Digital Element Enhances IP Geolocation with Advanced French Regional Data

VPN Detection Myth Series: Myth Four: VPN Threat Vectors are Far from Static

A Five-Part Blog Series to Bust the Myths Surrounding VPN Intelligence Data

In this five-part blog series, we tackle the questions our customers ask us, with a goal of busting the myths that are driving those questions. In our first blog post of the series, we dispelled the myth that all VPN-driven data is the same. For Part Two, we addressed the myth that VPN breadth doesn’t matter. Part Three dispelled the myth that IT teams only need to worry about detecting the VPN services included in a Top Ten list they’ve found online.

This blog post, the fourth in our series, tackles a pernicious myth that VPN threat vectors originate from common sources and remain static.

Myth #4: VPN threat vectors originate from common sources and remain static.

There are many reasons why this statement is false. Before we can even begin to identify the IP addresses that are proxies, we need to understand how the IP address space operates. There are three portions of the routable IP space that apply in this context: 

  1. ISP blocks, which are tied to ISPs that offer home and business connectivity
  2. Mobile blocks, which are for mobile and IoT devices and provided by telecom companies
  3. Hosting IP blocks, which is where VPN activity originated and continues to live, services all kinds of connectivity needs, such as domain or web hosting, co-location, and so on. 

However, over the past 10 years, VPN providers have begun to tap into IP addresses that historically have been within Hosted IP address blocks to dynamic addresses within the ISP and Mobile blocks and are starting to leverage those as proxies. 

Dynamic vs Static IPs

Given the distinction in the routable IP space, it’s no surprise that there are two broad classes of IP addresses: static and dynamic.

  • Static IP Address. A static IP address is one that has consistent geolocation, meaning at the time it is analyzed its geolocation is the same as previously identified. Static IP addresses are likely tied to the same end users if within an ISP block.
  • Dynamic IP Address. A dynamic IP address is one whose geolocation changes frequently. It’s dynamic because it can service different end users at any given moment. This is more common in Mobile and ISP blocks because end users fluctuate within a given area. These addresses are difficult to block as the end user may be different every day making blocking the IP address problematic.

Example of a Dynamic IP Address

A home user’s IP address, also known as a residential IP address, is a highly valuable IP address to a VPN provider as they are dynamic and can change everyday. A VPN service will use these addresses for their service, knowing that the IP address can change at any given moment, making it easier to circumvent restrictions that would apply to Static IP addresses.

Example of How VPN Exit Nodes Operate

Lets say a user signs up for “Big Name” VPN user and connects to a server in the U.K.  They will be assigned a Static IP address of “1.2.3.4” from a hosting provider like “Digital Ocean”. That is the entrance node. The “Big Name” VPN user then wants to visit a streaming media provider. At that point the provider routes the user through an additional IP address “5.6.7.8” from an ISP like “British Telecom”. This is the exit node. And this is the IP address that looks like a residential IP address. 

Furthermore, if the “Big Name” VPN user leaves the U.K. server and chooses a U.S. server from the “Big Name” VPN provider, that IP address is “9.10.11.12” and it belongs to a hosting provider, such as “Linode LLC”.  This is the entrance node. If the user connects to a media streaming service, they get routed through “13.14.15.16 ” which belongs to an ISP “Comcast Cable”. This is the exit node and this is also another residential IP address. 

It’s also a good example of the challenges it poses to companies that offer services to that user. Once upon a time, security teams could reasonably assume that an IP address associated with a proxy was a bad actor who should be blocked from accessing their networks or services or a bot performing a malicious action. But we see in this example that a home user can be associated with a proxy. If you’re a streaming media company, do you still block this home user, who may be a paying customer? 

The Bottom Line

What does this mean for security teams? You can identify an IP address as a threat vector and block it, but that is no assurance that you’ve stopped the bad actor. That actor can simply access and use another IP address to attack your network. This is when the process of blocking certain entities can begin to look like a game of whack-a-mole. 

The Digital Element Difference:

We deploy multiple strategies to help security professionals to stay on top of threat vectors. 

First, we identify which IP blocks are static and which are dynamic using proprietary methodologies. Additionally, we use several different applications, each with its own methodology, to identify the IP addresses that are currently being used as proxies. 

Importantly, we also see the volume and frequency of both static and dynamic IP addresses that are tied to VPNs. We can verify that dynamic IPs tied to VPNs remain predominantly in the Hosting space, even as VPN providers are actively moving into static IP space.

Given the dynamic nature of the space, we also have a very robust aging mechanism to ensure that we don’t label an IP address as a proxy longer than we should. This aging mechanism also runs 24/7.

Up Next: In our fifth and final myth of this series, we’ll talk about the pitfalls of relying only on geolocation datasets, and explain why blocking an entire geographic region isn’t always in your best interest.

Trick or Treat? How the Explosion in VPN Usage Impacts Cybersecurity

VPN usage exploded during the pandemic, as consumers sought ways to hide their location so that they could circumvent geographical restrictions to content. Consumers face no difficulty in finding a VPN service provider, as a plethora of free and paid residential proxy services have entered the market.

Some of these VPN services are favored by nefarious actors because the service offers features that allow them to mask their malicious activities, including scraping, scanning and network password testing. The FBI has warned that cyber criminals are exploiting home VPN usage to break into corporate systems.

As a result of this surge in the VPN market, it’s essential that security professionals gain a deep understanding of the VPN market so they can properly protect data and network assets. Knowing which VPN providers promise criminal-friendly services can help you make important decisions about the traffic that can access your network, and set policies to keep nefarious actors at bay.

Organizations Need Granular Detail Around VPN Traffic, Usage, and Intent

Earlier this year we introduced, Nodify, a threat intelligence solution that identifies whether inbound or outbound traffic is tied to a VPN, proxy, or a darknet. Nodify provides security professionals with a wealth of context around VPN providers to help you distinguish legitimate users from bad actors.

Recently we’ve made important updates to Nodify, making it the most extensive VPN detection system available. The notable updates are:

  • Higher Frequency: With proxy IPS and VPNs changing rapidly, Nodify data is collected on an hourly basis and provides customers with a daily update on usage.
  • Deeper Insights: Going beyond the generic VPN collection, Nodify provides users with critical insights into the VPN user, including services provided by the VPN provider such as “no logging,” “multihop,” and “corporate.” These fields help clients determine the good vs the bad based on their use case.
  • Ease of Use: Nodify has a user interface that allows clients to quickly get a complete understanding of any VPN provider through a simple web dashboard.

Treat Yourself to Our Cybersecurity Brief Today

We recently published a cybersecurity brief, “The Need for Proxy/VPN Data in Today’s Heightened Cybersecurity State” which is available for download today.

Created to help security professionals understand and respond to the surge in VPN providers and usage, this brief describes the new classes of VPNs that have emerged during the pandemic, how they exploit consumer usage, and the unique risks they pose to corporate systems.

It also provides concrete steps that security teams can take to protect their networks proactively using Nodify insights.

Download “The Need for Proxy/VPN Data in Today’s Heightened Cybersecurity State” today.

 

VPN Detection Myth Series: Myth Three – Covering the Top Ten VPN Services is Sufficient

A Five-Part Blog Series to Bust the Myths Surrounding VPN Intelligence Data

In this five-part blog series, we tackle the questions our customers ask us, with a goal of busting the myths that are driving those questions. In our first blog post of the series, we dispelled the myth that all VPN-driven data is the same. For Part Two, we addressed the myth that VPN breadth doesn’t matter.

In this blog post we take on the myth that corporate security and IT teams only need to worry about the ability to detect and screen the VPN services included in a Top Ten list they’ve found online. But as you’ll see, there are flaws to this strategy.

VPN usage continues its upward trajectory. Today nearly one in every three people worldwide use one, making VPNs one of the most popular pieces of consumer software. Among the biggest reasons people use VPNs are security (43%), streaming (26%), and privacy (12%).

As any IT professional knows, the increased popularity means increased risk. VPNs have been popular tools for cybercriminals, who use them to obfuscate their original location, circumvent firewall blocks or even deep packet inspection, among other things. Once a nefarious actor has breached a network through a compromised device, such as the work PC of a remote worker, the entire network is at risk. In January of this year, police in Europe shut down VPNLab, a VPN service that cybercriminals used to distribute malware and ransomware to over 100 businesses throughout the continent. These cybercriminals were able to avoid detection tools because the VPN encrypted the traffic to the endpoint.

For publishers, people using VPNs for streaming may often be circumventing digital rights management rules put in place to prevent piracy from siphoning off revenues. In fact, piracy is expected to skyrocket as inflation and subscription fatigue collide. Content owners and operators are fighting to protect intellectual property, and are finding that fighting piracy and protecting content assets is coming down to a cybersecurity issue within their organizations.

These are not idle concerns. Naturally, corporate security teams are keen to understand the VPN market better, including which services are favored by bad actors and which are more benign. It’s a topic we’re asked about frequently, and are happy to provide our clients with the insight and tools they need to make smart decisions regarding who can access their networks, who should be flagged for additional authentication, and who should be blocked altogether.

Myth #3: Covering the top Ten VPN sites provides sufficient protection.

Fact:

Google “Top Ten VPN sites” and you’ll get a plethora of results. In fact, Google returned 53 million results in less than one second. Some of the Top Ten lists are created by well known entities, such as Forbes, Security.org and CNET, while others, like Top10VPN.com, should raise alarm bells.

But even if the source is reputable, should you trust its analysis? Take the Forbes list, which analyzed VPNs for the key features that Forbes editors value, namely cost and number of servers worldwide. The top VPN selected, Private Internet Access, was chosen because it “strikes a perfect balance of pricing, features, and usability.” To their credit, Forbes notes that some security teams are uncomfortable with its “checkered past.”

