Skip to main content

Identifying visitors

Understand how Syft identifies companies and users who visit your site.

Identifying Companies and Users

Syft uses a combination of data sources to identify the visitors on your site. Visitors can be identified with different precision and detail depending on the accuracy and coverage of these sources. Syft classifies a visitor's identity in of three categories:

  1. Identified: A visitor is fully and accurately identified with their name, title, company, and email.
  2. Suggested: A visitor has a likely identity suggested by Syft's algorithms.
  3. Anonymous: A visitor is not personally identifiable but their company (and optionally their role) is likely known.

To perfom the identification process above, Syft uses two methods.

1. Identification via De-anonymization

Unless a visitor self-identifies themselves, Syft relies on de-anonymization to identify them. De-anonymization is a process of using signals about the visitors - their IP address, browser, location, etc - to build their identity profile. Syft uses a collection of third-party data providers such (e.g. Clearbit, PDL) to accomplish this. These data providers are combined in a particular order ('waterfall') to get increased accuracy and identification rates. Syft combines de-anonymization data with first-party data sources such as CRM contacts and web tracking data to further refine the identity of the visitors.

2. Identification via First-party tracking

Syft also identifies visitors with first-party tracking data such as form fills, submissions, and email link clicks. Syft can also track logins and signups to identify and enrich users. Each of these methods of identification via first-party tracking are detailed below.

Form Capture

Syft keeps track of visitors' form fills and submissions that include an email address as an input. These are typically lead-gen or sign-up forms on your website. Syft enriches the visitor's identity from the captured email address and associates this identity with their sessions. Syft captures only the visitor's email address and name from the forms. Everything else, including sensitive fields, is ignored. Form data is captured even when the form is not submitted helping you recover leads from 'abandoned' forms.

With Personalized Links, Syft can identify visitors that come to your site by clicking through Email or Linkedin outreach messages. Syft will identify and stitch all past and future visits of a visitor from a single click-through of a personalized link.

Sign-up enrichment

Syft can also identify and enrich visitors who sign-up or login using 3rd-party services such as Google or Microsoft. This requires instrumenting your sign-up flow to identify users with their email as described in the Developer Guide.

3. Personalization for key visitors

Syft allows you to tailor the site experience for key visitors by providing access to Ideal Customer Profiles (ICPs) associated with them. Once a visitor is identified, Syft can return a list of ICPs, which can be used to customize the website experience, prioritize scheduling meetings, and enhance customer support. For detailed instructions on accessing ICPs, please refer to the Developer Guide.