Hosting customers are willing to pay a premium for web stats if you can give them something useful that isn’t already in Google Analytics.
Here’s what Angelfish provides:
Angelfish is secure, on-premises web analytics software – you install and manage it in your own environment, and data is kept within the confines of your network. Many of the new data privacy regulations don’t apply to Angelfish.
Hidden Visitor Tracking
This is a growing problem: some website visitors won’t show up in Google Analytics reports because they block GA tracking code. Angelfish has 6 different options for detecting website traffic, which means you can see visits in Angelfish even if GA tracking code is blocked.
Traffic Spike Analysis
Angelfish lets you select a time frame as short as a single second. If you want to see details on the visitor who filled out the contact form on your websites yesterday morning at 10:44:23 AM, Angelfish will show you all site activity that occurred during that particular second.
Google Analytics Backup Solution
Full Visitor History
Angelfish shows full details for each visitor, like usernames, IP addresses, number of logins, clickpaths, goal conversions, marketing details, custom variables, and more.
Web access logs contain a bunch of great information, like Broken Links. Angelfish tells you if the link is external or on your site, the referring page, the error page, and more.
Bandwidth & Stolen Bandwidth
It’s a fact: other websites link directly to images and other content on your website. Sometimes they’re good links from a search engine, and sometimes they’re bad links that steal your bandwidth. Angelfish shows you both.
The API is a core component of Angelfish and provides full access to the underlying data structure. With the API, you can automatically export data from Angelfish into external applications like customer portals, reporting dashboards, or hosting control panels.
Please visit our Support Center for articles and videos that explain how Angelfish works. We recommend reading the “Administrator Essentials” article: