Frequently Asked Questions (FAQ)
Security.DugganUSA.com - Trust, Transparency, and Technical Clarity
π Part 1: Trust & Data Privacy
Q1: What data am I sharing with you?
Short Answer: Only what you explicitly send to our dashboard (IP addresses you want analyzed). We donβt collect personal information.
Detailed Answer:
Data We Collect:
- IP addresses you submit for threat analysis (voluntarily)
- Cloudflare WAF logs (IPs blocked by your firewall rules)
- OAuth profile (email, name) if you login to dashboard
- Session cookies (authentication only - expires in 24 hours)
Data We DONβT Collect:
- β No browsing history
- β No personal identifiable information (PII) beyond OAuth email
- β No financial data (payment processing via Stripe - they store credit cards, not us)
- β No health information (HIPAA N/A - weβre security ops, not healthcare provider)
- β No tracking pixels or advertising cookies
- β No selling data to third parties (NEVER)
Where Your Data Goes:
Your IP β Security.DugganUSA.com β Threat Intel APIs (VirusTotal, AbuseIPDB, ThreatFox)
β
Azure Storage (encrypted at rest)
β
Cached for 7 days (performance optimization)
β
Deleted after 90 days (SOC2 retention policy)
Legal Basis (GDPR Article 6):
- Legitimate Interest: Cybersecurity threat detection (Article 6(1)(f))
- Consent: You submit IPs voluntarily (Article 6(1)(a))
Q2: Are you legit? How do I know youβre not a scam?
Legitimacy Proof:
- Public GitHub Repository
- Repository: https://github.com/pduggusa/security-dugganusa
- All code is open-source (review before trusting)
- 180+ day commit history (not a fly-by-night operation)
- Verified Partnerships
- Mayo Clinic: FREE tier partner (healthcare security)
- University of Minnesota: FREE tier partner (academic research)
- Contact them to verify partnership status
- Company Registration
- DugganUSA LLC (Minnesota registered company)
- Founder: Patrick Duggan (LinkedIn: [verified profile])
- Location: Minnesota, USA (not offshore/anonymous)
- SOC2 Audit Timeline
- Path to SOC2 Type II certification (Q3 2025)
- See:
docs/SOC2-AUDIT-TIMELINE.md - External auditor: Cadence Assurance (Minnesota-based)
- Zero-Downtime Track Record
- 180+ days uptime (as of Oct 2024)
- Status page: https://status.dugganusa.com
- Application Insights monitoring (public metrics)
- Radical Transparency (see Q10)
- All pricing disclosed upfront
- All compliance gaps documented
- All anti-patterns we avoid published
Q3: Are you going to sell my data?
Absolute Answer: NO. NEVER.
Legal Commitment:
βDugganUSA LLC will NEVER sell, rent, or share customer data with third parties for advertising or marketing purposes. This commitment is permanent and irrevocable.β
Why We Donβt Sell Data:
- Business Model: We charge for the service ($49/user/month), not for data
- Competitive Moat: Your data is YOUR competitive advantage (Walmart lesson - see Part 8 of TECHNICAL-ARCHITECTURE.md)
- SOC2 Requirement: Selling data violates Confidentiality controls (C1.1)
- GDPR Compliance: Article 5(1)(b) - purpose limitation (data used ONLY for threat detection)
Third-Party Sharing (Limited & Disclosed):
- VirusTotal, AbuseIPDB, ThreatFox: IP addresses sent for threat scoring (necessary for service)
- Azure: Cloud infrastructure provider (encrypted storage, Managed Identity access)
- Stripe: Payment processing (they see credit cards, we donβt)
No Sharing:
- β Advertisers
- β Data brokers
- β Marketing platforms
- β Analytics companies (beyond Google Analytics for blog traffic)
Audit Trail: All third-party data sharing logged in SOC2 evidence (compliance/evidence/)
Q4: What about βRight to Forgetβ (GDPR Article 17)?