We at Digital Element are uncomfortable with the whole notion of a Top Ten VPN list, and the advice it delivers. How many VPNs were analyzed to begin with? How were they selected? In the case of Forbes, that data is absent from its report.

In its The Best VPN of 2022 list, Security.org tells readers that its security experts analyzed  “dozens” of VPNs, to determine which are the best. How many dozen? And why were they selected? If a VPN wasn’t analyzed, can we assume it’s safe? How should the security team treat traffic that comes through those unanalyzed VPNs?

This is the challenge with relying on Top Ten VPN lists. On the whole they are a meaningless metric for a variety of reasons, all of which are well worth exploring. For starters, there are way more than 10 VPN services in the world today. In fact, there are way more than dozens of services. There are literally thousands of existing services, with new entrances occurring daily.  In such an environment, how can anyone claim which ones ought to be included in a list of Top Ten? From our take, the most popular VPNs in the Top Ten lists are affiliate links that pay the person promoting the VPN. You can see in this list, the commissions for a sale. There is quite a lot of money in it. It’s no wonder so many people promote them.

Second, some VPNs are more concerning to specific industries than others. If you’re a company that streams copyright-protected content to subscribers, the commercial VPNs are more relevant to you than corporate VPNs. Many of the VPNs boast the ability to circumvent digital rights access parameters, which is a direct threat to your business. Consequently, your list of Top Ten VPNs will be based on a different set of criteria than a global retailer’s.

Third, the lists themselves are very suspect. While there are thousands of VPN services, many are owned by the same set of parent companies. For instance, 105 separate VPN services are owned by just 24 companies. As it happens, the VPN parent companies also own the review sites, which means they’re essentially grading their own homework.  Kape Technologies owns multiple VPN services, including ExpressVPN, CyberGhost, Private Internet Access, as well as a collection of VPN review sites. There is an obvious conflict of interest between owning a service and writing its review.

This is a significant issue in the VPN space. In fact, U.S. lawmakers recently asked the Federal Trade Commission (FTC) to examine the promises VPN service providers offer consumers, as a study revealed that 75% of them make exaggerated or outright false claims about the level of protection and privacy consumers can expect.

The Digital Element Difference

Digital Element has a policy to review and classify all new VPN services as they emerge. We also monitor more than ten — or even dozens of VPN services. Currently, we monitor 361 VPNs, 56 proxies, and two darknets, which we’ve identified through mapping out the entire provider network and identifying darknet nodes.

We go beyond determining if a service is a VPN or proxy, we also go to the source of where those VPNs exist. We also provide contextual information about the VPN provider itself, a feature that is unique to Digital Element.

For instance, we provide nearly 20 fields about the provider, ranging from ID, Provider, Site URL and whether it’s a paid or free service, to location and whether it accepts crypto payment.

The rich detail we provide allows security teams to establish best practices for VPN traffic. For instance, you may opt to ban all users who use a VPN that has no paper trail, accepts payment in crypto or located in a region of the world where you have no customers, offices or employees.

Next Up: VPN threat vectors originate from common sources and remain static. Or do they? We’ll dig deeper and report on what our proprietary technologies reveal.

Kicking off Cybersecurity Awareness Month Like a Champ

Did you know that October is Cybersecurity Awareness month? We have answered the National Cybersecurity Alliance’s call for cybersecurity champions, because we share the Alliance’s dedication to promoting a safer, more secure and more trusted internet.

Founded in 2004, Cybersecurity Awareness Month, is the world’s foremost initiative aimed at promoting cybersecurity awareness and best practices. Led by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA), Cybersecurity Awareness month is a collaborative effort between government and industry to raise cybersecurity awareness nationally and internationally.

A 24/7 Mission for Digital Element

It’s important to note that our dedication to cybersecurity isn’t limited to the month of October. Everyday we help security teams across the globe protect their networks against cybersecurity threats and attacks.

Moreover, we work continuously in developing new tools and relationships so that we can provide security teams with more data, insights and tools they need to keep their network and customer data secure. For instance, we recently announced enhancements to Nodify, our threat intelligence solution which provides critical context surrounding VPN traffic, enabling cybersecurity teams to understand the level of threat such traffic poses, as well as set policy around that traffic.

Education is critical to achieving our mission, and in that vein, our employees, recognized domain experts in the field, share their insights on emerging trends and security strategies by authoring white papers, presentations and articles for the benefit of the cybersecurity commission.

In the spirit of raising awareness around cybersecurity, we’ve collected some educational materials for you to access, including:

Cybersecurity is all of our concern, and we all play a role in promoting a safer, more secure and trusted internet. Together we can achieve those goals.

