MOVEit vulnerability that has garnered attention in the security community. Reports from reputable threat intelligence sources indicate that customers of this solution may be affected. You can find more information about this incident here: link to Security Week article.

We want to assure our valued customers that Sigma Computing is not susceptible to this vulnerability. Our product does not rely on or incorporate this technology/software, which means that the confidentiality, integrity, and availability of our systems remain uncompromised. Moreover, we have taken additional measures to ensure and validate that none of Sigma's critical sub-processors are affected by this vulnerability.

Published at N/A

List of Sigma Sub-processors

SubprocessorsCopy link

For a list of our subprocessors please click here.

Published at N/A*
Powered bySafeBase Logo