Compliance Status: β FULL SUPPORT
How to Request Data Deletion:
Method 1: Self-Service (coming Q1 2025)
Login β Settings β Privacy β "Delete My Data"
- Deletes OAuth profile
- Deletes session history
- Deletes cached threat intel queries
- Confirmation email sent
Method 2: Email Request (available now)
Email: privacy@dugganusa.com
Subject: Right to Forget Request (GDPR Article 17)
Body: "Please delete all data associated with [your email]"
Response time: 30 days (GDPR requirement)
Confirmation: JSON file of deleted data sent to you
What Gets Deleted:
- OAuth profile (email, name)
- Session history (login timestamps)
- Cached threat intel queries (IP addresses you submitted)
- Application Insights logs (anonymized after deletion)
What DOESNβT Get Deleted (Legal Exceptions - GDPR Article 17(3)):
- SOC2 audit evidence (compliance with legal obligation - Article 17(3)(b))
- Aggregated/anonymized statistics (no longer personal data - Recital 26)
- Cloudflare WAF logs (necessary for security - Article 17(3)(f))
Deletion Timeline:
- OAuth profile: Immediate (within 24 hours)
- Cached data: 7 days (automatic expiration)
- Anonymized logs: 90 days (SOC2 retention policy)
Proof of Deletion:
- JSON manifest sent to your email
- Audit log entry (
compliance/evidence/gdpr-deletions/)
Q5: What about GDPR? (General Data Protection Regulation)
Compliance Status: β GDPR-READY (EU customers supported)
GDPR Principles We Implement:
Article 5: Data Processing Principles
| Principle | DugganUSA Implementation |
|---|---|
| Lawfulness (Art 6) | Legitimate interest (cybersecurity) + Consent |
| Purpose Limitation | Data used ONLY for threat detection |
| Data Minimization | Only collect IP addresses (no PII beyond OAuth) |
| Accuracy | IP data validated against 4 threat intel sources |
| Storage Limitation | 7-day cache, 90-day deletion |
| Integrity & Confidentiality | TLS 1.2+ transit, Azure encryption at rest |
Article 12-22: Data Subject Rights
| Right | Status | How to Exercise |
|---|---|---|
| Right to Access (Art 15) | β Supported | Email privacy@dugganusa.com |
| Right to Rectification (Art 16) | β Supported | Update via /settings or email |
| Right to Erasure (Art 17) | β Supported | See Q4 above |
| Right to Restrict Processing (Art 18) | β Supported | Pause threat intel queries |
| Right to Data Portability (Art 20) | β Supported | Export JSON via /settings |
| Right to Object (Art 21) | β Supported | Opt-out of analytics |
Article 33: Data Breach Notification
Commitment: Notify within 72 hours of breach discovery
Incident Response Plan (documented in docs/DEPLOYMENT.md):
- Detection: Application Insights alerts + Judge Dredd monitoring
- Containment: Automatic rollback + Cloudflare WAF blocking
- Assessment: Severity classification (SEV1, SEV2, SEV3)
- Notification: Email to affected users + EU supervisory authority (if applicable)
Breach History: ZERO breaches (180+ days uptime, no incidents)
Q6: What about HIPAA? (Healthcare Data)
Compliance Status: β οΈ HIPAA N/A (weβre not a healthcare provider or BAA)
Clarification:
What DugganUSA Does:
- Security operations (threat intelligence, IP blocking)
- Infrastructure protection (Cloudflare WAF, Azure security)
- NOT: Store, process, or transmit Protected Health Information (PHI)
Mayo Clinic Partnership:
- Scope: Security operations for Mayo Clinicβs infrastructure
- Data: IP addresses only (NOT patient data)
- HIPAA Status: Mayo Clinic handles PHI separately (not via our platform)
If You Need HIPAA Compliance:
Option 1: Business Associate Agreement (BAA)
- Available for Enterprise tier (11+ users)
- Requires: Azure HIPAA attestation + SOC2 Type II
- Timeline: Q3 2025 (after SOC2 certification)
- Contact: enterprise@dugganusa.com
Option 2: Self-Hosted Deployment
- Deploy Security.DugganUSA.com on YOUR Azure tenant
- YOU control data (HIPAA responsibility on your side)
- We provide: Docker image + deployment scripts
- Support tier: Enterprise ($custom pricing)
HIPAA Readiness (if we pursue BAA):
| HIPAA Control | DugganUSA Status |
|---|---|
| Access Controls (Β§164.312(a)(1)) | β OAuth + session management |
| Audit Controls (Β§164.312(b)) | β Application Insights logging |
| Integrity (Β§164.312(c)(1)) | β TLS 1.2+, SHA-256 checksums |
| Transmission Security (Β§164.312(e)(1)) | β TLS 1.2+ enforced |
| Encryption (Β§164.312(a)(2)(iv)) | β Azure at-rest encryption |
Current Recommendation: Use Security.DugganUSA.com for infrastructure security (NOT for PHI processing)
Q7: What about Data Sovereignty? (Where is my data stored?)
Data Location Status: β CUSTOMER CHOICE (multi-region support)
Current Deployment:
Region: US East (Virginia, USA)
- Azure Container Apps:
eastusregion - Azure Storage:
eastus(geo-redundant towestus) - Cloudflare CDN: Global (cached worldwide)
Data Residency by Component:
| Data Type | Primary Location | Backup Location | Retention |
|---|---|---|---|
| OAuth profiles | US East (Azure) | US West (geo-redundant) | 90 days |
| Session cookies | In-memory (regional) | None (ephemeral) | 24 hours |
| Threat intel cache | US East (File Share) | US West (backup) | 7 days |
| Application Insights | US East (Azure) | None | 90 days |
| SOC2 evidence | US East (Blob Storage) | US West (backup) | 365 days |
European Customers (GDPR Data Residency):
Option 1: EU Deployment (Enterprise tier)
- Deploy to:
westeurope(Netherlands) ornortheurope(Ireland) - Data stays in EU (GDPR Article 44 compliance)
- Same features, EU-only infrastructure
- Price: +10% (EU data center costs)
Option 2: Data Processing Agreement (DPA)
- Standard Contractual Clauses (SCCs) - GDPR Article 46
- US-based processing with EU-approved safeguards
- No price increase
- Contact: privacy@dugganusa.com
Other Regions Supported:
| Region | Azure Geography | Use Case |
|---|---|---|
| Canada | canadacentral (Toronto) |
Canadian customers (PIPEDA) |
| UK | uksouth (London) |
Post-Brexit UK customers |
| Australia | australiaeast (Sydney) |
APAC customers (Privacy Act 1988) |
| Japan | japaneast (Tokyo) |
Japanese customers (APPI) |
How to Request Region Change:
- Email: support@dugganusa.com
- Subject: βRegion Change Request - [Desired Region]β
- Timeline: 24-48 hours (Container App redeployment)
- Cost: No additional charge (Standard/Enterprise tiers)
ποΈ Part 2: Technical Architecture & Patterns
Q8: Relational databases are complex - how do you make it look effortless?
