Here are a few strategies you can implement.
To lower or limit your Monthly Active Users (MAUs), :
1. Limit Embedding on Public Pages: Avoid embedding Beamer on public-facing pages or pages accessible before login. Embedding Beamer only on private, post-login pages ensures you are tracking only your actual users, not casual visitors.
2. Send User IDs in Embedded Scripts: Include a user_id parameter in your embedded script. This helps Beamer identify and track “real” users more accurately, ensuring that even if the same user logs in from multiple devices, they are counted as a single user, provided the user_id remains the same. Note: For more information on how to implement this, you can check out this guide.
3. Avoid Automated Tests and Monitors: Ensure that automated tests or status monitors are not unintentionally inflating your MAUs by visiting pages where Beamer is installed. Note: If you run automated scripts then
4. Remove Beamer’s script when running tests.
5. You can also assign a consistent user_id to the “automated” user to prevent it from being counted repeatedly.
Unique Users vs Unique Loads: Unique users are counted based on user identity, not page loads. If the same user accesses your app from different devices but uses the same user_id, they will be counted as one unique user. However, without a user_id, Beamer relies on cookies to track users, which may result in counting the same user on different devices or browsers as multiple users, thereby increasing your MAU. Check out this guide to know more.
Help us help you more
At Beamer, we care about our customers’ data and this is how we protect it.
Data Ownership
Your account and data belongs to you and will not be sold in any case. We can delete your account and data upon your request. Learn more
Encryption
Beamer data is encrypted in transit (advanced TLS protocols and 2,048-bit keys or better) and at rest (using AES 256 encryption with integrity).
Access
Customer data is always backed up and uptime is over 99.9%.
GDPR
Beamer is GDPR Compliant and has the Data Processing Agreements in place. Learn more
Penetration testing
Third party network, application and physical security tests are conducted regularly. Learn more