Superwin is SOC 2 compliant.

We take the safety of your and your buyer’s data seriously. We follow the prescribed protocols to ensure that your information is secure at all times. With Superwin, you can confidently engage with buyers to co-create winning sales proposals.

Aicpa

Superwin Application Security

  • secure hosting
    Secure hosting

    Superwin’s cloud environments are backed by GCP’s security measures.

  • Shield alt solid
    Network security

    Superwin uses enterprise-grade 256 bit SSL/HTTPS, the gold standard for internet communications.

  • encypt
    Encryption

    All data on Superwin is encrypted in transit using TLS. Data at rest is encrypted using AES 256-bit.

  • User lock solid
    User access

    Superwin access is gated by a unique user log-in for each of the authorized team members

  • Hashtag solid
    Unique hashed URLs

    Superwin generates a random URL for each proposal that no one can guess.

  • User secret solid
    Data safety

    Customer data is protected with controls that assess, minimize, and eliminate risks and vulnerabilities. We use tools to continuously monitor our compliance with SOC 2 requirements.

Found a potential issue? Please help us by reporting it so we can fix it quickly.

Report Vulnerabilities