Your data is safe, portable, and 100% yours

DualEntry is IFRS/GAAP-compliant and operates within all regulatory and industry frameworks, validated by certifications and third-party reviews. You have full control of your data. Plus, built-in internal controls and security permissions let you determine what individual users can access.

Enter your email
Please enter a valid business email
Success! A DualEntry CPA will be in touch with you within 24 hours.
Please enter a valid business email
GDPR
Ready
SSL
COMPLIANT
CCPA
COMPLIANT
AES 256
At rest
SOC 2
AICPA CERTIFIED
GDPR
Ready
SSL
COMPLIANT
CCPA
COMPLIANT
AES 256
At rest
SOC 2
AICPA CERTIFIED
GDPR
Ready
SSL
COMPLIANT
CCPA
COMPLIANT
AES 256
At rest
SOC 2
AICPA CERTIFIED
GDPR
Ready
SSL
COMPLIANT
CCPA
COMPLIANT
AES 256
At rest
SOC 2
AICPA CERTIFIED

Security

Your data, always secure. Industry-leading encryption and compliance, so you can focus on your business with confidence

SOC 2 Type I

We ensure ongoing compliance with SOC 2’s rigorous reporting standards for safeguarding your data security and privacy.

SOC 2 Type II

We ensure ongoing compliance with SOC 2’s rigorous reporting standards for safeguarding your data security and privacy.

Coming Soon

TLS 1.2 encryption

We ensure compliance with TLS 1.2 encryption standards to safeguard your data during transmission, ensuring privacy and security across all connections.

AES at rest and in transit

AES encryption secures your data both at rest and in transit, ensuring robust protection against unauthorized access.

Cloud security

Secure by design, DualEntry’s robust privacy framework and tier-1 data centers protect your data through advanced physical, network, and encryption measures.

Network architecture

Our multi-layered network architecture has distinct security zones tailored to system sensitivity. This includes DMZs to manage traffic between the internet and internal networks, plus enhanced monitoring and access controls.

Vulnerability management

Our security team deploys continuous automated scans to proactively identify potential threats. Interoperable vulnerability-scanning tools streamline our processes, with defined remediation SLAs based on vulnerability severity.

Encryption protocols

Your data is protected through encryption in transit with HTTPS/TLS protocols and AES-256 encryption at rest. For enhanced safeguarding, we also employ a comprehensive Data Classification and Handling policy to categorize information based on sensitivity.

Change management

Our change management process allows for rigorous tracking, approval, and testing of all software modifications. Ensuring integrity, DualEntry’s robust logging and monitoring systems are built to detect any unauthorized alterations to production environments.

Penetration testing

DualEntry’s infrastructure is regularly put through penetration tests via partnerships with leading security firms. Plus, we offer a bug bounty program to enable ongoing vulnerability assessment.

Privacy

Your privacy, protected. Comprehensive compliance with global and regional regulations to ensure transparency and safeguard your data.

GDPR compliant

We comply with GDPR to ensure your data is processed with transparency and protection across the EU and UK.

CPRA compliant

Our practices align with CPRA, enhancing privacy rights and data protection for California residents.

CCPA compliant

We adhere to CCPA standards, meaning it is our priority to safeguard our customers’ privacy, providing transparency in the way we handle your data.

CTDPA compliant

We comply with CTDPA to ensure your data is processed with transparency and protection.

CPA compliant

We comply with CPA to ensure your data is processed with transparency and protection.

MTCDPA compliant

We comply with MTCDPA to ensure your data is processed with transparency and protection.

OCPA compliant

We comply with OCPA to ensure your data is processed with transparency and protection.

TDPSA compliant

We comply with TDPSA to ensure your data is processed with transparency and protection.

UCPA compliant

We comply with UCPA to ensure your data is processed with transparency and protection.

VCDPA compliant

We comply with VCDPA to ensure your data is processed with transparency and protection.

Data availability and continuity

DualEntry has high service availability through network redundancy, rigorous backups, and disaster-recovery protocols. Our global security and response teams provide 24/7 coverage. We follow established incident response frameworks like NIST and PICERL, and we regularly test our response plans to ensure efficient threat prevention.

Authentication solutions

Flexible authentication options ensure secure access through customizable options, robust password policies, and two-factor authentication.

Two-factor authentication

To prevent unauthorized access, we implement two-factor authentication (2FA) for agents and administrators. Activate via SMS or an authenticator app.

Multiple authentication options

Choose from multiple authentication methods, including native authentication, SSO, and SAML. Maintain high security standards across your business, without compromising convenience.

AI security

DualEntry’s classification models categorize inputs without generating new content, ensuring your data is never reproduced or compromised.

Secure data handling

All data processed by DualEntry, including DualEntry AI, is protected with stringent security standards, including SOC 2 compliance, meaning it is solely accessible to your enterprise. Our zero data retention policy guarantees data deletion post-output.

Coming Soon

Model integrity

DualEntry’s AI models, powered by OpenAI and Anthropic, are pre-trained and never use your data for further training or service improvements. Your sensitive financial information remains exclusively within your control.

AI data privacy

DualEntry AI has been built with privacy at the forefront, enabling compliance with regulations like GDPR and CCPA. All AI features align with stringent privacy laws.