Technical Guides

Deep, expert-led guides covering guest WiFi, analytics, captive portals, and modern venue technology. Each guide includes diagrams, worked examples, and audio podcasts.

802.1X-Authentifizierung: Sicherung des Netzwerkzugriffs auf modernen Geräten
news

802.1X-Authentifizierung: Sicherung des Netzwerkzugriffs auf modernen Geräten

This guide provides a comprehensive, actionable overview of IEEE 802.1X authentication for senior IT professionals and network architects. It details the critical steps for securing network access across diverse enterprise environments, focusing on practical, vendor-neutral deployment guidance to mitigate risk, ensure compliance, and deliver a seamless, secure user experience.

7 min read2k words
Netzwerksicherheit mit Wi-Fi 7: Ein technischer Deep Dive
news

Netzwerksicherheit mit Wi-Fi 7: Ein technischer Deep Dive

This guide provides a comprehensive technical reference on Wi-Fi 7 security features for enterprise IT teams, covering the mandatory enforcement of WPA3 encryption, the security implications of Multi-Link Operation (MLO), and the practical challenges of supporting legacy devices during migration. It equips network architects, IT managers, and CTOs at hotels, retail chains, stadiums, and public-sector organisations with actionable deployment strategies, compliance guidance aligned to PCI DSS and GDPR, and real-world case studies with measurable outcomes. Understanding these changes is critical for any organisation planning a wireless infrastructure upgrade this year, as Wi-Fi 7 represents a fundamental shift in the security baseline for enterprise wireless networks.

10 min read2k words
Gast-WiFi-Marketing: Der ultimative Leitfaden zur Lead-Generierung, Umsatzsteigerung und Optimierung der Customer Experience
gsc_gap

Gast-WiFi-Marketing: Der ultimative Leitfaden zur Lead-Generierung, Umsatzsteigerung und Optimierung der Customer Experience

This guide provides a technical deep-dive into leveraging guest WiFi for marketing, lead capture, and customer analytics. It offers actionable strategies for IT managers and venue operators to transform their WiFi from a cost centre into a powerful, ROI-driven marketing platform, covering architecture, implementation, and compliance.

5 min read1k words
dotdigital (ehemals Dotmailer): Integrationsleitfaden, Best Practices und Fehlerbehebung für Purple AI-Nutzer
gsc_gap

dotdigital (ehemals Dotmailer): Integrationsleitfaden, Best Practices und Fehlerbehebung für Purple AI-Nutzer

This guide provides Purple AI users — particularly IT managers, network architects, and CTOs at hotels, retail chains, stadiums, and conference centres — with a definitive technical reference for deploying and optimising the dotdigital (formerly Dotmailer) connector. It covers the end-to-end integration architecture, step-by-step configuration, GDPR-compliant data handling, automation programme design, and a structured troubleshooting framework. Organisations that implement this integration correctly convert guest WiFi logins into a high-value, consent-gated marketing database that drives measurable revenue outcomes.

11 min read3k words
WiFi Hotspot 2.0 (Passpoint): Der ultimative Leitfaden für nahtloses und sicheres WiFi-Roaming
gsc_gap

WiFi Hotspot 2.0 (Passpoint): Der ultimative Leitfaden für nahtloses und sicheres WiFi-Roaming

This guide provides a comprehensive technical overview of WiFi Hotspot 2.0 (Passpoint) for IT leaders. It details the technology, security benefits, and a step-by-step implementation framework for deploying seamless, secure WiFi roaming in enterprise environments like hotels, retail, and large venues, ultimately improving user experience and reducing operational overhead.

