“With 15 billion video views powered by Cedato each month, we are a critical lifeline for many publishers and ad platforms. As such we have an obligation to stay on top of any disruptions that may occur in our system.” Yair Miranda, COO Cedato
NEW YORK (PRWEB) September 06, 2018
Cedato, the leading programmatic operating system for video, today announces its partnership with cyber security company, Playleaks, adding a new integration with its ad verification solution. The new partnership creates a unique, automated protective layer that ensures an efficient, malware-resistant transaction chain.
For publishers, programmatic processes such as video header bidding, marketplace and open exchange transactions increase the exposure to suspicious activity as they enable access to multiple unverified demand partners, where some non-authenticated ad sources may be introduced. Though programmatic transactioning has greatly improved yield optimization for publishers, it has also increased their risk and exposure to programmatic ailments such as malicious ads, bad ads and ads that degrade user experience. Such implications as well as the blatant exploitation of user and publisher resources, threaten to negatively affect the publisher’s loading time and brand.
Playleaks brings to the industry a unique expertise in identifying suspicious digital behaviors within complex programmatic video campaigns. The technology, powered by artificial intelligence pattern recognition capabilities, is able to automatically pinpoint any breach on the protocol or script level, anywhere in the demand chain. Once a breach is identified, the responsible demand source is automatically disabled and blocked by Cedato, allowing for a seamless process, free of interruptions attributed to malware.
As part of this automated process, the Playleaks ad security platform generates a surgical analysis of the demand chain by mapping out the entire path including all of the demand sources propagating from the chain of calls. Such demand sources are usually not visible to the publisher. In the event of suspicious activity, the Playleaks technology identifies and isolates the specific demand source responsible for it in real-time, thereby eliminating the offensive demand chain.
“With 15 billion video views powered by Cedato each month, we are a critical lifeline for many publishers and ad platforms. As such we have an obligation to stay on top of any disruptions that may occur in our system,” said Yair Miranda, COO of Cedato, “Playleaks has demonstrated capabilities on several crucial occasions that enabled our customers to carry on their business, uninterrupted, with the issue detected and blocked in a matter of minutes.”
The Playleaks technology is integrated into the Cedato Premium Video Marketplace along with proprietary and 3rd party IVT, viewability and filtering technologies offering increased authentication and automated blocking of malicious activity. This additional protection layer is already available to Cedato and Playleaks publisher and platform customers.
“Having extensive experience in cyber security and malware detection, Playleaks was founded with the mission to create a more surgical approach to analyzing malicious ads in programmatic advertising,” said Tal Dick, CEO, Playleaks.
Cedato is a programmatic operating system for modern video, offering publishers and advertisers a comprehensive SaaS-based video technology stack, enhancing value and viewing experience. Cedato also operates one of the fastest growing private video marketplaces that powers over 15B video impressions each month over 2 million sites and apps, across mobile, web and connected TV. The company operates out of NY, Tel Aviv and Berlin, and was recognized by Frost and Sullivan and Red Herring for growth and leadership. For more information visit http://www.cedato.com or follow on Twitter at @Cedatotech
Playleaks is an ad verification solution provider designed to protect publishers and ad platforms from programmatic ailments such as malicious ads, bad ads, ads that degrade user experience and fraudulent activity originating from demand partners. The Playleaks ad security platform automatically identifies the demand source where malicious activity originates, in real time, allowing for an uninterrupted monetization flow. For more information, visit http://www.playleaks.com