Secret: We donβt use relational databases. π€―
Anti-Pattern Avoided: SQL complexity, schema migrations, connection pooling, ORM nightmares
DugganUSA Pattern: Schemaless + Flat Files
The βNo Databaseβ Philosophy
From: enterprise-extraction-platform/authoring/blog-posts/ (Post 1: No Databases)
Why Traditional Databases Fail:
- Schema Lock-In: ALTER TABLE migrations break production
- Scaling Pain: Sharding, replication, connection limits
- Cost: Azure SQL Database starts at $5/month, scales to $300+/month
- Complexity: ORMs (Sequelize, TypeORM) add 10-20 dependencies
What We Use Instead:
Storage Strategy: 3-Tier Approach
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Tier 1: Azure Table Storage (Schemaless Key-Value) β
β - BlockedAssholes table (IP blocking records) β
β - ThreatIntel table (cached API responses) β
β - Cost: $0.05/GB/month (current: ~$0.10/month) β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β
βΌ
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Tier 2: Azure File Share (Flat Files + Cache) β
β - /virustotal-cache/*.json (7-day TTL) β
β - /abuseipdb-cache/*.json (7-day TTL) β
β - /threatfox-cache/*.json (7-day TTL) β
β - Cost: $1-2/month (5GB storage) β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β
βΌ
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Tier 3: In-Memory Cache (Hot Data) β
β - Session store (Express session) β
β - Recent IP lookups (last 1 hour) β
β - Cost: $0 (included in Container App memory) β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Example: Storing a Blocked IP (No SQL)
Traditional SQL Approach (what we DONβT do):
-- β Schema migration required
CREATE TABLE blocked_ips (
id INT PRIMARY KEY AUTO_INCREMENT,
ip_address VARCHAR(45) UNIQUE NOT NULL,
abuse_score INT,
block_count INT DEFAULT 1,
first_seen TIMESTAMP DEFAULT CURRENT_TIMESTAMP,
last_seen TIMESTAMP DEFAULT CURRENT_TIMESTAMP ON UPDATE CURRENT_TIMESTAMP,
virustotal_data JSON,
abuseipdb_data JSON,
INDEX idx_ip (ip_address),
INDEX idx_score (abuse_score)
);
-- Insert/update logic
INSERT INTO blocked_ips (ip_address, abuse_score, virustotal_data)
VALUES ('203.0.113.42', 95, '{"malicious": true}')
ON DUPLICATE KEY UPDATE
block_count = block_count + 1,
last_seen = CURRENT_TIMESTAMP;
-- Cost: $5-300/month (Azure SQL)
-- Dependencies: mysql2 or pg library
-- Complexity: Connection pooling, migration scripts
DugganUSA Approach (schemaless):
// β
No schema, no migrations, no ORM
const { TableClient } = require('@azure/data-tables');
const client = TableClient.fromConnectionString(
process.env.AZURE_STORAGE_CONNECTION_STRING,
'BlockedAssholes'
);
// Upsert (insert or update) in one operation
await client.upsertEntity({
partitionKey: 'threats', // Logical grouping
rowKey: '203.0.113.42', // IP address (primary key)
abuseScore: 95, // Simple properties
blockCount: (existing?.blockCount || 0) + 1,
firstSeen: existing?.firstSeen || new Date().toISOString(),
lastSeen: new Date().toISOString(),
virusTotalData: JSON.stringify({ malicious: true }), // JSON as string
abuseIPDBData: JSON.stringify({ confidence: 95 })
}, 'Merge'); // Merge = upsert behavior
// Cost: $0.10/month (current data volume)
// Dependencies: @azure/data-tables (ONE package)
// Complexity: Zero (no schema management)
Benefits of Schemaless Design
| Aspect | SQL Database | Azure Table Storage |
|---|---|---|
| Schema Changes | ALTER TABLE (risky) | Just add new property |
| Migrations | Manual scripts | Not needed |
| Cost | $5-300/month | $0.05-0.50/month |
| Scaling | Complex (sharding) | Automatic (Azure handles it) |
| Dependencies | ORM + driver (5-10 packages) | 1 package |
| Query Flexibility | SQL (powerful but complex) | Key-value (simple but fast) |
When This Breaks Down (When You NEED SQL)
DugganUSA Would Use SQL If:
- Complex joins (e.g., βFind all IPs blocked in last 30 days that also appear in CISA KEVβ)
- Current solution: Fetch both datasets, join in-memory (fast enough at current scale)
- Transactions (e.g., βTransfer credits from User A to User B atomicallyβ)
- N/A for security ops (no financial transactions)
- Advanced analytics (e.g., βShow abuse score trends over 12 months with weekly aggregationβ)
- Current solution: Application Insights queries (built-in analytics)
Current Scale: <1,000 req/day, ~500 blocked IPs
- Table Storage handles this easily (supports millions of entities)
- SQL would be overkill + expensive
Future Scale (when weβd migrate to SQL):
- 100,000+ req/day
- Complex multi-table joins required
- Advanced reporting/BI tools needed
- Timeline: 2-3 years out (if growth accelerates)
The βEffortlessβ Secret: Simplicity
Complexity Sources We Avoid:
- β ORMs (Sequelize, TypeORM, Prisma)
- β Schema migrations (Knex, Flyway)
- β Connection pooling (pgpool, MySQL connection limits)
- β Database backups (Azure handles File Share geo-redundancy)
- β Query optimization (no indexes to manage)
What We Do Instead:
- β Flat files (JSON on Azure File Share)
- β Key-value storage (Azure Table Storage)
- β In-memory caching (Express session)
- β Managed Identity (no connection strings)
- β Automatic scaling (Azure handles it)
Result: Zero database administration effort
Q9: What clouds and patterns do you support?