8 min read2k words
MDU-Login: Vereinfachung des WiFi-Zugangs in Wohnanlagen
gsc_gap

MDU-Login: Vereinfachung des WiFi-Zugangs in Wohnanlagen

This technical reference guide provides IT managers, network architects, and CTOs with a definitive framework for deploying and managing WiFi access in Multi-Dwelling Units (MDUs), covering the trade-offs between shared PSK, WPA3-Enterprise 802.1X, and Identity PSK (iPSK) authentication models. It addresses the core operational challenges of RF interference, security segmentation, and resident lifecycle management, and demonstrates how a managed WiFi platform such as Purple transforms connectivity from a cost centre into a measurable revenue asset. Drawing on real-world deployment scenarios and referencing standards including IEEE 802.1X, WPA3, GDPR, and PCI DSS, the guide equips venue operators with the architecture, implementation steps, and ROI metrics needed to make an informed investment decision this quarter.

10 min read2k words
Metropolitan Area Networks (MANs): Ein Deep Dive in Technologien, Anwendungen und Zukunftstrends
gsc_gap

Metropolitan Area Networks (MANs): Ein Deep Dive in Technologien, Anwendungen und Zukunftstrends

This guide provides a comprehensive technical reference on Metropolitan Area Networks (MANs) for IT leaders and network architects. It covers core technologies, deployment strategies, and business considerations for implementing high-performance, city-scale networks. The content is tailored for decision-makers in hospitality, retail, events, and public-sector organisations.

5 min read1k words
Verständnis und Härtung von RADIUS gegen MD5-Kollisionsangriffe
news

Verständnis und Härtung von RADIUS gegen MD5-Kollisionsangriffe

This guide provides a comprehensive technical reference on the RADIUS MD5 collision vulnerability (CVE-2024-3596, 'Blast-RADIUS'), explaining how man-in-the-middle attackers can exploit weaknesses in the MD5-based Response Authenticator to forge authentication approvals without knowing user credentials. It is essential reading for IT managers, network architects, and CTOs operating enterprise WiFi in hospitality, retail, events, and public-sector environments who need to assess their exposure, apply immediate mitigations, and plan a strategic migration to modern authentication standards. The guide covers the full attack lifecycle, a phased hardening roadmap, real-world deployment scenarios, and compliance implications under PCI DSS, GDPR, and ISO 27001.

9 min read2k words
Captive Portals: Ein umfassender Leitfaden für Implementierung, Anpassung und Sicherheit
gsc_gap

Captive Portals: Ein umfassender Leitfaden für Implementierung, Anpassung und Sicherheit

This guide provides IT managers, network architects, and CTOs with a definitive technical reference for deploying, customising, and securing captive wifi portals across enterprise venues including hotels, retail chains, stadiums, and public-sector facilities. It covers authentication architectures, GDPR and PCI DSS compliance obligations, threat mitigation strategies, and the advanced analytics capabilities available through Purple's enterprise WiFi intelligence platform. Organisations that implement captive portals correctly transform a basic connectivity utility into a measurable business intelligence and revenue-generation asset.

11 min read3k words
Die definitive Zeitleiste von WiFi: Von ALOHAnet bis WiFi 7 und darüber hinaus
gsc_gap

Die definitive Zeitleiste von WiFi: Von ALOHAnet bis WiFi 7 und darüber hinaus

This guide provides a definitive technical timeline of WiFi, tracing its origins from the 1971 ALOHAnet experiment through every major IEEE 802.11 standard to the ratification of WiFi 7 in 2024 and the emerging WiFi 8 roadmap. It is designed for IT managers, network architects, and CTOs who need to understand the engineering evolution of wireless technology to make informed infrastructure investment decisions. By contextualising each generation's innovations within real-world deployment scenarios across hospitality, retail, and large venues, the guide delivers actionable guidance on upgrading, securing, and future-proofing enterprise wireless networks.

7 min read2k words
Captive Portal-Lösungen: Der ultimative Leitfaden für Unternehmen jeder Größe
gsc_gap

Captive Portal-Lösungen: Der ultimative Leitfaden für Unternehmen jeder Größe

This guide provides a comprehensive technical reference for IT managers, network architects, and CTOs on deploying effective captive portal solutions. It offers actionable guidance on architecture, vendor selection, and implementation to transform a network access point into a strategic asset for data collection, customer engagement, and ROI generation.

