Your data is safe, portable, and 100% yours
DualEntry is IFRS/GAAP-compliant and operates within all regulatory and industry frameworks, validated by certifications and third-party reviews. You have full control of your data. Plus, built-in internal controls and security permissions let you determine what individual users can access.
Security
Your data, always secure. Industry-leading encryption and compliance, so you can focus on your business with confidence
SOC 2 Type I
We ensure ongoing compliance with SOC 2’s rigorous reporting standards for safeguarding your data security and privacy.
SOC 2 Type II
We ensure ongoing compliance with SOC 2’s rigorous reporting standards for safeguarding your data security and privacy.
TLS 1.2 encryption
We ensure compliance with TLS 1.2 encryption standards to safeguard your data during transmission, ensuring privacy and security across all connections.
AES at rest and in transit
AES encryption secures your data both at rest and in transit, ensuring robust protection against unauthorized access.
Cloud security
Secure by design, DualEntry’s robust privacy framework and tier-1 data centers protect your data through advanced physical, network, and encryption measures.
Network architecture
Our multi-layered network architecture has distinct security zones tailored to system sensitivity. This includes DMZs to manage traffic between the internet and internal networks, plus enhanced monitoring and access controls.
Vulnerability management
Our security team deploys continuous automated scans to proactively identify potential threats. Interoperable vulnerability-scanning tools streamline our processes, with defined remediation SLAs based on vulnerability severity.
Encryption protocols
Your data is protected through encryption in transit with HTTPS/TLS protocols and AES-256 encryption at rest. For enhanced safeguarding, we also employ a comprehensive Data Classification and Handling policy to categorize information based on sensitivity.
Change management
Our change management process allows for rigorous tracking, approval, and testing of all software modifications. Ensuring integrity, DualEntry’s robust logging and monitoring systems are built to detect any unauthorized alterations to production environments.
Penetration testing
DualEntry’s infrastructure is regularly put through penetration tests via partnerships with leading security firms. Plus, we offer a bug bounty program to enable ongoing vulnerability assessment.
Privacy
Your privacy, protected. Comprehensive compliance with global and regional regulations to ensure transparency and safeguard your data.
GDPR compliant
We comply with GDPR to ensure your data is processed with transparency and protection across the EU and UK.
CPRA compliant
Our practices align with CPRA, enhancing privacy rights and data protection for California residents.
CCPA compliant
We adhere to CCPA standards, meaning it is our priority to safeguard our customers’ privacy, providing transparency in the way we handle your data.
CTDPA compliant
We comply with CTDPA to ensure your data is processed with transparency and protection.
CPA compliant
We comply with CPA to ensure your data is processed with transparency and protection.
MTCDPA compliant
We comply with MTCDPA to ensure your data is processed with transparency and protection.
OCPA compliant
We comply with OCPA to ensure your data is processed with transparency and protection.
TDPSA compliant
We comply with TDPSA to ensure your data is processed with transparency and protection.
UCPA compliant
We comply with UCPA to ensure your data is processed with transparency and protection.
VCDPA compliant
We comply with VCDPA to ensure your data is processed with transparency and protection.
Data availability and continuity
DualEntry has high service availability through network redundancy, rigorous backups, and disaster-recovery protocols. Our global security and response teams provide 24/7 coverage. We follow established incident response frameworks like NIST and PICERL, and we regularly test our response plans to ensure efficient threat prevention.
Authentication solutions
Flexible authentication options ensure secure access through customizable options, robust password policies, and two-factor authentication.
Two-factor authentication
To prevent unauthorized access, we implement two-factor authentication (2FA) for agents and administrators. Activate via SMS or an authenticator app.
Multiple authentication options
Choose from multiple authentication methods, including native authentication, SSO, and SAML. Maintain high security standards across your business, without compromising convenience.
AI security
DualEntry’s classification models categorize inputs without generating new content, ensuring your data is never reproduced or compromised.
Secure data handling
All data processed by DualEntry, including DualEntry AI, is protected with stringent security standards, including SOC 2 compliance, meaning it is solely accessible to your enterprise. Our zero data retention policy guarantees data deletion post-output.
Model integrity
DualEntry’s AI models, powered by OpenAI and Anthropic, are pre-trained and never use your data for further training or service improvements. Your sensitive financial information remains exclusively within your control.
AI data privacy
DualEntry AI has been built with privacy at the forefront, enabling compliance with regulations like GDPR and CCPA. All AI features align with stringent privacy laws.