About Cybersecurity Awareness Month

Cybersecurity Awareness Month is designed to engage and educate public- and private-sector partners through events and initiatives with the goal of raising awareness about cybersecurity to increase the resiliency of the nation in the event of a cyber incident. Since the Presidential proclamation establishing Cybersecurity Awareness Month in 2004, the initiative has been formally recognized by Congress, federal, state and local governments and leaders from industry and academia. This united effort is necessary to maintain a cyberspace that is safer and more resilient and remains a source of tremendous opportunity and growth for years to come. For more information, visit staysafeonline.org/cybersecurity-awareness-month/ 

VPN Detection Myth Series: Myth Two – VPN Breadth Doesn’t Matter

A Five-Part Blog Series to Bust the Myths Surrounding VPN Intelligence Data

No trend deserves the corporate security team’s attention more than the explosion of VPN usage, as well as the influx of VPN providers to the market.

The numbers speak for themselves:

  • By 2027, the total VPN market may reach $92.6 billion.
  • Consumers will contribute to the growth; per IDC, the market for consumer VPNs will double in size, reaching $834 million by 2024.

Countless people will attempt to access corporate systems and websites via a VPN service, forcing security teams to make decisions as to which are legitimate, which are suspect, and which are likely to have nefarious intentions.

In our first blog post of the series, we dispelled the myth that all VPN-driven data is the same. In this post we take on the myth that VPN breadth doesn’t matter.

Myth #2: VPN breadth doesn’t matter. Once you know the entrance IP addresses you have the VPN covered.

Fact: Google “VPN providers” and you’ll see plenty of Top 10 or Top 25 lists, few of which contain the exact same providers. How many VPN services are there exactly? It’s a difficult question to answer, but it’s probably somewhere in the thousands. With that many providers, breadth absolutely matters!

Let’s start with some basics. Not all VPN services are the same. Broadly speaking, there are four main types:

1. Commercial VPN aka Personal VPN

This is a service that’s geared to individual or personal use rather than business use. Personal VPNs are used to protect a home or office computers and devices from external attacks. They’re also used to circumvent geography-based restrictions to content. These can be used on mobile devices, laptops, and home routers.

2. Corporate VPN aka Remote Access

This is a service that allows employees who work remotely to access and use their employers’ corporate data, systems and applications. All traffic between the user and the corporate network is encrypted.

3. Private Relay

This is designed to enable privacy for an individual without allowing them to circumvent geography-based restrictions. The goal of these types of VPNs is to encrypt network traffic to prevent data snooping.

4. Site-to-Site VPN

This is a connection between two or more networks, such as a network within a corporate HQ and one in a local branch office.

 Complicating matters further, VPN infrastructure can be quite broad with numerous entry and exit points that change frequently.  For instance, a commercial VPN service allows a user to enter the VPN via a US-based IP address and exit it via an IP address that’s located in another country. This allows the user to bypass any geo-restriction policies — an action that you will miss if you have just the US-based point of entry IP address.

Keep in mind that there are many free and low-cost commercial VPN services on the market that offer simple interfaces that allow users to change the location of their IP addresses quickly and easily. In fact, many services offer this functionality as a key selling point.

This means that an employee can also use a personal VPN service from within your corporate campus to circumvent your internal company policies, such as one that bans streaming videos while in the office. Worse, a VPN can be used to exfiltrate internal data outside of the network — an event that security tools can’t always detect.

The bottom line: One IP data point — either the entrance or exit point — is like one hand clapping.

The Digital Element Difference: We are an IP address intelligence data provider that tracks both entrance and exit points of your traffic, which means we are the only company that can eliminate these blindspots for you.

Our breadth of data provides the context you need to protect your corporate network by establishing and implementing best practices about VPN traffic.

Next up: The common myth that covering the top 10 VPN sites provides sufficient protection. We look forward to giving you the whole story on this.

VPN Detection Myth Series: Myth One – All VPN-driven Data is the Same.

A Five-Part Blog Series to Bust the Myths Surrounding VPN Intelligence Data

It’s no secret that VPN usage is exploding. Driven by the pandemic and lockdown orders, consumers everywhere signed up for a VPN service in order to access content that was otherwise off limits to them. Others were keen to secure their privacy.

Today, some 1.6 billion people — about 31% of the world’s Internet users — rely on a VPN to surf the web and access apps anonymously.

That enormous pool of users is an irresistible draw for entrepreneurs, investors, consumers and nefarious actors who see an opportunity to cash in on the trend. There are thousands of VPN services (though most are owned by the same subset of parent companies). Obviously, a great deal of VPN usage is benign, but not all of it. For instance, the credentials of 21 million VPN users were stolen from just three VPN apps, SuperVPN, GeckoVPN and ChatVPN, and are now up for sale on the dark web.

Residential users aren’t the only victims, as the FBI has warned that cyber criminals are exploiting home VPN usage to break into corporate systems. Meanwhile, streaming companies and compliance teams have seen VPN users circumvent their geographical rights management and digital rights restrictions.

