- 01 Apr 2025
- Print
- DarkLight
- PDF
Overview of dtect Security
- Updated on 01 Apr 2025
- Print
- DarkLight
- PDF
In today's digital landscape, the quality of your survey data directly impacts the reliability of your insights and, ultimately, your reputation. dtect's comprehensive security features work together to protect your surveys from fraudulent responses before they can compromise your data, allowing your team to focus on driving reliable insights rather than cleaning bad data.
The most effective security strategy often combines multiple features while considering your specific research needs and audience characteristics.
Security Features
Deduplication
ID Deduplication: Identifies and blocks multiple responses using the same unique participant identifier.
Device Deduplication: Prevents multiple submissions from the same device, ensuring each response represents a unique participant.
IP Deduplication: Identifies and blocks multiple responses from the same network location, maintaining response diversity.
Location Security
Location Validation: Verifies participant location authenticity through sophisticated validation techniques.
Location Lock: Ensures participants are physically located in your target countries, maintaining geographical relevance.
Automated Threat Detection
Automation Detection: Provides protection against bots and automated responses while maintaining genuine participant access.
Trusted Brosers & OS: Restrict participation to trusted browsers and operating systems, blocking those associated with high-risk activity.
Suspicious Users: Block participants who display unusual behaviors that are not common to survey participants that may indicate potential risk of fraud or for surveys.
âšī¸ What is a VPN?
A Virtual Private Network (VPN) allows users to mask their true location by routing their internet connection through servers in different locations. While VPNs have legitimate uses, they can also be used to circumvent geographic restrictions in surveys.
Pre-screening
Audience Validation: Verifies participant qualifications through randomized, audience-specific questions.
AI Detection: Identifies potential AI-generated responses to maintain authentic human participation.
Ghost Completes Prevention
Unique Project Identifier: An extra layer of security to stop survey jumpers and avoid ghost completes by adding an unique ID to the complete URL.
Implementation Best Practices
Balancing Security and Accessibility
While implementing multiple security features provides the strongest protection, consider your study's specific needs:
- High-stakes research may benefit from enabling all security features
- Consider selective feature activation for studies requiring broader accessibility
- Monitor and adjust security settings based on response rates and data quality
Implementing all security features provides maximum protection but may result in lower incidence rates. Consider your study requirements when choosing which features to enable.
Common Implementation Scenarios
- High-Security Studies
- Enable all security features
- Ideal for high-value B2B research
- Consumer Studies
- Focus on core security features
- Balance between security and completion rates
- International Studies
- Emphasize Location Validation
- Configure Location Lock for target regions
- IT / Tech Worker studies
- Consider disabling VPN Usage in Suspicious Users as well as Dev Tools and Incognito Mode as these are some behaviors that are more common amongst certain groups.
Troubleshooting
General Guidelines
- Review the Progress page for detailed security metrics
- Monitor termination rates across different security features
- Adjust settings if experiencing unexpected participant blocking
Regular review of your Progress page helps identify potential issues before they significantly impact your study.
Common Scenarios
- High Security Termination Rates
- Review security thresholds
- Check for legitimate regional access patterns
- Verify supplier traffic quality
- Unexpected Terminations
- Confirm Location Lock settings match target regions
- Review Audience Validation configuration
- Check for potential VPN-related issues with Suspicious Users
- Response Rate Issues
- Balance security settings with accessibility
- Review and adjust feature combinations
- Consider your target audience characteristics
Need Additional Help?
Contact your Customer Success Manager for:
- Feature optimization recommendations
- Specific security configuration guidance
- Detailed information about feature capabilities
Remember: The goal is to maintain high data quality while ensuring legitimate participants can successfully complete your surveys. Regular monitoring and adjustment of security settings helps achieve this balance.