Skip to main content
Skip table of contents

Risk Assessment

The Thru Security Operations team is here to assist you with your risk assessment.

Standardized Information Gathering (SIG) Assessment Tool

The SIG security assessment tool is a set of standard questions to discover risk posture against various risk domains. This will allow you the prospect or customer of Thru to gather our security policies and procedures to discover any discrepancies.

Please submit your SIG template to and allow 5 working days for it to be completed. For more information on SIG click here

Third-Party Pen Test

Thru welcomes our customers or prospects to conduct their pen tests on our SaaS environment. It does however require coordination and authorization to establish the scope and rules of engagement to ensure that proper legal and compliance requirements are met.

Please submit a request to and someone will respond with an authorization form to be completed.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.