SmartWinnr - Logo
SmartWinnr - Logo
SmartWinnr - Logo

Whitepapers

SmartWinnr Information Security White Paper

Security

Nov 19, 2025

Introduction

Cloud computing has revolutionized the way enterprise business applications are made available to businesses of all sizes – from the largest enterprises to small and mid-sized businesses. Software-as-a-Service (SaaS) – services delivering applications and associated data over the internet – has become a business model as well as an application delivery model. However, with the proliferation of SaaS offerings, there are legitimate concerns about security.

At SmartWinnr, we understand the critical importance of information protection and recognize the contribution that information security makes to an organization’s strategic initiatives and overall risk management. SmartWinnr has implemented security controls and practices that are designed to protect the confidentiality, integrity, and availability of customer information. Additionally, SmartWinnr continually works to strengthen and improve those security controls and practices.

SmartWinnr’s high-level security reference architecture has been shown below. The rest of this document will provide details about this architecture.

SmartWinnr Information Security White Paper

Data Security

Data Storage Security

  • Logical Data Segregation:
    Along with the formation and execution of each application request, SmartWinnr confirms that the user context (a tenant ID) accompanies each request and includes it in the WHERE clause of all query statements to ensure the request targets the correct organization’s data. This is inserted by the application dynamically at runtime and cannot be overridden externally.

  • Encrypted Data Storage:
    All data at rest is encrypted by 256-bit key using the industry-standard AES-256 algorithm. This is set by default and cannot be overridden by customers. All backups are also stored in encrypted format.

  • Secure Levels:
    Since the application and web tier are totally stateless, session information need not be kept in memory or disc, thus increasing overall security. This also makes easy to deliver a load- balanced application without sticky sessions.

  • Backup and Restore:
    Backup and restore capabilities improve security. SmartWinnr takes regular backups of the database at hourly, daily and monthly schedules. The data is available for rapid deployment and system restoration if the original data is corrupted due to any unforeseen event.

Data Transmission Security

  • Secure Communication:
    SmartWinnr implements SSL technology, which consists of a public key and a private key to protect sensitive information. The public key is used to encrypt information, and the private key is used to decipher it. When a Web browser points to a secured domain, an SSL handshake authenticates the server (website) and the client (Web browser). An encryption method is established with a unique session key. Customers may then begin a secure session that guarantees message privacy and message integrity.

  • Secure messaging:
    All outgoing email notifications sent from SmartWinnr are securely encrypted using TLS, which makes it difficult to tamper with the email message contents and to send spoofed emails.

  • Encryption Keys:
    Encryption keys are securely stored and periodically rotated.

Application Security

SmartWinnr application security architecture ensures good security practices are embedded during the design, implementation and testing of the application. The core security framework proactively prevents security loopholes during the coding phase itself.

SmartWinnr dynamically generates every page and transmits to the client using SSL. SmartWinnr’s configurable codebase ensures that all the clients run the same version of the code but can get the benefit of different configurations based on their specific business need.

SmartWinnr has implemented extensive security measures during the application development lifecycle to prevent loss, misuse and unauthorized access to data. The application-level security measures include the following:

  • Multi-layered Architecture:
    By segregating the presentation, business and data layers in the application, SmartWinnr can ensure better control on the overall security of the solution.

  • Coding Quality Best Practices:
    At SmartWinnr we leverage industry standard programming techniques such as having a documented development and quality assurance processes and following guidelines such as the OWASP ESAPI library, to ensure that the applications meet security standards. In addition to that, all our code is peer reviewed prior to being released to QA, which minimizes the number of bugs that must be sent back to the developer for fixing.

  • Role-Based Permissions:
    Provide best practice security at all levels— function, transaction, field, and data—by using role-based permissions (RBP).

  • Unauthorized Access Prevention:
    All application endpoints require a logged-in user to send data request thus preventing improper access. Users can only request for data pertaining to their own organization, as the organization context is injected dynamically by the system at runtime based on the authenticated user’s organization.

  • No Risky Plug-ins:
    The service avoids any Java applets or Flash plugins which can potentially increase security risk

Identity Management

SmartWinnr provides the following features to provide seamless access to the service while ensuring enterprise access and authorization policies are complied with:

  • Internal Authentication:
    SmartWinnr uses internal repository of user profiles with authentication information when customers do not want to integrate their own identify management product with SmartWinnr.

  • Federated Authentication:
    In Federated Authentication, SmartWinnr sends the authentication request to the client’s authorizing system using Security Assertion Markup Language (SAML) protocol. On successful authentication, the trust mechanism passes the user’s identification information to SmartWinnr which is used for granting access and subsequent requests.

  • Separating Authentication and Authorization Modules:
    Authentication mechanisms keep on maturing to mitigate new threats. Since authorization logic is embedded in the core code, SmartWinnr separates authentication and authorization functionalities in its implementation. Thus, the system is future-proof and can easily accommodate new authentication services and protocols.

  • Password Protection:
    SmartWinnr requires users to set strong passwords that conform to specific requirements. The passwords within the system are stored in salted cryptographic hash formats.

Get the Whitepaper

Share Article

Share Article

Share Article

Request A Demo

Accelerate Your Sales Growth.

Start unlocking smarter training and performance today

Request A Demo

Accelerate Your Sales Growth.

Start unlocking smarter training and performance today

Request A Demo

Accelerate Your Sales Growth.

Start unlocking smarter training and performance today