Community
When I send data to Lytics my map field is being completely rewritten each time its updated.
I've tried to send data to my account in a variety of ways and each time an event is sent it is rewriting my map field entirely instead of just adding a new key to that map. What am I doing wrong?
Posted by Anonymous 1 day ago
How and where are my authoriztion credentials stored?
Lytics takes great care to securely store any tokens or authorization credentials necessary to maintain connection to up or downstream channel tools. Upon submitting any type of auth credentials, such as oAuth or key/secret, an "authorization" record is created in our account database. This contains the contextual information such as author, description, etc, as well as an encrypted copy of your credentials.
When it comes to the encryption we adhere to the Advanced Encryption Standard (AES) to ensure credentials are never surfaced in a consumable way outside of our backend system processing. Any API calls will result in returning either no credentials or an encrypted version of the credentials.
### What is AES?
AES, or Advanced Encryption Standard, is a block cipher that was selected by the U.S. National Institute of Standards and Technology (NIST) as the standard for the encryption of electronic data. AES is a symmetric cipher, which means that the same key is used for both encryption and decryption. AES is a block cipher, which means that it operates on data in blocks of 128 bits. AES has three key sizes: 128 bits, 192 bits, and 256 bits. The 128-bit key size is the most common, but the 192-bit and 256-bit key sizes are also secure.
AES is a secure algorithm because it has a large key space and a complex structure. The key space is the number of possible keys that can be used to encrypt data. The larger the key space, the more difficult it is to break the encryption. AES has a key space of 2128, which is an extremely large number. The complex structure of AES makes it difficult to find weaknesses in the algorithm.
AES has been extensively tested and has not been broken to date. It is widely used by governments, businesses, and individuals to protect sensitive data.
Posted by Mark Hayden 5 months ago
What is Identity Resolution?
What is Identity Resolution?
Posted by Sean McMahon 11 months ago
Why does Lytics sometimes show a timestamp date a day earlier than it happened?
Why does Lytics sometimes show a timestamp date a day earlier than it happened?
Posted by Lindsey Greenwood 11 months ago
Can I determine the best day or time to communicate with a user?
Can I determine the best day or time to communicate with a user?
Posted by Lindsey Greenwood 11 months ago
What kind of tooling will I get access to with Private Cloud that I will not have for other deployments?
Posted by Mark Hayden about 1 year ago
Are there additional security and/or operational benefits with the Private Instance (single tenant) environment?
Posted by Mark Hayden about 1 year ago
What are the technical and feature differences between the Private Instance (single tenant) and standard multi-tenant environments?
Posted by Mark Hayden about 1 year ago
Does each private instance (single tenant environment) get its own unique, dedicated, storage encryption key?
Posted by Mark Hayden about 1 year ago
Does Lytics do all the set-up, and configuration? Do you have partners that can do this? What resources do we need to allocate?
Posted by Mark Hayden about 1 year ago