The crimes are both serious and costly given that many VPN providers are happy to turn a blind eye to the activities of their users, providing them with a gateway for a range of malicious activities, including scraping, scanning and testing passwords in order to access your network.

Today, corporate security and compliance teams must navigate treacherous waters. With remote and hybrid work models a permanent fixture, employees sign into their workspaces via the corporate VPN by day, and their personal VPN by night, exposing the company’s systems to unprecedented risk.

Security and compliance teams feel a tremendous urgency to get a handle on the VPN market so they can make smart decisions about which VPN traffic to allow, which to investigate, and which to ban altogether. To make those distinctions, however, they need context and insight. VPN intelligence data is essential. But not all VPN data is equally valuable; critical differences exist, and those differences can spell the difference between a hack that is cauterized quickly, and one that makes national headlines.

There are many myths about VPN data. In this five-part blog series, we examine those myths one at a time. First up: the myth that all VPN-driven data is the same.

Fact: No, Not All VPN-Driven Data is the Same

Too often we hear that “all VPN-driven data is the same.” The differences begin with where the data originates — the VPN provider itself — and its intentions when offering a service to the market.

For instance, some VPN services are built for securing an organization (e.g. Zero-Trust Gateways), while some are privacy focused (e.g. Google VPN). Some allow the user to determine his or her exit destination to circumvent restrictions (e.g. NordVPN) in order to bypass digital rights restrictions. This means that each and every traffic source must be evaluated in its own right to determine which is safe, potentially suspect, or outright nefarious.

Additionally, the breadth of data can vary from provider to provider. A lot of VPN intelligence data providers get their data from a limited scope of sources, such as gambling apps. This is a huge problem because it misses vast swaths of VPN usage. For instance, schools and universities require students to use their VPN to register for classes or pay their tuition. None of this traffic will be covered by a service that relies on limited sources for their main source of data.

Millions of people who are not gamblers sign up for a VPN service in order to circumvent digital access rights so that they can stream content outside of their geo-location (e.g. stream The Office via UK Netflix rather than pay for a Peacock TV subscription).

And there are corporate VPNs which convolutes things. Let’s say an employee is at her desk researching products for her job via your corporate VPN. When she visits a website outside your network, she will appear to that website as an unknown actor hiding behind a VPN. Is she a legitimate customer or a competitor seeking to steal company secrets? To make that determination, the security team for that website will need more context around your VPN itself, such as the company name, provider URL, and so on.

Here’s another example for why context is critical: you may consider all VPN traffic originating in Russia as suspect and block it automatically. But what if you have employees (or students, if you’re a university) traveling there for work or a study abroad program? You may block legitimate people from accessing your network based on broad brushstrokes.

The Bottom Line

There is no one “best source” of data to protect business interests. The datasets that are right for your industry depends on your sector, geo-location, users, employees, and a host of other factors. There is no one-size-fits-all.

The Digital Element Difference: We don’t rely on a single source for our IP address intelligence data. Rather, we tap into multiple sources to ensure we have no gaps. And importantly, we distinguish between different types of VPN traffic and provide context around each VPN to help security teams understand the user behind the traffic.

Our breadth of data provides the context you need to investigate and contain breaches, enforce digital rights management, as well as establish and implement best practices about VPN traffic.

Next up: The common myth that VPN breadth doesn’t matter. Once you have one IP, you have the VPN covered. We look forward to getting the facts straight on this one.

Proxy and VPN Data Enhances Cybersecurity Effectiveness

Today’s enterprise IT professionals are navigating a challenging cybersecurity environment. In many ways, the problem’s scope is stunning and alarming. For instance, ransomware attacks increased by 151 percent year-over-year in 2021, while phishing scams increased by 440 percent in a single month.

The escalating attacks come with a price. According to IBM’s Cost of a Data Breach Report 2023, the average cost of a data breach in 2023 was USD $4.45 million, a 2.3% increase from 2022’s cost of $4.35 million.

As a result, companies are increasing their cybersecurity investment, fortifying their defensive postures to avoid the financial expense, reputational damage, and productivity loss that inevitably follows a cybersecurity incident.

In the process, cybersecurity leaders and organizational decision-makers face difficult decisions as they allocate resources, invest in new solutions, and support their personnel. This is especially challenging as threat actors display remarkable agility, exploiting novel vulnerabilities and harnessing the latest technologies to wreak havoc on a company’s digital infrastructure.

However, by evaluating the latest technology trends, companies can get ahead of the next threats.

New Technologies Introduce New Threats

New technologies invite threat actors to invoke fresh tactics when launching ransomware attacks, infiltrating company networks, or illegally occupying consumer accounts. In a pandemic-stricken environment, many are leveraging camouflage techniques that allow them to operate anonymously from anywhere in the world.

Most prominently, virtual private networks (VPNs), proxy servers, queue networks, and domain name systems (DNSs) allow threat actors to operate with nearly total anonymity.

