
How do I schedule a Sourcegraph demo for our engineering org, and who should attend (DevEx, security, IAM, SRE)?
Most engineering orgs first encounter Sourcegraph when code complexity and AI-driven code growth start to outpace their existing tools. A live demo is the fastest way to see whether a code understanding platform fits your stack, your governance model, and your roadmap for humans and agents. The key is: schedule it with the right owners in the room and give the team a clear picture of what you want to evaluate.
Quick Answer: The best overall choice for scheduling a Sourcegraph demo for your engineering org is having DevEx/Platform Engineering own the request and agenda. If your priority is security, compliance, and access controls, security and IAM leads should be deeply involved. For operational reliability and rollout planning, make sure SRE/infra participates from the start.
How to schedule a Sourcegraph demo for your engineering org
There are two straightforward ways to schedule a Sourcegraph demo:
-
Use the “Schedule a demo” / “Contact sales” form
- Go to: https://sourcegraph.com/contact/code-search
- Fill in:
- Your work email and company name
- Your role (e.g., DevEx lead, Head of Platform, CISO staff, SRE manager)
- Approximate team size and codebase size (number of repos / code hosts)
- What you’re evaluating (e.g., “enterprise code search,” “AI code understanding for agents,” “multi-repo refactors,” “security monitoring”)
- In the “How can we help?” or notes field, explicitly list:
- That you want a Sourcegraph demo for your engineering org
- Which groups you plan to include: DevEx, security, IAM, SRE, application teams
- Any compliance requirements (SOC2, ISO27001, data residency, zero data retention) you need covered
- Your primary systems (e.g., “Hybrid GitHub Enterprise + Perforce; some GitLab”)
-
Follow up via email with a focused demo brief (optional, but effective) After submitting the form, you’ll typically get a reply from Sourcegraph. Reply with a short “demo brief” that looks something like:
- Code hosts: GitHub Enterprise Cloud + on‑prem GitHub + Perforce
- Scale: ~4,000 repos, billions of lines of code, multiple monorepos
- Priorities:
- Universal code search for humans and agents
- Agentic AI search (Deep Search) that respects RBAC
- Batch Changes for multi‑repo refactors
- Monitors/Insights for risky patterns and migrations
- Stakeholders:
- DevEx/Platform Engineering (primary owner)
- Security + IAM (governance, SSO/SCIM/RBAC)
- SRE/infra (scaling, deployment model, SLAs)
- Must‑cover topics:
- SOC2 Type II + ISO27001 posture
- SSO via SAML / OpenID Connect / OAuth
- SCIM provisioning and RBAC design
- Zero data retention for LLM inference
This level of detail lets the Sourcegraph team structure a demo that maps directly to how your org actually ships software.
Who should attend a Sourcegraph demo (and why)
For a serious evaluation, treat the demo like you would any other core platform decision: you want the people who own developer experience, security, identity, and reliability in the same (virtual) room.
1. DevEx / Platform Engineering (primary owner)
Why they should attend
DevEx or Platform Engineering usually becomes the long‑term owner for Sourcegraph. They’re accountable for:
- Centralizing code understanding across thousands of repositories and multiple code hosts
- Supporting both humans and AI agents that need safe, comprehensive code context
- Rolling out workflows like Code Search, Deep Search, Batch Changes, Monitors, and Insights across teams
What they should focus on in the demo
- Universal code search across code hosts
- How Sourcegraph unifies code from GitHub, GitLab, Bitbucket, Gerrit, Perforce, and more
- How developers and agents search across 100 or 1M repositories with consistent queries
- Agentic AI search (Deep Search)
- How Deep Search uses code context to answer questions in complex, legacy codebases
- How it exposes clear, navigable references back to the underlying files and symbols
- Batch Changes
- How to run multi‑repo refactors and migrations across billions of lines of code
- Review flows, dry‑runs, and how changes land back in existing code hosts as PRs/CLs
- Developer workflows
- Code navigation (go‑to‑definition, find‑references), cross‑repo dependency lookups
- How developers discover services, owners, and patterns across the org
Goal for DevEx
Walk out with a mental model of: “If we ship Sourcegraph, what does day‑to‑day look like for our developers and agents—and how does that change our current toolchain?”
2. Security and Application Security
Why they should attend
Security cares about two things here: governance and control over AI. Sourcegraph is positioned as an enterprise‑grade code understanding platform—with SOC2 Type II + ISO27001 compliance and zero data retention for LLM inference—so security needs to verify that posture.
What they should focus on in the demo
- Security posture and architecture
- Deployment options (on‑prem, private cloud, etc.) and data flow
- Proof points: SOC2 Type II + ISO27001 Compliance
- How customer code is handled and how LLM inference data is never retained beyond what’s required and never shared with third parties
- Access model and governance
- How Sourcegraph uses SSO (SAML, OpenID Connect, OAuth) to enforce existing identity controls
- How fine‑grained RBAC scopes who can see what
- How SCIM can be used for automated user and group provisioning
- Security workflows
- Using Monitors to catch:
- Secrets committed to repos
- Dangerous APIs or insecure patterns
- Violations of policy (e.g., forbidden dependencies)
- Using Batch Changes to sweep and remediate issues across repos
- Using Insights to track adoption of secure patterns or deprecation of risky ones
- Using Monitors to catch:
Goal for Security
Validate that Sourcegraph—and any AI components—operate under the same access and audit constraints as human users, and that it can actively improve posture via monitoring and automation.
