Skip to content
Duall Master

Security & Deployment

Security you can point at, not security in adjective form.

Every control below is implemented in the platform today — with a specific mechanism, not a category label. Choose cloud, on-premise, or hybrid; the security model travels with you.

Last reviewed by the platform team on

Governed operations
Duall Master access control screen demonstrating governed operator workflows

Trust topology

Every module inherits the same governance layer.

Tap any layer to see how it helps a buyer evaluate the platform.

Step 01

Signal

Doors, visitors, cameras, intercoms, parking, and devices generate live operational signals instead of isolated alerts.

01Signal

Doors, visitors, cameras, intercoms, parking, and devices generate live operational signals instead of isolated alerts.

02Context

Each signal becomes useful because operator, person, role, site, zone, policy, and related module records are shown together.

03Action

Teams approve, deny, review, escalate, annotate, or link evidence without leaving the command surface.

04Audit

Every decision keeps the who, what, when, why, and related evidence needed for handoff, reporting, and investigation.

Hosting choice does not change the trust model — the same controls apply in cloud, on-prem, and hybrid deployments.

The controls

Six layers of control — each one with a specific mechanism.

Everything below is live and verifiable in the running platform. For a security or compliance review, the deployment team can walk you through the underlying controls and the audit trail in detail.

Access & sign-in

How people sign in and prove who they are

Stolen sessions are detected and shut down

Sign-in sessions are short-lived and renew automatically. If a session is stolen and reused, the platform detects it and ends the whole session — not just one request.

Two-factor authentication

One-time authenticator codes with backup codes, rolling out organization by organization.

Extra confirmation for sensitive actions

High-impact actions — revoking a credential, disabling a user — ask for a PIN re-confirmation. Being logged in is not enough on its own.

Keeps working offline

Access terminals keep making the right decisions during a network outage and re-sync cleanly when the connection returns.

One consistent password policy

The same password rules apply everywhere an account is created or reset — no weaker side doors.

Data isolation

How each organization's data stays separate

Strict separation between organizations

Each organization's people, devices, and records are fully isolated. One organization can never see or reach another's data.

Organization-scoped sign-in

Login is tied to your organization, so a password leaked elsewhere can't be pointed at your account.

Role-based permissions

Everyone sees and does only what their role allows, checked on every action. Optional modules stay switched off until you enable them.

The AI assistant acts as you, never above you

The assistant works on behalf of the signed-in operator, with exactly their permissions — it never holds its own elevated access.

Audit trail

What gets recorded, and for how long

A complete, tamper-proof record

Every login, change, and access event is recorded. The log can only be added to and read — never edited or deleted — so history can't be quietly altered.

Two years of searchable history

Records are kept for two years and stay searchable, so investigations and compliance reviews have the full timeline.

Always-on recording

Audit logging runs independently of day-to-day operations, so even a busy moment never leaves an event unrecorded.

Data residency & AI

Where your data lives — including with AI

You choose where data lives

Run in the cloud, fully on-premise, or hybrid. The same security model applies in all three.

AI can stay inside your perimeter

For sites with data-residency requirements, the AI assistant runs on a model inside your own deployment — no data leaves your network. The platform will not start cloud AI where residency is required.

No silent failures

If the AI provider is unavailable, the assistant says so clearly instead of stalling the operator's work.

Encryption & protection

How data and devices are protected

Encrypted device credentials

Camera and device passwords are encrypted while stored, and only decrypted when needed to connect.

Controlled access to the platform

Only approved applications and trusted network paths can reach the platform — and an unsafe configuration is blocked before the system will start.

Read-only display screens

Public wall displays use read-only access: they can show assigned dashboards but never change anything, and access can be revoked individually.

Reliable operations

How the platform stays reliable in production

Safe, no-downtime updates

Updates are designed so a deployment never takes the live system offline.

Documented recovery procedures

Every production incident becomes a written recovery runbook, so the response stays fast and repeatable.

Deployment

Three deployment models, same security model.

Cloud

Managed rollout

Faster start, managed platform operations. Default AI is cloud-hosted. Best for greenfield deployments and multi-site portfolios without strict residency rules.

On-premise

Site control

Full stack inside your perimeter — including on-premise AI. No telemetry, no outbound AI calls. Required for government / healthcare / residency-bound sites.

Hybrid

Phased modernization

Control plane in cloud, sensitive workloads on-prem. Per-tenant AI profile lets one portfolio mix cloud and on-premise inference under one operator UI.

Best fit

For sites where trust is part of the buying decision.

If your security review starts with "show me the audit trail, how tenants are isolated, and where AI data goes" — you're in the right place.

Healthcare and government sites
Industrial and factory facilities
Commercial, residential, and campus environments with security-sensitive zones

Next step

Bring your security review to the deployment team

We will walk through the actual controls — data isolation, the audit trail, and where AI data goes — not just a feature checklist.