At the same time, many organizations have made VPNs, encrypted connections over the internet from a device to a network–through a single IP address, available to the employees, providing expanded access to company IT from anywhere in the world. Collectively, companies deploy VPNs for several reasons, including:

  • Ensuring general security, such as avoiding identity theft
  • Minimizing privacy concerns, such as securing personal data
  • Mitigating information exposure from public WiFi
  • Accommodating job-specific requirements

Meanwhile, more than half of VPN users rely on the technology to access region-restricted content from streaming services and digital platforms. Unfortunately, many users are downloading free VPN software to access this region-restricted content, and they’ve unknowingly had their residential IPs hijacked by these VPN providers.

When consumers download and sign up for a free commercial VPN, many agree to give the VPN provider the right to use their IP address in the entire proxy pool for routing purposes. While this clause is often hidden in the Terms of Service, it can have significant implications for cybersecurity.

Threat actors have found proxies to be an effective way to masquerade their malicious activity. Companies can’t prevent VPN users from accessing the internet, but this practice increases the risk of labeling customers or employees as threat actors while failing to detect or discover the root of cybercrime.

Incorporating IP Data for Protection

Simply put, it’s evident that companies need to develop the capacity to separate threat actors from genuine users. The ability to identify threat actors operating through a proxy enables companies to flag potential criminal activities, set protocols for handling this type of “non-human” traffic, and review post-action analytics.

By incorporating proxy and VPN data on the front-end of online security measures, companies can automatically flag IP addresses as suspicious and reject or block the incoming IP from connecting to their service, website, or network. In addition, proxy data can trigger variable fraud alerts that enable companies to differentiate authentic traffic from fraudulent activity more effectively.

Most importantly, success is predicated on data quality. Information reliability can vary significantly among data sources, but the most accurate proxy data providers ensure that this information is constantly updated and originates from excellent sources. The cybersecurity implications are far-reaching, including:

  • Government agencies can use IP-based VPN data to filter and identify safe VPNs.
  • Financial services and eCommerce platforms can incorporate proxy and VPN data to implement smart rules to verify consumer IP addresses automatically.
  • Managed security service providers can use proxy and VPN data as a foundational, front-line layer of fraud prevention and security enhancement.

To thrive in a shifting cybersecurity landscape, companies must continually equip themselves with the data and tools to protect their digital assets. Developing the capacity to analyze and respond to high-quality proxy and VPN data strips threat actors of their anonymity, making it one cybersecurity strategy that companies can’t ignore in the year ahead.

To get more information about using IP data to solve cybersecurity challenges for your organization, access our guide, “The Need for Proxy/VPN Data in Today’s Heightened Cybersecurity State” here.

Digital Element’s IP Data to Help Tackle Global Challenges

On November 18, Digital Element’s parent company Digital Envoy announced a new initiative that enables non-profits and research-based organizations to leverage location data to help make the world a better place in material ways. The new program, Data for Impact, aims to identify opportunities where aggregated global location data can have a positive impact on humanitarian, economic and global events.

Digital Element’s IP geolocation data will play an important role in this initiative, giving non-profit and research-based organizations greater certainty in leveraging high-quality, privacy-conscious IP and geolocation data to solve real-world problems. Our precise, real-time geolocation data compliments data from our sister company, Outlogic, to enable program partners to have a powerful social impact where it is most needed.

Using Data to Solve Real Challenges
We believe that if we can make a difference in people’s lives, then we are obligated to do so. In that spirit, Digital Envoy will make its data available to experts who can use it tackle humanity’s most difficult challenges, including:

  • Protecting human rights: The Data for Impact program will actively provide data and information vital in stopping human trafficking and promoting fundamental human rights.
  • Navigating nature: Information from heat maps has the ability to provide vital data in the case of natural disasters and global pandemics. Of note, this type of information has already produced a groundbreaking study on improving evacuation routes in advance of a natural disaster and on analysis regarding whether preventive COVID-19 measures are working and how the virus may spread.
  • Shedding light around economic uncertainty: Public policy, infrastructure and services are heavily dependent on data. The Data for Impact program will be working with organizations to identify new opportunities that can provide more effective sector and program prioritization, design, implementation, monitoring, and evaluation.

Some of the initial Data for Impact program partners include the COVID Alliance, MIT and The World Bank. We are proud of the material gains our data has already provided, and look forward to working with worthy organizations in the future.

Have a Need?
If you represent an organization, or know someone who does, that would benefit from the Data for Impact program, please get in touch with Jake Ellenburg, Vice President of Communications at Digital Envoy, parent company of Digital Element.

7 Tips for Improving Your Marketing with IP Data

This is an uncertain time for marketers. Apple and Mozilla have blocked third-party tracking in their browsers, and Google has announced plans to follow suit. What does this mean for the future of data-driven marketing? Will you have the tools to home in on your exact audience and to measure campaign success?