6 min read1k words
Guest WiFi Captive Portals: Der ultimative Leitfaden zur Schaffung eines nahtlosen und sicheren Nutzererlebnisses
gsc_gap

Guest WiFi Captive Portals: Der ultimative Leitfaden zur Schaffung eines nahtlosen und sicheren Nutzererlebnisses

This guide provides IT leaders and venue operators with a comprehensive technical reference for designing, implementing, and securing guest WiFi captive portals at enterprise scale. It covers the full authentication architecture from RADIUS to CRM integration, GDPR compliance requirements, advanced customisation options including A/B testing and personalised content delivery for Purple AI users, and a proven ROI framework with real-world case studies from hospitality and retail environments.

8 min read2k words
Indoor-Wayfinding: Ein umfassender Leitfaden zu Technologien, Anwendungen und Vorteilen für Unternehmen
gsc_gap

Indoor-Wayfinding: Ein umfassender Leitfaden zu Technologien, Anwendungen und Vorteilen für Unternehmen

This guide provides a comprehensive technical overview of indoor wayfinding for IT leaders and venue operators. It details the core technologies, deployment strategies, and business benefits, offering actionable guidance for implementing a system that enhances visitor experience and delivers measurable ROI.

7 min read2k words
Entwickeln Sie Ihre eigene Captive Portal-App: Ein Leitfaden für Entwickler (mit Code-Beispielen)
gsc_gap

Entwickeln Sie Ihre eigene Captive Portal-App: Ein Leitfaden für Entwickler (mit Code-Beispielen)

This technical guide provides developers and IT leaders with a comprehensive framework for building custom captive portal applications. It covers architectural design, platform selection (iOS, Android, Web), security best practices (802.1X, GDPR), and API integration strategies to transform guest WiFi into a powerful tool for customer engagement and data analytics.

5 min read1k words
Mitarbeiter-WiFi: Ein umfassender Leitfaden für den sicheren und effizienten Netzwerkzugriff für Mitarbeiter
gsc_gap

Mitarbeiter-WiFi: Ein umfassender Leitfaden für den sicheren und effizienten Netzwerkzugriff für Mitarbeiter

A comprehensive technical reference for IT leaders on designing, deploying, and managing secure, high-performance staff WiFi networks. This guide provides actionable best practices for authentication, network segmentation, and bandwidth management to enhance operational efficiency and mitigate security risks.

7 min read2k words
Personal Area Networks (PANs): Ein umfassender Leitfaden zu Technologien, Sicherheit und Anwendungen
gsc_gap

Personal Area Networks (PANs): Ein umfassender Leitfaden zu Technologien, Sicherheit und Anwendungen

This guide provides a comprehensive technical reference on Personal Area Networks (PANs) for IT leaders and network architects. It covers the core technologies, critical security considerations for enterprise deployments, and practical implementation guidance for leveraging PANs in venues like hotels, retail, and stadiums to enhance operational efficiency and customer experience.

10 min read2k words
Captive Portal Login-Apps: Die richtige Lösung für Ihr Unternehmen wählen (Funktionen, Sicherheit und Preisgestaltung)
gsc_gap

Captive Portal Login-Apps: Die richtige Lösung für Ihr Unternehmen wählen (Funktionen, Sicherheit und Preisgestaltung)

This guide provides a comprehensive technical reference for IT leaders evaluating, deploying, and managing captive portal login solutions across enterprise venues. It covers critical features, security protocols, authentication methods, pricing models, and integration capabilities to help businesses enhance network security, ensure regulatory compliance, and maximise the ROI of their guest WiFi infrastructure.