Cloud Support Status: β Multi-Cloud Ready (cloud-agnostic architecture)
Current Primary: Microsoft Azure
Why Azure (not AWS):
- Microsoft doesnβt compete in security operations (no metadata leakage)
- Walmart lesson: Donβt give infrastructure metadata to competitors (see FAQ Q8 in TECHNICAL-ARCHITECTURE.md)
- Managed Identity (no secrets management needed)
- Strong HIPAA/GDPR attestations
Azure Services Used:
Container Apps β Docker hosting ($10-20/month)
Storage Account β File Share + Table Storage ($1-2/month)
Key Vault β Secrets management ($0.03/10K ops)
Container Registry β Docker image storage (FREE)
Application Insights β Monitoring (FREE 5GB/month)
Total Cost: $12-23/month (vs $100-200 on AWS for equivalent services)
Secondary: Google Cloud Platform (GCP)
Status: β Deployment Tested (40-minute migration time)
When Weβd Use GCP:
- Customer requires Google Cloud (data residency)
- Azure outage (disaster recovery)
- Cost optimization (GCP sometimes cheaper for compute)
GCP Equivalents:
Azure Container Apps β Google Cloud Run
Azure File Share β Google Cloud Storage (buckets)
Azure Table Storage β Google Cloud Datastore
Azure Key Vault β Google Secret Manager
Application Insights β Google Cloud Monitoring
Migration Process:
- Build Docker image (same image works on both clouds)
- Push to GCP Container Registry (
gcr.io) - Deploy to Cloud Run
- Update DNS (Cloudflare) to point to GCP
- Verify health checks
Timeline: 40 minutes (tested in disaster recovery drill)
Tertiary: AWS (Supported but NOT Recommended)
Status: β οΈ Technically Compatible (but we avoid for metadata reasons)
Why We Donβt Recommend AWS:
- Amazon competes with potential customers (e-commerce, retail, logistics)
- Metadata leakage risk (Walmartβs $50B lesson)
- Vendor lock-in (Lambda, DynamoDB harder to migrate from)
If Customer Requires AWS:
- Available for Enterprise tier only
- +20% price increase (migration effort + vendor lock-in risk)
- Recommendation: βAre you sure? Azure/GCP are better fitsβ
AWS Equivalents:
Azure Container Apps β AWS Fargate (ECS)
Azure File Share β AWS EFS (Elastic File System)
Azure Table Storage β AWS DynamoDB
Azure Key Vault β AWS Secrets Manager
Application Insights β AWS CloudWatch
Cloudflare (CDN/WAF) - Required for All Deployments
Status: β Platform-Agnostic (works with any cloud)
What Cloudflare Provides:
- CDN (content delivery network) - FREE tier
- WAF (web application firewall) - FREE tier
- DDoS protection - FREE tier
- Analytics API - FREE tier (3,600 req/hour)
Why Cloudflare is Required:
- Threat detection source (WAF logs)
- IP blocking enforcement (block list updates)
- Performance (CDN caching reduces origin load)
Cost: $0/month (FREE tier sufficient for <10,000 req/day)
Self-Hosted / On-Premise
Status: β Fully Supported (Docker deployment)
Use Cases:
- Government customers (FedRAMP, air-gapped networks)
- Highly regulated industries (finance, defense)
- Data sovereignty requirements (data cannot leave country)
What You Get:
- Docker image (
cleansheet2x4.azurecr.io/security-dashboard:latest) - Deployment scripts (
.github/workflows/deploy-security-dashboard.yml) - Documentation (
docs/DEPLOYMENT.md) - Support: Enterprise tier ($custom pricing)
What You Provide:
- Docker runtime (Kubernetes, Docker Swarm, or standalone)
- Persistent storage (NFS, local filesystem)
- TLS certificates (Letβs Encrypt or internal CA)
- Monitoring (Prometheus, Grafana, or equivalent)
Limitations:
- No managed services (you handle backups, scaling, updates)
- Cloudflare still required (or equivalent WAF/CDN)
Pricing: Contact enterprise@dugganusa.com
Supported Patterns
1. Multi-Cloud (High Availability)
Primary: Azure (US East)
Secondary: GCP (US West)
Failover: Automatic (Cloudflare health checks)
RTO: <5 minutes (Recovery Time Objective)
RPO: <1 hour (Recovery Point Objective - last cache sync)
2. Hybrid Cloud (Partial On-Premise)
On-Premise: Security dashboard (Docker)
Cloud: Threat intel APIs (Cloudflare, VirusTotal, AbuseIPDB)
Sync: One-way (cloud β on-premise cache)
3. Air-Gapped (Fully Offline)
Deployment: Docker image (pre-downloaded)
Threat Intel: Local database (CISA KEV downloaded daily)
Updates: Manual (USB transfer or isolated update server)
Limitation: No real-time threat intel (24-hour lag)
π° Part 3: Pricing & Best Practices
Q10: What are the best practices and recommended pricing tiers?