The answer is a resounding yes for a simple reason: Not all data stems from third-party cookies. For instance, ubiquitous and persistent, IP data is highly valuable to marketers, and can be leveraged to improve targeting, assess inventory quality (e.g. detect fraudulent impressions), drive campaign performance, and attribute business outcomes to specific channels.

And when used in conjunction with your first-party data or other privacy-compliant data sets, IP data provides rich profiles of users at a very granular level.

Here are seven tips for leveraging IP data to enhance your initiatives as we move forward into a privacy-centric world.

Tip #1: Make data a priority at your organization/build a data-driven culture

Data will always be the key to better understanding who your prospects and customers are, segmenting them into distinct personas, as well as gaining insight into their customer journeys.

IP data is especially helpful in improving targeting, attribution, and analysis while complying with existing and emerging privacy regulations. For instance, you can leverage IP addresses to uncover quite a bit of insight about your audiences, including their geolocation (country, city, postal code), whether they’re a home or business user, if their IP is associated with a suspicious proxy connection, their business name, and more.

These data points will help you ensure you’re targeting the right audience, as well as assess the markets that deliver the most success for your campaign and products.

Tip #2: Discuss your company’s objectives to determine the type of data you’ll need to meet them

The types of data you’ll need for your marketing initiatives and advertising campaigns will be driven by your company’s key objectives. For instance, if your goal is to verify that your advertising spend reached real humans and not bots, you’ll need to analyze geolocation data and other parameters so that you can detect fraudulent ad clicks. If your goal is to verify ad quality, you’ll need to audit ad clicks to ensure ads were served to the correct segment.

Specific datasets are available to help you hone a variety of use cases, from improving the customer experience with localized content, to better understanding the customer experience so you can refine your operations.

Tip #3: Examine which data you currently collect and integrate (or not) to identify gaps that need filling

Most companies have been building their pools of first-party data gathered from multiple customer touchpoints, including their websites, social media, campaign landing pages, customer care portal and so on. While these touchpoints provide a plethora of data, they don’t always provide the full context you need. If you’re not also leveraging IP data you will inevitably confront gaps in your insights, which can negatively affect your initiatives.

IP data enables you to:

  • Gain detailed and nuanced insights that you can deploy to improve campaign metrics. For instance, you can target audiences by geolocation and other data to improve results. Let’s say you’re a brick-and-mortar store and your campaign goal is to drive in-store foot traffic. IP data lets you answer the question: what is the optimal distance from an outlet to encourage in-store visits by new customers?
  • Create hyper-localized segments for targeting and analysis purposes. Based on real-time results, you can optimize your campaign criteria to drive conversions and efficiency in media spend (i.e. focus on the channels and day parts that deliver the highest engagement).
  • Manage distribution of online content, ensuring that licensing and agreements are adhered to, and that the right customer or prospect is always presented with the right content.

These are just a few of the ways that IP data can be deployed; there are many others.

Tip #4: Determine breadth and depth of the datasets needed

IP data is highly varied and provides you with many options. The breadth and depth of the datasets you’ll need will be driven by your business needs. Some of your available options include:

VPN & Proxy IdentificationThis data helps you to detect and prevent malicious IP address masking, and enables greater control over the distribution of your digital content.
Carrier DataThis data enables stronger targeting of mobile users based on ISP, mobile carrier, mobile country code, and mobile network code information.
Additional Insights from Extended DatabasesThese datasets provide a wealth of insight into users, and their likely interest in a product at a specific moment in time. For instance, a user may have little interest in a CPG product while at the office, but a keen interest while at home. 

These extended databases include:

  • Autonomous System Number (i.e. routing prefixes)

  • Demographics

  • Language

  • Time Zone

  • Domain Name

  • Organization Name

  • SIC/NAICS Codes

  • Home/Business types

  • Core Based Statistical Area (CBSA)

Location DataLocation data helps you make strategic decisions in the online world. For example, it affects the way you price and promote your products; it shapes the way you reach out to your target audiences; it is used to analyze the attributes of consumers within a particular area; and it places restrictions on the way you conduct business due to laws and regulations in a given area.

Tip # 5: Evaluate whether or not you need to bring in a data partner

The best way to assess whether or not you need a data partner is to ask yourself very specific questions:

  • Do you have access to the full range of data that you’ll need to:
  • Deliver highly localized content
  • Verify ad spend
  • Optimize advertising yield
  • Perform robust analytics
  • Ensure legal compliance
  • Prevent fraud and enhance security
  • Network routing to optimize content delivery
  • And more…

Does your team understand all of the use cases and potential applications of the data?

If you’ve answered no to any of these questions, it’s likely you will need a data partner.

Tip #6: Conduct due diligence on data partner in terms of data quality, accuracy, reliability, updates, customer support, and ease of deployment

The goal of due diligence is to whittle down potential vendors to consider. You can conduct quite a bit of your due diligence prior to contacting any vendors.