8 min read2k words
Captive Portal Login: Fehlerbehebung häufiger Probleme und Optimierung der Nutzererfahrung
gsc_gap

Captive Portal Login: Fehlerbehebung häufiger Probleme und Optimierung der Nutzererfahrung

This authoritative technical reference guide equips IT managers, network architects, and CTOs with a comprehensive framework for diagnosing and resolving captive portal login failures, selecting the optimal authentication strategy for their venue type, and measuring portal performance against business KPIs. Drawing on real-world deployment scenarios across hospitality, retail, and public-sector environments, it covers the full lifecycle from architecture and compliance to step-by-step troubleshooting for platforms including Purple AI, UniFi, Meraki, and MikroTik. For any organisation operating guest or public WiFi, a poorly performing captive portal is a direct revenue and reputation risk — this guide provides the decision frameworks and operational playbooks to eliminate that risk.

12 min read3k words
MAC-Adressen-Randomisierung: Ein tiefer Einblick in die Verbesserung des Datenschutzes und deren Auswirkungen auf das Netzwerkmanagement
gsc_gap

MAC-Adressen-Randomisierung: Ein tiefer Einblick in die Verbesserung des Datenschutzes und deren Auswirkungen auf das Netzwerkmanagement

This guide provides a comprehensive technical overview of MAC address randomization, a critical privacy feature now default on iOS, Android, and Windows devices. It details the direct impact on enterprise WiFi network management — from broken MAC-based authentication and inflated analytics to security monitoring gaps — and offers actionable, identity-driven strategies for IT leaders in hospitality, retail, stadiums, and public-sector organisations to adapt their infrastructure. By shifting from hardware-based to credential-based network management, organisations can simultaneously enhance security, achieve privacy compliance, and unlock richer customer insights.

8 min read2k words
Passpoint (Hotspot 2.0): Ein umfassender Leitfaden für sicheres und nahtloses WiFi-Roaming
gsc_gap

Passpoint (Hotspot 2.0): Ein umfassender Leitfaden für sicheres und nahtloses WiFi-Roaming

This guide provides a comprehensive technical overview of Passpoint (Hotspot 2.0) for IT leaders and network architects, covering the IEEE 802.11u standard, GAS/ANQP discovery protocols, WPA3-Enterprise security, and the WBA OpenRoaming federation. It delivers a vendor-neutral implementation framework with phased deployment guidance, real-world case studies from hospitality and retail, and a clear analysis of the ROI and compliance benefits for enterprise venue operators.

8 min read2k words
WiFi-Datenerfassung: Ein umfassender Leitfaden zu Datenschutz, Compliance und Best Practices
gsc_gap

WiFi-Datenerfassung: Ein umfassender Leitfaden zu Datenschutz, Compliance und Best Practices

This guide provides IT leaders with a comprehensive technical reference for implementing WiFi data capture solutions. It focuses on navigating the complex landscape of privacy, legal compliance (GDPR, CCPA), and data ethics, offering actionable best practices for venue operators in hospitality, retail, and large public spaces.

3 min read1k words
WPA3-Enterprise: Ein umfassender Deployment-Guide
news

WPA3-Enterprise: Ein umfassender Deployment-Guide

This guide provides enterprise IT teams, network architects, and CTOs with a definitive, vendor-neutral reference for deploying WPA3-Enterprise across hospitality, retail, events, and public-sector environments. It covers the full deployment lifecycle — from hardware and RADIUS infrastructure requirements through phased migration strategy and client device configuration — while addressing the specific security improvements WPA3-Enterprise delivers over WPA2-Enterprise, including mandatory Protected Management Frames, enforced server certificate validation, and forward secrecy. Teams will find actionable configuration guidance, real-world case studies, and a structured troubleshooting framework to de-risk their migration and demonstrate compliance with PCI DSS v4.0 and GDPR Article 32.

12 min read3k words
Gäste-WiFi: Der ultimative Leitfaden für Unternehmen zur Verbesserung des Kundenerlebnisses und zur Erfassung wertvoller Daten
gsc_gap

Gäste-WiFi: Der ultimative Leitfaden für Unternehmen zur Verbesserung des Kundenerlebnisses und zur Erfassung wertvoller Daten

This guide is the definitive technical reference for IT leaders and venue operators on deploying enterprise-grade guest WiFi. It provides actionable guidance on network architecture, security, and data analytics to transform guest WiFi from a cost centre into a powerful tool for enhancing customer experience and driving business intelligence.

