Overview of dtect Security
  • 01 Apr 2025
  • Dark
    Light
  • PDF

Overview of dtect Security

  • Dark
    Light
  • PDF

Article summary

In today's digital landscape, the quality of your survey data directly impacts the reliability of your insights and, ultimately, your reputation. dtect's comprehensive security features work together to protect your surveys from fraudulent responses before they can compromise your data, allowing your team to focus on driving reliable insights rather than cleaning bad data.
SecurityOverview.png

💡 Pro Tip

The most effective security strategy often combines multiple features while considering your specific research needs and audience characteristics.

Security Features

Deduplication

ID Deduplication: Identifies and blocks multiple responses using the same unique participant identifier.
Device Deduplication: Prevents multiple submissions from the same device, ensuring each response represents a unique participant.
IP Deduplication: Identifies and blocks multiple responses from the same network location, maintaining response diversity.

Deduplication

Location Security

Location Validation: Verifies participant location authenticity through sophisticated validation techniques.
Location Lock: Ensures participants are physically located in your target countries, maintaining geographical relevance.
Location Security

Automated Threat Detection

Automation Detection: Provides protection against bots and automated responses while maintaining genuine participant access.

Automation Detection

Trusted Brosers & OS: Restrict participation to trusted browsers and operating systems, blocking those associated with high-risk activity.
trusted

Suspicious Users: Block participants who display unusual behaviors that are not common to survey participants that may indicate potential risk of fraud or for surveys.

SuspiciousUsers.png

ℹī¸ What is a VPN?
A Virtual Private Network (VPN) allows users to mask their true location by routing their internet connection through servers in different locations. While VPNs have legitimate uses, they can also be used to circumvent geographic restrictions in surveys.

Pre-screening

Audience Validation: Verifies participant qualifications through randomized, audience-specific questions.
AI Detection: Identifies potential AI-generated responses to maintain authentic human participation.

Prescreening

Ghost Completes Prevention

Unique Project Identifier: An extra layer of security to stop survey jumpers and avoid ghost completes by adding an unique ID to the complete URL.
UPIsecurity.png

Implementation Best Practices

Balancing Security and Accessibility

While implementing multiple security features provides the strongest protection, consider your study's specific needs:

  • High-stakes research may benefit from enabling all security features
  • Consider selective feature activation for studies requiring broader accessibility
  • Monitor and adjust security settings based on response rates and data quality
⚠ī¸ Important Note

Implementing all security features provides maximum protection but may result in lower incidence rates. Consider your study requirements when choosing which features to enable.

Common Implementation Scenarios

  1. High-Security Studies
    • Enable all security features
    • Ideal for high-value B2B research
  2. Consumer Studies
    • Focus on core security features
    • Balance between security and completion rates
  3. International Studies
    • Emphasize Location Validation
    • Configure Location Lock for target regions
  4. IT / Tech Worker studies
    • Consider disabling VPN Usage in Suspicious Users as well as Dev Tools and Incognito Mode as these are some behaviors that are more common amongst certain groups.

Troubleshooting

General Guidelines

  • Review the Progress page for detailed security metrics
  • Monitor termination rates across different security features
  • Adjust settings if experiencing unexpected participant blocking
🔍 Monitoring Tip

Regular review of your Progress page helps identify potential issues before they significantly impact your study.

Progress.png

Common Scenarios

  1. High Security Termination Rates
    • Review security thresholds
    • Check for legitimate regional access patterns
    • Verify supplier traffic quality
  2. Unexpected Terminations
    • Confirm Location Lock settings match target regions
    • Review Audience Validation configuration
    • Check for potential VPN-related issues with Suspicious Users
  3. Response Rate Issues
    • Balance security settings with accessibility
    • Review and adjust feature combinations
    • Consider your target audience characteristics

Need Additional Help?

Contact your Customer Success Manager for:

  • Feature optimization recommendations
  • Specific security configuration guidance
  • Detailed information about feature capabilities

Remember: The goal is to maintain high data quality while ensuring legitimate participants can successfully complete your surveys. Regular monitoring and adjustment of security settings helps achieve this balance.


Was this article helpful?

What's Next