Ultimately, you want a partner who is an established industry leader, deploys unparalleled data collection practices, excellent methodologies for classifications, and has formed strategic partnerships with external or third-party data providers to enhance the data.

When conducting due diligence, ask:

  • What industry firsts (i.e. innovations) can the company claim? You want a data provider that’s a pioneer in the industry, and can respond to emerging trends and opportunities in time to provide you with a competitive advantage.
  • Do they hold patents? Patents are a sign that the company has a culture of innovation, and it means you’ll get access to high-quality, trusted data
  • What is the breadth of the data? Is it global? Digital Element is the only provider that has accurate, global postcode-level coverage, as well as zip+4 in the U.S. The benefit of digital targeting is that it allows you to home in on your entire audience, but you can’t do that without access to accurate data on a global scale.
  • Is this company the “gold standard” of its sector? You want to partner with the best quality, most forward-thinking data provider as you move forward in the privacy-centric world.

Tip #7: Vet vendors

At the end of your due diligence process you’ll have a list of vendors under consideration. Now it’s time to vet them so that you can make the best decision for your needs.

Proper vetting requires you to ask very specific questions, as the results of your initiatives will only be as good as the quality of the data you use.

Specific questions to ask include:

  • How do you collect data? Is it anonymous and inherently privacy compliant? Do you collect PII data that must ultimately be scrubbed out? Do you store personal data?
  • How often is your data refreshed? There’s no sense in targeting users who’ve already converted or sent signals they’re not interested in an advertised product or service. For this reason, Digital Element’s data is updated 24/7 and released weekly.
  • How is your data validated?
  • How accurate is your data in terms of percentage of audience?
  • How easily can your data be deployed? Will my company be able to integrate it into our systems quickly and easily?
  • Are you willing to collaborate with us? Answer questions for our clients?

The world of data is changing for marketers, but in many ways, it is changing for the better. With the right partner, and the right datasets, marketers can thrive and win new customers in the emerging privacy-centric environment.

Data Will Continue to Be a Driving Force into an Uncertain 2021

Needless to say, as the pandemic unfolded around the world, companies had to pivot their business models and consumers had to re-prioritize how they engaged with their favorite brands. These seismic shifts introduced many unanticipated changes for marketers still tasked with promoting their organization’s products and services under a darkening cloud.

“Marketing in uncertain times” became their mantra.

While the coronavirus drove many of the marketing and data trends we saw in 2020, there were several others that unfolded—ones which we discussed here on the “Elemental Knowledge” blog throughout the year:

While the good news of COVID-19 vaccines will help jettison us into the new year with renewed hope, the stark reality is that marketers will still need to navigate an uncertain 2021 where the economy probably won’t find its footing until mid-year and businesses such as restaurants and brick-and-mortar retailers as well as those in the travel and hospitality industry will struggle to stay above water.

While it remains difficult to predict what exactly the immediate future holds for marketers, here’s what we foresee—for now—in 2021:

The Democratization of Omni-Channel Commerce Will―Finally―Occur: Every retailer will need to be able to sell online. The democratization of this capability will come from key tech companies that will become more of a monopoly/oligopoly. Therefore, many key marketing capabilities will see tremendous improvements such as targeting the right shopper through massive amounts of new information being fed to algorithms.

More Companies Will Scale the Wall: More medium- to large-sized non-walled garden companies will have the same benefits that come from hyper-targeting capabilities that only walled garden companies (Google, Facebook, Netflix, etc.) have enjoyed until now, due to more data being available on consumer patterns generated from digital commerce, and further sharing of data through data clean rooms. Data clean rooms will become the norm rather than the exception as companies will try to cobble together clean data to get deeper insights on consumers (IP addresses, HEM technology, etc.).

Data Privacy? Yep. Will Be an Even Bigger Deal: Consumers will demand―and be given―more and more control over what data they share and how it’s used. However, with the COVID hangover more than likely lingering well into the new year, we’ll see more consumers with fewer negative reactions to being hyper-targeted with marketing and advertising messages. Ad targeting will begin to deliver on value to both marketers and consumers.

IP Data is Going to Skyrocket in Value: Considering all of the privacy discussions in the market today, especially around the demise of cookies, the data that is non-invasively gleaned from an IP address will become more relevant than ever. It’s a proven technology that will be used for a variety of business applications outside of ad targeting, including but not limited to legal/regulatory compliance, network routing, analytics and fraud/security.

We expect 2021 to continue to be a bit of a roller-coaster ride: formidable in terms of the pandemic’s impacts continuing to wear on both businesses and consumers alike, but exciting in terms of seeing light at the end of the tunnel where our economies gradually open back up and return to some semblance of normal. The most agile marketers will evolve to take advantage of the opportunities ahead of them—using data, technology, new processes and analytics in tandem to create value for their organizations.