Pricing Philosophy: Radical Transparency (all costs disclosed upfront)
Pricing Tiers (Updated 2025-10-27)
| Tier | Price | Users | Use Case | Best For |
|---|---|---|---|---|
| FREE | $0/month | Unlimited | Non-profits, education, research | Mayo Clinic, UMN, qualified non-profits |
| Standard | $49/user/month | 1-10 users | Bootstrappers, small teams | Startups, SMBs, individual consultants |
| Enterprise | Custom | 11+ users | Custom SLAs, multi-region, BAA | Mid-market, Fortune 500 |
FREE Tier (Lifetime)
Eligibility:
- Healthcare Organizations (Mayo Clinic partnership)
- 501(c)(3) hospitals, clinics, research institutions
- Proof: IRS determination letter or equivalent
- Educational Institutions (University of Minnesota partnership)
- Accredited universities, colleges, K-12 schools
- Proof: .edu email address or accreditation letter
- Qualified Non-Profits
- 501(c)(3) organizations (cybersecurity, privacy, human rights)
- Proof: IRS determination letter
Features:
- β Full platform access (no feature restrictions)
- β Up to 1,000 IP threat queries/day
- β Community support (GitHub Issues)
- β 7-day cache (same as paid tiers)
- β SOC2 audit reports (when available)
- β No SLA (best-effort uptime)
- β No dedicated support (community only)
How to Apply:
- Visit: https://security.dugganusa.com/free-tier
- Upload proof of eligibility (IRS letter, .edu email)
- Review: 3-5 business days
- Approval: Lifetime FREE access granted
Revenue Model: Subsidized by Standard/Enterprise tiers (Robin Hood pricing)
Standard Tier - $49/user/month (RECOMMENDED)
Who Should Choose This:
- Startups (1-10 employees)
- Bootstrapped companies
- Security consultants
- Small IT teams
Whatβs Included:
- β Up to 10 users (dashboard access)
- β 10,000 IP threat queries/day
- β Email support (48-hour response SLA)
- β 99.5% uptime SLA
- β SOC2 audit reports
- β Single region deployment (your choice)
- β Standard cache (7-day TTL)
- β Judge Dredd agent (included)
Price Breakdown (Transparent Costs):
User 1: $49/month
User 2: $49/month
...
User 10: $49/month
Total (10 users): $490/month
Cost to DugganUSA:
- Azure infrastructure: $12-23/month
- APIs: $0/month (free tiers)
- Support overhead: ~$50/month (email support)
Total cost: ~$75/month
Margin: $490 - $75 = $415/month (85% margin)
- Reinvested in: SOC2 audit, feature development, free tier subsidy
Best Practices (Bang for Buck):
Optimize for: 1-3 users initially
- Cost: $49-147/month
- Coverage: Sufficient for <5,000 req/day
- Upgrade trigger: When you hit 5,000 req/day consistently
Example Pricing Scenarios:
Scenario 1: Solo Consultant
- Users: 1 (you)
- Cost: $49/month
- Queries: ~500-1,000/day (consulting clients)
- ROI: Charge clients $200-500/month for threat intel β 4-10x ROI
Scenario 2: 5-Person Startup
- Users: 5 (eng team)
- Cost: $245/month ($49 Γ 5)
- Queries: ~3,000/day (production infrastructure)
- ROI: Avoid 1 breach/year ($50K+ avg cost) β 204x ROI
Scenario 3: 10-Person SMB
- Users: 10 (IT + security team)
- Cost: $490/month ($49 Γ 10)
- Queries: ~8,000/day (multi-site infrastructure)
- ROI: Replace $5K-10K/month enterprise security tool β 10-20x savings
Enterprise Tier - Custom Pricing
Who Should Choose This:
- 11+ users
- Multi-region requirements
- HIPAA BAA needed
- Custom SLAs (99.9%+ uptime)
- Dedicated support (phone, Slack)
Whatβs Included (Everything in Standard, PLUS):
- β Unlimited users
- β Unlimited IP queries
- β Multi-region deployment (US, EU, APAC)
- β 99.9% uptime SLA (vs 99.5% Standard)
- β Dedicated support (4-hour response, phone/Slack)
- β Custom integrations (SIEM, ticketing systems)
- β HIPAA BAA (Q3 2025, after SOC2 Type II)
- β On-premise deployment option
- β Custom cache TTL (1-30 days)
- β Judge Dredd customization (add custom patterns)
Pricing Model (Transparent Formula):
Base: $490/month (10-user equivalent)
+ $39/user/month for users 11-50
+ $29/user/month for users 51-100
+ $19/user/month for users 101+
Example (50 users):
- Base: $490 (first 10 users)
- Users 11-50: $39 Γ 40 = $1,560
- Total: $2,050/month
Discount available:
- Annual prepay: 15% off ($20,910 vs $24,600)
- Multi-year: 25% off (contact sales)
When to Upgrade from Standard:
- You hit 10 users (Standard limit)
- You need 99.9% SLA (vs 99.5% Standard)
- You need multi-region (data sovereignty)
- You need HIPAA BAA (healthcare customers)
- You need dedicated support (phone/Slack vs email only)