7 min read2k words
Campus Area Networks (CANs): Ein umfassender Leitfaden für Design, Implementierung und Management
Network Design

Campus Area Networks (CANs): Ein umfassender Leitfaden für Design, Implementierung und Management

This comprehensive technical reference guide covers the full lifecycle of Campus Area Networks (CANs) — from architectural design and technology selection to implementation, security hardening, and ongoing management. It is written for IT managers, network architects, and CTOs at hotels, retail chains, stadiums, and corporate campuses who need to build or modernise a high-performance, resilient connectivity backbone. By combining vendor-neutral best practices, real-world case studies, and actionable frameworks, this guide equips senior technical professionals to make informed decisions that deliver measurable ROI and support long-term strategic objectives.

8 min read2k words
WiFi Captive Portals: Der ultimative Leitfaden für Einrichtung, Sicherheit und Anpassung
Captive Portals & Onboarding

WiFi Captive Portals: Der ultimative Leitfaden für Einrichtung, Sicherheit und Anpassung

This authoritative technical reference guide covers the full lifecycle of enterprise WiFi captive portal deployment, from network architecture and security hardening to GDPR and CCPA compliance and measurable business ROI. It is designed for IT managers, network architects, and CTOs at hotels, retail chains, stadiums, and public-sector organisations who need actionable, vendor-neutral guidance to implement, secure, and optimise guest WiFi infrastructure. The guide includes step-by-step configuration instructions, real-world case studies, security checklists, compliance frameworks, and a discussion of how captive portals drive first-party data acquisition and customer analytics at scale.

9 min read2k words
Purple AI: Der ultimative Leitfaden für unsere WiFi-Analyse- und Gäste-WiFi-Management-Plattform
Data & Analytics

Purple AI: Der ultimative Leitfaden für unsere WiFi-Analyse- und Gäste-WiFi-Management-Plattform

This guide provides a comprehensive technical overview of the Purple AI platform, an enterprise-grade WiFi intelligence solution. It details the platform's features, architecture, and benefits for IT managers and venue operators, focusing on transforming guest WiFi into a tool for data analytics, customer engagement, and revenue generation.

5 min read1k words
Fehlerbehebung von Internetverbindungsproblemen unter Windows 11 nach einem Upgrade
Hardware & Setup

Fehlerbehebung von Internetverbindungsproblemen unter Windows 11 nach einem Upgrade

This guide provides a definitive technical reference for IT leaders on resolving Windows 11 upgrade-related internet connectivity failures caused by the removal of 802.1X wired authentication settings. It delivers a step-by-step troubleshooting and remediation process, covering Group Policy, Microsoft Intune, and manual recovery methods, alongside preventative measures and ROI analysis to ensure stable, compliant network access across enterprise environments.

7 min read2k words
Der ultimative Leitfaden zur WiFi-Kanalauswahl: Leistung optimieren und Interferenzen vermeiden
Network Design

Der ultimative Leitfaden zur WiFi-Kanalauswahl: Leistung optimieren und Interferenzen vermeiden

This guide provides a comprehensive, step-by-step explanation of how to change WiFi channels on different routers and operating systems. It covers the reasons for changing channels (interference, congestion), how to identify the least congested channels using WiFi analyzer tools (with specific recommendations and screenshots), and the potential impact on network performance. It differentiates itself by offering practical advice for both home and business users, including advanced configurations and troubleshooting tips for common issues.

7 min read2k words
Messung der WiFi-Netzwerkleistung: Wichtige Kennzahlen für IT-Teams
Data & Analytics

Messung der WiFi-Netzwerkleistung: Wichtige Kennzahlen für IT-Teams

A comprehensive technical reference for IT managers and network architects on the key metrics for measuring and benchmarking enterprise WiFi network performance. This guide provides actionable insights into interpreting performance data to optimize user experience and achieve business objectives in large-scale venues.

