Using Overlap Reports

If you subscribe to both the Pixalate pre-bid blocking solution and the Pixalate dashboard, you will have access to our Overlap Reports. The purpose of these reports is to show our clients the effectiveness of the pre-bid lists that they are subscribed to, and troubleshoot any potential issues with implementation.

On the left navigation of the dashboard, we show you a menu item called “Data Feeds”. If you click on this menu item, you will see reports for Datacenter, IP and Device ID Overlap. These are the three lists we offer these reports for at the moment.

These reports have two main objectives.

One, to give a visual overview of when Pixalate uploads new lists to a secure FTP for download and consumption, and when the list is then downloaded by you, the client. This allows you to see if you are missing any lists or if there are any large gaps of time between when the list is uploaded and when you download it. Missing lists or having large gaps between consumption of lists and when they are made available can cause some leakage wherein bad IP’s or Device ID’s may end up in your traffic. 

The second purpose of the report is to show you how effective the lists are at different probability thresholds. As you may be aware, Pixalate SIVT lists have probabilities associated with different data points. This is based on back-end analysis which gives us an overview of how “risky” an IP, Device ID, etc might be to transact on. Our probabilities range from .5 to 1, with 1 being deterministic that a given data point is a risk. 

The reports give a seven day window showing how much ‘leakage’ there was in your traffic at a .5, .75 and 1 probability threshold. This allows us to see if the probability should be updated or changed, and if the expectations with applying the list(s) matches the data. 

The Datacenter pre-bid list is a deterministic GIVT list, with no probabilities. Therefore, the Datacenter overlap report shows you whether the list is being applied properly. If it is being applied properly, there should be no leakage of data through your data.