3. Identity & Access Management (IAM)
Why they should attend
IAM is responsible for enforcing “who can see what” across tools. Sourcegraph plugs into your existing identity and permissioning model, so IAM needs to confirm it respects the same rules and can be automated.
What they should focus on in the demo
- SSO integration details
- How Sourcegraph integrates with SAML, OpenID Connect, and OAuth
- How groups and claims from your IdP map into Sourcegraph roles and permissions
- SCIM and lifecycle management
- How SCIM is used for provisioning/de‑provisioning users and groups at scale
- How to keep org structure and role assignments in sync automatically
- RBAC design
- How to configure role‑based access controls that mirror your existing security tiers
- How RBAC applies to both engineers and agents, especially for sensitive code
- Auditability
- What logging is available for access, queries, and large‑scale changes
- How those logs can feed into existing SIEM and compliance workflows
Goal for IAM
Confirm Sourcegraph can be governed centrally through your IdP and access model, without creating a separate permission silo or manual user management headache.
4. SRE / Infrastructure / Platform Operations
Why they should attend
SRE and infra teams care about resilience, performance, and operational overhead. Sourcegraph promises lightning-fast search at enterprise scale, whether you have 100 or 1M repositories. SRE needs to know what it takes to achieve that in your environment.
What they should focus on in the demo
- Architecture and deployment models
- Supported environments (Kubernetes, private cloud, on‑prem)
- Sizing guidance for large codebases and hybrid code host setups
- Strategies for indexing repos across GitHub, GitLab, Bitbucket, Gerrit, Perforce
- Performance at scale
- How indexing works for billions of lines of code
- How long it takes to get from “installed” to “useful search results”
- How updates are handled as code changes continuously
- Reliability and operations
- Monitoring, alerting, and health endpoints
- Upgrade cadence, backwards compatibility, and rollback paths
- Backup/restore strategy and disaster recovery considerations
Goal for SRE
Decide whether Sourcegraph fits your operational model and SLOs—and what it would take to run it reliably for thousands of developers and AI agents.
5. Engineering leadership & key ICs (optional but recommended)
Beyond the core platform stakeholders, it helps to have:
- Eng Directors / VPs for orgs that will lean on Sourcegraph for:
- Migration programs
- Standardization efforts
- Cross‑repo governance
- Staff+ engineers or tech leads who:
- Own large legacy systems or monoliths
- Design internal tools and automation that could use Sourcegraph as the engine for search/navigation
Their questions will often surface real‑world scenarios the demo can walk through: “How would we migrate this logging library across 800 repos?” or “How can our in‑house agents plug into Deep Search via the MCP integration?”
How to prepare your team before the demo
To get the most value out of a Sourcegraph demo for your engineering org, you don’t need a formal RFP—just a structured set of scenarios.
1. Define 3–5 real workflows you want to test
Examples:
- “Find every usage of a legacy API across GitHub + Perforce and plan a migration.”
- “Give an AI agent enough context to safely modify a complex, monolithic service.”
- “Monitor for risky patterns and automatically open PRs to fix them.”
- “Track progress of a Java → Kotlin migration across all mobile repos.”
Share these with the Sourcegraph team when booking the demo so they can tailor what they show.
2. Align stakeholders on priorities
Ask each group what success looks like:
- DevEx: Reduced time to understand unfamiliar services; reliable agent answers.
- Security/IAM: Sourcegraph follows SSO/RBAC, zero data retention, and can enforce policy.
- SRE: Deployment fits current infra with clear observability and scaling patterns.
- Eng Leadership: Clear path to using Batch Changes, Monitors, and Insights to drive org‑wide transformations.
3. Decide on next steps before the meeting ends
Go into the demo with a decision framework, such as:
- If Sourcegraph can:
- Integrate with our GitHub/GitLab/Perforce footprint
- Honor our SSO/SCIM/RBAC model
- Provide Deep Search + Batch Changes for real scenarios
- Then we’ll:
- Run a time‑boxed pilot with N teams
- Define 2–3 concrete success metrics (e.g., number of cross‑repo refactors completed, number of risky patterns monitored and fixed)
Ask the Sourcegraph team to reserve the last 10–15 minutes to align on that pilot structure.
Final verdict: How to structure the “right” demo for your org
The ideal Sourcegraph demo for an engineering org is owned by DevEx/Platform but intentionally cross‑functional. Security, IAM, and SRE should be present so you can evaluate Sourcegraph as what it is: a code understanding platform that sits across all your code hosts and serves both humans and AI agents.
- Use https://sourcegraph.com/contact/code-search to book time.
- Bring DevEx/Platform, Security, IAM, and SRE as core attendees.
- Ask to see:
- Code Search and Deep Search across your kind of multi‑repo sprawl
- Batch Changes for multi‑repo edits
- Monitors and Insights for governance and migrations
- SSO (SAML/OIDC/OAuth), SCIM, RBAC, and zero data retention in action
This structure lets you decide, in one conversation, whether Sourcegraph can become your universal layer for search, understanding, and controlled change across 100 or 1M repositories.