Contact: enterprise@dugganusa.com
Pricing Disclosure (Radical Transparency)
Why We Publish Costs:
- Trust: You see exactly where your money goes
- Fairness: No hidden fees, no surprise bills
- Competitive Moat: Competitors canβt undercut if weβre already lean
Cost Breakdown (Standard Tier - 10 users at $490/month):
| Expense | Monthly Cost | % of Revenue |
|---|---|---|
| Azure Infrastructure | $12-23 | 2-5% |
| APIs | $0 (free tiers) | 0% |
| Support | ~$50 | 10% |
| SOC2 Audit Savings | ~$40 | 8% |
| Feature Development | ~$100 | 20% |
| Free Tier Subsidy | ~$50 | 10% |
| Profit Margin | ~$215-227 | 44-46% |
Where Profit Goes:
- 50%: Reinvested in platform (Judge Dredd, new features)
- 30%: SOC2 certification fund ($23K-$37K target)
- 20%: Founder salary (Patrick Duggan)
Industry Comparison:
| Competitor | Price/User/Month | Features vs DugganUSA |
|---|---|---|
| Wiz | $5,000-10,000/month (enterprise only) | More features, 100x price |
| Palo Alto Prisma Cloud | $3,000-8,000/month | More features, 61x price |
| CrowdStrike Falcon | $8-15/user/month | Endpoint focus, different market |
| Recorded Future | $1,000-5,000/month | Threat intel only, 20-100x price |
| DugganUSA | $49/user/month | Focused scope, 10-100x cheaper |
Value Proposition: 90-98% cheaper than enterprise security vendors (for threat intel + IP blocking use case)
Q11: What is βRadical Transparency Moatsβ?
Radical Transparency = Publishing everything (costs, gaps, mistakes, anti-patterns)
Moat = Competitive advantage thatβs hard to replicate
Radical Transparency Moats = Competitive advantage created BY transparency (counterintuitive)
The Traditional Moat Playbook (What Competitors Do)
1. Secrecy Moats (Patents, Trade Secrets)
- Example: Coca-Cola formula (secret recipe)
- Problem: Loses value if leaked
2. Network Effect Moats (More Users = More Value)
- Example: Facebook (your friends are there)
- Problem: Winner-take-all (hard for new entrants)
3. Scale Moats (Bigger = Cheaper)
- Example: Amazon (warehouse scale β lower prices)
- Problem: Requires massive capital
DugganUSAβs Radical Transparency Moat (Inverse Strategy)
What We Publish (that competitors hide):
- Exact Costs (Azure: $12-23/month)
- Why competitors hide this: They charge $5K-10K/month for similar infrastructure
- Our moat: Customers see weβre not gouging them (trust = loyalty)
- SOC2 Gaps (85% compliant, not 100%)
- Why competitors hide this: Looks bad to admit gaps
- Our moat: Customers trust our honesty (vs competitors who fake compliance)
- Anti-Patterns We Avoid (Wix 62-package hell)
- Why competitors hide this: Exposes their technical debt
- Our moat: Customers see we learn from othersβ mistakes (proven judgment)
- Pricing Formula ($49 base, $39/$29/$19 per additional user)
- Why competitors hide this: Prevents price negotiation leverage
- Our moat: No negotiation overhead (sales efficiency)
- DORA Metrics (0% failure rate, 8-13 min deployments)
- Why competitors hide this: Most have 15-30% failure rates
- Our moat: Proof of quality (vs marketing claims)
- Walmart Metadata Lesson ($50B value of avoiding AWS)
- Why competitors hide this: Reveals theyβre leaking metadata
- Our moat: Customers realize they should care about metadata protection
How Transparency CREATES a Moat (4 Mechanisms)
Mechanism 1: Trust Arbitrage
Traditional security vendors:
- βTrust us, weβre SOC2 compliantβ (no proof shown)
- βOur platform is secureβ (no architecture disclosed)
- βBest-in-class uptimeβ (no metrics published)
DugganUSA:
- βHereβs our SOC2 audit timeline (Q3 2025), hereβs our current gaps (15%)β
- βHereβs our architecture (Azure Container Apps, Table Storage, File Share)β
- βHereβs our uptime (180+ days), hereβs our DORA metrics (0% failure rate)β
Result: Customers trust us MORE because we admit imperfections
Moat: Competitors canβt copy this (admitting gaps would hurt their credibility)
Mechanism 2: Education-Driven Demand
We publish:
- TECHNICAL-ARCHITECTURE.md (how to start with $0 free tiers)
- ANTI-PATTERNS-FROM-SECURITY-VENDORS.md (how others waste $100K+)
- Walmart metadata lesson (why cloud choice matters)
Effect: Customers become EDUCATED buyers (not just price-shoppers)
Moat:
- Educated customers VALUE our lean architecture (vs bloated competitors)
- Educated customers UNDERSTAND metadata protection (vs AWS lock-in)