8 min read2k words
Estimote Beacons: Ein umfassender Leitfaden für Einrichtung, Konfiguration und Anwendungsfälle
Hardware & Setup

Estimote Beacons: Ein umfassender Leitfaden für Einrichtung, Konfiguration und Anwendungsfälle

This guide provides a comprehensive technical reference for IT managers and network architects on deploying Estimote beacons. It covers setup, configuration, and advanced use cases like wayfinding, proximity marketing, and asset tracking, offering actionable guidance for achieving measurable ROI in enterprise environments.

6 min read1k words
Band Steering und Load Balancing für High-Density WiFi
Network Design

Band Steering und Load Balancing für High-Density WiFi

This authoritative technical reference equips IT managers, network architects, and venue operations directors with the knowledge to design, configure, and optimise high-density WiFi networks using band steering and load balancing. It covers the architectural principles behind 2.4 GHz vs. 5 GHz band selection, AP load distribution strategies, and vendor-neutral configuration best practices for demanding environments such as stadiums, hotels, and conference centres. By applying these strategies, organisations can measurably improve wireless throughput, reduce user complaints, and transform their network infrastructure into a strategic business asset.

10 min read2k words
DHCP- und DNS-Grundlagen für WiFi-Netzwerkadministratoren
WiFi Standards & Protocols

DHCP- und DNS-Grundlagen für WiFi-Netzwerkadministratoren

An authoritative technical reference for IT leaders and network administrators on the critical roles of DHCP and DNS in enterprise WiFi deployments. This guide provides practical, vendor-neutral guidance for designing, implementing, and troubleshooting robust network services in hospitality, retail, and large-venue environments.

6 min read1k words
Webhooks vs. API-Polling für WiFi-Daten: Was sollten Sie nutzen?
API & Integrations

Webhooks vs. API-Polling für WiFi-Daten: Was sollten Sie nutzen?

This guide provides a definitive technical comparison between webhooks and API polling for retrieving WiFi intelligence data. It offers actionable guidance for IT managers, architects, and developers to help them select the optimal data integration pattern for real-time responsiveness, operational efficiency, and scalable deployments in enterprise environments.

9 min read2k words
E-Mail-Verifizierung für die WiFi-Anmeldung: Verbesserung der Datenqualität
Data & Analytics

E-Mail-Verifizierung für die WiFi-Anmeldung: Verbesserung der Datenqualität

This guide provides IT managers, network architects, and venue operations directors with a definitive technical reference on email verification for WiFi sign-in, explaining why guest WiFi environments produce degraded email data, how Purple's Verify feature implements a layered validation architecture, and what measurable improvements operators can expect after deployment. It covers the full verification stack — from RFC 5322 syntax checking through DNS MX record validation, disposable-email blocklisting, and OTP confirmation — alongside GDPR compliance considerations and CRM integration guidance. Venue operators who act on this guidance can expect to reduce invalid email rates from an industry-average 25–35% to under 2%, materially improving marketing ROI, sender reputation, and regulatory defensibility.

9 min read2k words
Best Practices für das Access Point Firmware-Management
Hardware & Setup

Best Practices für das Access Point Firmware-Management

This guide provides an authoritative reference on Access Point (AP) firmware management for enterprise environments. It details why a strategic approach to firmware is critical for security, performance, and compliance, offering actionable best practices for IT leaders to implement robust, scalable update processes in venues like hotels, retail chains, and stadiums.

6 min read1k words
Juniper Mist-Integration mit Purple WiFi
API & Integrations

Juniper Mist-Integration mit Purple WiFi

This guide provides a comprehensive technical reference for integrating Juniper Mist's AI-driven wireless platform with Purple's enterprise guest WiFi and analytics solution. It covers the full integration architecture — from the Mist external captive portal and REST API authorisation flow through to PurpleConnex Passpoint and RadSec configuration for seamless repeat-visitor connectivity. Venue operators and IT teams will find actionable deployment guidance, real-world implementation scenarios, and a clear framework for measuring the business impact of a Mist-Purple deployment.

