MAIN MENU
Devolutions Blog

Announcements, updates, and insights from Devolutions.

Security
Devolutions sig lite questionnaire blog

Now available: Devolutions' SIG Lite questionnaire

Devolutions has published a prefilled SIG Lite questionnaire in its Conveyor Trust Center, offering a transparent view of its security posture to simplify vendor assessments and due diligence.

Photo of Vincent Lambert Vincent Lambert

At Devolutions, earning the trust of our customers and demonstrating total transparency are not just slogans — they are at the heart of what we do and who we are. As part of this fundamental commitment and defining vision, we’re delighted to announce that we have prefilled a full Standardized Information Gathering (SIG) Lite questionnaire.

Available in our Conveyor Trust Center, this document helps streamline the due diligence process — saving time if you already use a similar questionnaire. It also provides a comprehensive overview of our security posture and that of our products.

Keep reading to learn how it simplifies vendor assessments and strengthens transparency.

About SIG Lite

SIG Lite is a globally recognized, industry-standard questionnaire developed by the Shared Assessments Group. It is designed to help organizations quickly and reliably evaluate the security, privacy, and risk posture of third-party vendors, without undergoing a lengthy, complex assessment.

Key areas covered by the SIG Lite questionnaire

What this means to you

Whether you’re conducting vendor due diligence, comparing solutions for security alignment, preparing for an audit, or evaluating prospective strategic partners, our SIG Lite questionnaire gives you direct access to verified information about how we govern, manage, and secure access to data, as well as our preparation and resources for dealing with IT security issues and events.

Access our SIG Lite questionnaire

You can access our SIG Lite questionnaire in our Conveyor Trust Center. You can also review many other IT security and information management-related documents such as our ISO/IEC 27001 and 27701 certifications, SOC 3 report, SOC 2 Type II report, and more — all centralized and organized in one place.

More from Security

Read more articles