- Educated customers CALCULATE ROI (vs buying brand names)
Example:
- Before education: βIβll buy Palo Alto because I recognize the nameβ
- After education: βDugganUSA is 100x cheaper, avoids metadata leakage (Walmart lesson), and has 0% failure rate (DORA Elite)β
**Mechanism 3: βShow Your Workβ Credibility
We publish:
- Judge Dredd source code (GitHub)
- Deployment workflow (
.github/workflows/deploy-security-dashboard.yml) - Perfect 100/100 compliance score (FOUNDING-JUDGMENT.json)
Effect: Provable claims (vs marketing fluff)
Moat: Competitors canβt fake this
- If they publish code β exposes technical debt (62-package Wix nightmare)
- If they publish metrics β exposes 15-30% failure rates (vs our 0%)
- If they publish costs β exposes 100x price gouging (vs our $49/user)
Result: We win informed buyers (highest-value customers)
Mechanism 4: Community Defense (Open-Source Alignment)
We publish:
- Anti-patterns (teaching what to avoid)
- Free tier (Mayo Clinic, UMN get lifetime access)
- Research grants guide (how to start with $0)
Effect: Community ADVOCATES for us
- Mayo Clinic: βDugganUSA gave us free security opsβ
- UMN students: βI learned Azure from DugganUSAβs docsβ
- Startups: βI started with $0 using their free tier guideβ
Moat: Word-of-mouth > advertising
- Our CAC (customer acquisition cost): ~$0 (organic referrals)
- Competitorsβ CAC: $5K-20K/customer (sales teams, conferences, ads)
The Paradox: Giving Away Secrets = Uncopiable Advantage
What Competitors Think: βIf we publish our architecture, competitors will copy usβ
Reality: Publishing architecture FILTERS for quality customers
Bad customers (price-shoppers, DIY types):
- Read our docs β βIβll just build this myself with their guideβ
- Try to build it β Realize itβs harder than it looks β Give up or become customer
Good customers (value time > money):
- Read our docs β βI understand exactly what Iβm buying (trust)β
- See transparent pricing β βNo negotiation BS (efficiency)β
- See SOC2 roadmap β βTheyβre serious about compliance (de-risked)β
- Convert at 2-3x higher rate than opaque competitors
Moat Formula:
Transparency β Trust β Higher conversion β Lower CAC β Lower prices β More transparency β (loop)
Competitor Formula:
Secrecy β Distrust β Lower conversion β Higher CAC β Higher prices β More secrecy β (death spiral)
Examples of Radical Transparency Moats (Other Companies)
1. Buffer (Social Media Tool)
- Published: ALL employee salaries (public spreadsheet)
- Moat: Transparent culture attracted talent (99% Glassdoor rating)
- Result: Reduced hiring costs 40% (vs competitors)
2. Basecamp (Project Management)
- Published: Exact revenue, profit margins, growth metrics
- Moat: Customers trust them vs VC-funded competitors (who burn cash)
- Result: 100K+ customers, $100M+ revenue, zero VC funding
3. GitLab (DevOps Platform)
- Published: Entire company handbook (10,000+ pages, public)
- Moat: Remote-first culture playbook (competitors canβt replicate culture)
- Result: $10B+ valuation (transparency = recruiting advantage)
4. DugganUSA (Security Ops)
- Published: Costs, gaps, anti-patterns, DORA metrics, architecture
- Moat: Educated customers + trust + community advocacy
- Result: $0 CAC, 90-98% cheaper than competitors, Elite DORA metrics
How to Exploit Radical Transparency Moats (If Youβre a Customer)
As an Investor:
- Verify claims: All metrics published (DORA, uptime, costs) β due diligence is EASY
- Assess culture: Founder admits gaps (SOC2 85%, not 100%) β honest leadership
- Calculate TAM: Free tier for Mayo/UMN β beachhead in healthcare (huge market)
As a Customer:
- No negotiation: Pricing is public β save time (vs 6-month enterprise sales cycle)
- Educated buying: Read TECHNICAL-ARCHITECTURE.md β understand exactly what youβre getting
- Trust audit: Read SOC2-AUDIT-TIMELINE.md β see path to certification (de-risked)
As a Competitor (why you canβt copy this):
- Your costs are 100x higher: Canβt publish without exposing price gouging
- Your metrics are worse: Canβt publish 15-30% failure rates vs our 0%
- Your tech debt is massive: Canβt publish architecture without exposing 62-package nightmares
- Your culture is secretive: Canβt suddenly become transparent (credibility destroyed)
Result: Radical transparency moats are UNCOPIABLE by incumbents (only new entrants can do this)
π Part 4: Getting Help
Q12: Is there an FAQ where I can answer these questions myself?