9 min read2k words
WiFi-Roaming und Handoff: 802.11r und 802.11k erklärt
WiFi Standards & Protocols

WiFi-Roaming und Handoff: 802.11r und 802.11k erklärt

This guide provides a senior-level technical deep-dive into WiFi roaming protocols — specifically 802.11r (Fast BSS Transition), 802.11k (Neighbor Reports), and 802.11v (BSS Transition Management) — and their combined role in delivering seamless connectivity across enterprise venues. It equips IT managers, network architects, and venue operations directors with the architectural understanding, implementation steps, and business-impact metrics needed to deploy and validate fast roaming in hospitality, retail, events, and public-sector environments. The guide also addresses the critical interaction between roaming and captive portals, a common deployment failure point in guest WiFi networks.

8 min read2k words
SMS-Authentifizierung für WiFi: Wie sie funktioniert und wann man sie einsetzt
Authentication Methods

SMS-Authentifizierung für WiFi: Wie sie funktioniert und wann man sie einsetzt

A technical reference for IT managers and venue operators on implementing SMS-based WiFi authentication. This guide details the technical workflow, compares it against social login, and provides actionable best practices for deployment in enterprise environments like hotels, retail, and stadiums.

4 min read1k words
LogicFlow: Automatisierung von WiFi-Ereignissen und -Triggern
Automation

LogicFlow: Automatisierung von WiFi-Ereignissen und -Triggern

This authoritative technical reference guide covers Purple's LogicFlow, an enterprise-grade WiFi event automation engine that enables IT managers and network architects to build intelligent, trigger-based workflows across hospitality, retail, stadium, and public-sector venues. It details the platform's Event-Decision-Action architecture, explores the full range of available triggers, and provides concrete implementation guidance with real-world case studies from hotel and retail deployments. For venue operators and IT teams, this guide demonstrates how to transform passive WiFi infrastructure into a proactive, revenue-generating, and operationally efficient platform.

7 min read2k words
Portweiterleitung für WiFi-Controller: Ein Konfigurationsleitfaden
Security & Compliance

Portweiterleitung für WiFi-Controller: Ein Konfigurationsleitfaden

This guide provides a technical reference for network architects and IT managers on configuring port forwarding for on-premise WiFi controllers. It covers when port forwarding is necessary, which ports are required for major vendors, and how to mitigate the associated security risks to ensure a secure and scalable deployment.

8 min read2k words
Best Practices für das SSID-Management bei Multi-Venue-Deployments
Network Design

Best Practices für das SSID-Management bei Multi-Venue-Deployments

This guide provides a technical reference for IT leaders on managing SSIDs in multi-venue deployments. It debunks common myths about SSID count impacting performance and offers actionable best practices for balancing security, user experience, and network manageability across hospitality, retail, and large public venues.

6 min read1k words
Purple Portal API: Was Sie damit erreichen können
API & Integrations

Purple Portal API: Was Sie damit erreichen können

A technical reference for IT managers and network architects on leveraging the Purple Portal API. This guide details available endpoints, authentication, and real-world use cases for integrating guest WiFi data with enterprise systems to enhance business intelligence and operational efficiency. It covers both REST API and Webhook integration patterns, with concrete case studies from hospitality, retail, and events sectors.

9 min read2k words
Was ist ein WiFi-Controller und benötigen Sie einen?
Network Design

Was ist ein WiFi-Controller und benötigen Sie einen?

This authoritative guide provides IT leaders and network architects with a practical overview of WiFi controllers, detailing their function, comparing on-premises and cloud-based models, and explaining how they integrate with WiFi intelligence platforms like Purple. It offers actionable insights for deploying scalable, secure, and high-performance wireless networks in enterprise environments such as hospitality, retail, and large venues. By the end, readers will have a clear framework for choosing the right controller architecture and understanding where a platform like Purple adds transformative business value.

