• Platform
    • Platform Overview

      Secure data collaboration and analysis

      Learn More
      • Platform Overview
      • Secure Query
      • Secure Collaborative AI
      • Duality Assistant Agent
      • Secure Federated Analytics
    • Technology

      Three layers of secure data collaboration platform

      • Technology
      • Open Source
      • Glossary
    Duality and Oracle Delivering Privacy-First AI to Government and Defense Customers

    Duality and Oracle Delivering Privacy-First AI to Government and Defense Customers

    Partnership powers secure data collaboration for mission-critical operations
  • Solutions
    • Government
      • Government Overview

        Institute privacy preserving data collaborations

        Learn More
      • Zero Footprint Investigations & Intelligence
      • Cross Domain Zero Footprint Investigations & Intelligence
      • Cross Departments Analytics
      • AI for Strategic & Tactical Defense
      • Unlock Military Health Insights
      • Secure Semantic Search
      • Border Threat Detection
    • Healthcare
      • Healthcare Overview

        Fuel research, discovery, and better patient outcomes

        Learn More
      • GWAS
      • Oncology Research
      • Real World Evidence
      • Cross Border Health Analytics
    • Financial Institutions
      • Financial Services Overview

        Complete picture of risk, transactions, and clientele

        Learn More
      • Fraud Prevention
      • Risk Scoring
      • Anti-Money Laundering
      • Trade Financing
      • KYC Compliance
      • Trial AI Models
    • Marketing
      • Marketing Overview

        Optimize Your Advertising and Customer Retention

        Learn More
      • Targeted Offers
    • Data Service Providers
      • Data Service Provider Overview

        Open and accelerate revenue for data and AI

        Learn More
      • Trial AI Models
      • Data Monetization
      • Customize GenAI Models
    • Manufacturing
      • Manufacturing Overview

        Collaborate across the value chain without exposing your IP

        Learn More
      • Predictive Maintenance
      • Supply Chain Management
    • Insurance
      • Insurance Overview

        Navigate Insurance claims without exposing data

        Learn More
      • Underwriting & Pricing
      • AI Implementation
      • Cross Border Insurance Operations
      • Claims Processing
      • Regulatory Reinsurance and Reporting
    UK Government Highlights Duality in Landmark Cross-Border Health Study

    UK Government Highlights Duality in Landmark Cross-Border Health Study

    Case Study: NHS England, NCI and DSIT – Enabling International Cancer Research Collaboration Using Privacy-Enhancing Technologies
  • Partners
    • Duality Collaboration Hub

      Empower your partners and customers with secure data collaboration

      Learn More
    • AWS
    • Google
    • Azure
    • Deloitte
    • Carahsoft
    • Blackwood
    • Oracle
    • Intel
    • IBM
    • DARPA
    • LSEG
    • NVIDIA
  • Resources
    • Blog
    • Resource Hub
    • Videos
    • Documentation
    • Glossary
  • Company
    • About Duality
    • Leadership
    • Events
    • Careers
    • News
    • Contact Us
    Secure AI Development & Training via Confidential Computing and TEEs

    Secure AI Development & Training via Confidential Computing and TEEs

    Duality announces the addition of a hardware-based security technology, trusted execution environments (TEEs or Secure Enclaves), for privacy protected AI development in AWS, GCP, or Azure.
    by Omer Moran
    November 2nd, 2023 8 min read
    How to Land & Expand Government Data Contracts with Zero Footprint Investigations

    How to Land & Expand Government Data Contracts with Zero Footprint Investigations

    Privacy technologies can eliminate the hurdles of leveraging commercial and open-source intelligence (OSINT) data for sensitive investigations. No costly and risky data movement. No stale data. 100% compliant. See how Duality's Zero Footprint Investigation solution is benefitting data providers and brokerages like Refinitiv and Carahsoft.
    by Derek Wood
    October 27th, 2023 6 min read
    Beyond Compliance: An Unprecedented Recommendation of New Technologies to Handle Sensitive Data

    Beyond Compliance: An Unprecedented Recommendation of New Technologies to Handle Sensitive Data

    Summary: The ICO is the UK’s privacy regulator. Their recent guidance goes far beyond clarifying requirements and actively recommends the adoption of advanced privacy enhancing technologies (PETs) when using, sharing, or collaborating on people’s personal information. Why? Because these technologies make working with sensitive data easy and more productive. Whether or not you’re under the...
    by Derek Wood
    July 24th, 2023 6 min read
    It’s Not Just About Being a Cool Vendor. It’s About Gartner Creating a New Category.

    It’s Not Just About Being a Cool Vendor. It’s About Gartner Creating a New Category.

    We are thrilled to be nominated a Gartner ‘Cool Vendor in Privacy Preservation in Analytics.’ Indisputably, it’s a reason to celebrate when this renowned industry research firm includes you in one of its reports. But we are equally excited that Gartner has created the category ‘Privacy Preservation in Analytics.’ We founded Duality with the vision...
    by Alon Kaufman
    October 23rd, 2019 3 min read
    Encrypted Computing as a Protection from Kernel Vulnerabilities

    Encrypted Computing as a Protection from Kernel Vulnerabilities

    Whenever a running program needs to do anything useful – such as write to a file or open a network connection – it has to temporarily hand control of the processor to the kernel to carry out the job. This mode switching between programs and the kernel are potentially time consuming. In order to be...
    by Kurt Rohloff
    January 8th, 2018 2 min read
    Proxy Re-Encryption for Encrypted Computing

    Proxy Re-Encryption for Encrypted Computing

    A challenge with prior attempts to commercialize and apply homomorphic encryption is that the output of computations on encrypted data is also encrypted, and the output can be decrypted only with the secret key of the data owner.  If the data owner wants to share the results of a computation, the data owner previously had...
    by Kurt Rohloff
    October 16th, 2017 3 min read
  • Col 1
    • About Duality
    • Company
    • Careers
    • Product
    • Platform Overview
    • Query Engine
    • Machine Learning and Analytics
  • Col 2
    • Industry Solutions
    • Financial Services
    • Healthcare
    • Government
    • News
    • Events
    • Blog
  • Col 3
    • Partners
    • Collaboration Hub
    • Intel
    • Oracle
    • IBM
    • Google
    • Contact Us
Subscribe to our monthly newsletter
All rights reserved to © Duality 2023
  • Privacy Policy
  • Terms of Service
  • Cookie Policy
Book a Demo

Book a Demo

Schedule time with one of our experts