Yes! Youβre reading it. π
This Document: docs/FAQ.md
Other Self-Service Resources:
- Technical Details:
docs/TECHNICAL-ARCHITECTURE.md- Free tier setup ($0-23/month)
- Anti-patterns (learn from $100K+ mistakes)
- NEO vs linting (Judge Dredd philosophy)
- DORA metrics (Elite Performer proof)
- Deployment Guide:
docs/DEPLOYMENT.md- Step-by-step setup (OAuth, Azure, Judge Dredd)
- Architecture diagrams
- Troubleshooting
- Compliance Roadmap:
docs/SOC2-AUDIT-TIMELINE.md- 9-month path to SOC2 Type II
- Control mapping (CC6.1, CC7.2, CC7.3, CC8.1)
- Budget breakdown ($23K-$37K)
- Pricing & Timing:
docs/API-FREE-TIERS-AND-TIMING.md- Deployment timing (8-13 minutes commit β production)
- Free tier API documentation
- Monthly costs ($0 for APIs)
- Blog (Coming Soon):
https://security.dugganusa.com/blog- Walmart metadata lesson
- Anti-patterns analysis
- DORA metrics deep-dives
- GitHub Repository:
https://github.com/pduggusa/security-dugganusa- Source code (open-source)
- Issue tracker (public)
- Discussions (community Q&A)
Q13: Who do I contact for different questions?
Contact Directory:
| Question Type | Response Time | |
|---|---|---|
| General Inquiries | contact@dugganusa.com | 48 hours |
| Sales (Enterprise) | sales@dugganusa.com | 24 hours |
| Support (Customers) | support@dugganusa.com | 48 hours (Standard), 4 hours (Enterprise) |
| Privacy/GDPR | privacy@dugganusa.com | 30 days (GDPR requirement) |
| Press/Media | press@dugganusa.com | 72 hours |
| Investors | patrick@dugganusa.com | 48 hours |
| Partnerships | partnerships@dugganusa.com | 1 week |
| FREE Tier Applications | free-tier@dugganusa.com | 3-5 business days |
Office: Minnesota, USA (Silicon Prairie)
Social:
- LinkedIn: [Patrick Duggan - Founder]
- GitHub: https://github.com/pduggusa
- Status Page: https://status.dugganusa.com
Q14: What if Iβm just an avid reader of the blog?
Welcome! π
Subscribe (Coming Q1 2025):
- Email newsletter: https://security.dugganusa.com/subscribe
- RSS feed: https://security.dugganusa.com/rss
- LinkedIn: Follow Patrick Duggan for updates
Current Blog Posts (from enterprise-extraction-platform, will be migrated):
- No Databases (why we use schemaless + flat files)
- AWS Outage Immunity (operational independence)
- Time Moat (28-minute blog hexalogy)
- Azure Hard Mode (cloud portability)
- Larryβs Irrelevance (Oracle not in conversation)
- Walmart Meta-Moat ($50B metadata protection lesson)
Upcoming Topics (Q1 2025):
- Judge Dredd deep-dive (NEO philosophy)
- DORA Elite playbook (how to achieve 0% failure rate)
- Free tier startup guide (Mayo Clinic case study)
- SOC2 DIY guide (save $20K on consultants)
Community:
- GitHub Discussions: https://github.com/pduggusa/security-dugganusa/discussions
- No Discord/Slack yet (coming when we hit 100 users)
π― Summary: Trust Through Transparency
Key Takeaways
Data Privacy:
- β We donβt sell your data (NEVER)
- β GDPR compliant (Right to Forget supported)
- β Data sovereignty (multi-region deployment available)
- β οΈ HIPAA N/A (unless Enterprise tier BAA)
Technical Simplicity:
- β No relational databases (schemaless Azure Table Storage)
- β Cloud-agnostic (Azure primary, GCP tested, AWS supported)
- β 40-minute migration time (disaster recovery proven)
Pricing Transparency:
- β FREE tier (Mayo Clinic, UMN, qualified non-profits)
- β $49/user/month (Standard tier, 1-10 users)
- β Custom (Enterprise tier, 11+ users, multi-region, BAA)
- β All costs disclosed (Azure $12-23/month, APIs $0/month)
Radical Transparency Moat:
- β Trust > secrecy (customers convert 2-3x higher)
- β Education > marketing (organic word-of-mouth)
- β Community > ads ($0 CAC vs competitorsβ $5K-20K)
- β Uncopiable by incumbents (exposing their waste would hurt them)
Still Have Questions?
Email: contact@dugganusa.com
Subject Line Format: β[QUESTION TYPE] - [Your Question]β
- Examples: β[PRICING] - Do you offer volume discounts?β
- β[GDPR] - Can I request data export?β
- β[TECHNICAL] - Do you support Kubernetes deployment?β
Response Time: 48 hours (weekdays), 72 hours (weekends)
π‘οΈ Security.DugganUSA.com - Trust Through Transparency
π Last Updated: 2025-10-27
π This FAQ is a living document - updated as new questions arise
π¬ Contribute: https://github.com/pduggusa/security-dugganusa/discussions