7 min read2k words
WPA2 vs. WPA3: Was ist der Unterschied und sollten Sie ein Upgrade durchführen?
WiFi Standards & Protocols

WPA2 vs. WPA3: Was ist der Unterschied und sollten Sie ein Upgrade durchführen?

This guide provides IT managers, network architects, and venue operations directors with a definitive, actionable comparison of WPA2 and WPA3 WiFi security protocols. It explains the critical technical differences — including SAE authentication, Perfect Forward Secrecy, and Enhanced Open — and outlines a practical, phased migration strategy using WPA3 Transition Mode. The guide is essential for any organisation operating guest or staff WiFi in hospitality, retail, events, or public-sector environments who needs to understand the upgrade case, manage device compatibility, and align their wireless security posture with modern compliance requirements.

8 min read2k words
LAN vs. WAN: Den Unterschied bei WiFi-Bereitstellungen verstehen
Network Design

LAN vs. WAN: Den Unterschied bei WiFi-Bereitstellungen verstehen

A technical reference for IT leaders and venue operators on the critical differences between LAN and WAN in enterprise WiFi deployments. This guide provides actionable architectural insights, implementation best practices, and clarifies how understanding this distinction drives ROI for guest WiFi and operational intelligence.

6 min read1k words
Access-Point-Platzierung und Abdeckungsplanung für Standorte
Network Design

Access-Point-Platzierung und Abdeckungsplanung für Standorte

A technical reference for IT leaders on designing high-performance WiFi networks in complex venues. This guide provides actionable best practices for access point placement, coverage planning, and capacity calculation to improve guest experience and operational ROI.

5 min read1k words
Captive Portal-Architektur: Ein technischer Deep Dive
Captive Portals & Onboarding

Captive Portal-Architektur: Ein technischer Deep Dive

This technical reference guide provides a comprehensive architectural breakdown of captive portal systems for enterprise guest WiFi deployments. It examines how network-level redirection, RADIUS authentication, access node policy enforcement, and walled garden configuration interact to create a secure and scalable access control framework. Designed for IT managers, network architects, and venue operations directors, this guide delivers actionable implementation guidance, real-world case studies, and compliance-aligned best practices that directly support deployment decisions in hospitality, retail, events, and public-sector environments.

6 min read1k words
Social Login für Gäste-WiFi: Facebook, Google, Apple und LinkedIn
Authentication Methods

Social Login für Gäste-WiFi: Facebook, Google, Apple und LinkedIn

This guide provides a comprehensive technical reference for IT managers, network architects, and venue operators deploying social login on guest WiFi networks. It covers the OAuth 2.0 Authorization Code Flow underpinning Facebook, Google, Apple, and LinkedIn authentication, the specific data each platform provides, and the critical iOS compatibility constraints affecting Google OAuth in captive portal environments. Compliance obligations under UK GDPR, platform selection frameworks, and real-world deployment case studies from hospitality and retail are included to support implementation decisions this quarter.

13 min read3k words
Firewall-Regeln für Gast-WiFi-Netzwerke
Security & Compliance

Firewall-Regeln für Gast-WiFi-Netzwerke

This guide provides IT managers and network architects with an authoritative reference for configuring firewall rules for guest WiFi networks, specifically in support of a Purple deployment. It offers actionable, vendor-neutral guidance on network segmentation, port configuration, and security best practices to ensure both seamless guest access and robust protection of corporate assets.

5 min read1k words
VLAN-Konfiguration für WiFi-Netzwerke
Network Design

VLAN-Konfiguration für WiFi-Netzwerke

This guide provides a technical deep-dive into VLAN configuration for enterprise WiFi networks, offering actionable guidance for IT leaders and network architects. It covers VLAN fundamentals, SSID-to-VLAN mapping, implementation best practices, and the business impact of proper network segmentation for security, performance, and compliance in venues like hotels, retail chains, and stadiums.

7 min read2k words