Skip to main content

Technical Guides

Deep, expert-led guides covering guest WiFi, analytics, captive portals, and modern venue technology. Each guide includes diagrams, worked examples, and audio podcasts.

249 guides

What is a Captive Portal and How Does It Work?
Captive Portals

What is a Captive Portal and How Does It Work?

A comprehensive technical reference for IT managers and venue operators on the architecture, deployment, and business impact of captive portals. This guide provides actionable insights into device detection, the Captive Network Assistant (CNA), and best practices for implementation in enterprise environments.

7 mins read2k words
Identity-Based Networking: What It Is and Why It Matters
Network Design

Identity-Based Networking: What It Is and Why It Matters

This guide provides a comprehensive technical reference on Identity-Based Networking (IBN) — what it is, how it works, and why it is a critical investment for any organisation managing large, diverse user populations across hotels, retail chains, stadiums, and public-sector venues. It covers the core IEEE 802.1X architecture, Purple's cloud-native implementation, real-world deployment scenarios, and a clear ROI framework to support procurement decisions.

8 mins read2k words
Ubiquiti UniFi and Purple WiFi: Integration Guide
Integrations

Ubiquiti UniFi and Purple WiFi: Integration Guide

This guide provides a definitive technical reference for integrating the Purple WiFi intelligence platform with Ubiquiti UniFi network deployments, covering architecture, step-by-step controller configuration, and GDPR-compliant data capture. It is designed for IT managers, network architects, and operations directors who need to deploy a secure, feature-rich guest WiFi experience across hospitality, retail, events, and public-sector environments. By correctly configuring the UniFi Network Controller to leverage Purple's external captive portal, organisations can transform a standard cost centre into a valuable source of visitor analytics and marketing intelligence.

8 mins read2k words
How Guest WiFi Supports Venue Analytics and Footfall Tracking
Analytics

How Guest WiFi Supports Venue Analytics and Footfall Tracking

This guide provides a technical and operational framework for leveraging guest WiFi to gain deep insights into visitor behaviour within physical venues. It details how to capture and analyse data for footfall tracking and dwell time calculation, enabling IT and operations leaders to make data-driven decisions that optimize staffing, enhance venue layout, and increase business ROI.

7 mins read2k words
Cloud-Managed WiFi vs Controller-Based WiFi: Which Should You Choose?
Network Design

Cloud-Managed WiFi vs Controller-Based WiFi: Which Should You Choose?

This guide provides a vendor-neutral technical comparison of cloud-managed WiFi and controller-based (on-premise) WiFi architectures, helping IT managers, network architects, and CTOs make an informed deployment decision. It covers the architectural trade-offs across scalability, data sovereignty, cost model, and offline resilience, with real-world case studies from hospitality, retail, and public-sector environments. It also explains how Purple's WiFi intelligence platform integrates with either architecture to deliver guest experience management, first-party data capture, and GDPR-compliant analytics.

9 mins read2k words
Multi-Tenant WiFi: Architecture and Management
Network Design

Multi-Tenant WiFi: Architecture and Management

This authoritative technical reference guide provides IT managers, network architects, and venue operators with a comprehensive framework for designing, deploying, and managing multi-tenant WiFi networks across complex environments such as hotels, retail centres, stadiums, and multi-dwelling units (MDUs). It covers the critical architectural differences between single-venue and multi-tenant deployments, with a focus on tenant isolation, bandwidth management, and compliance. By leveraging Purple's enterprise WiFi intelligence platform, organisations can transform shared network infrastructure into a secure, scalable, and commercially valuable service.

8 mins read2k words
IPSK Explained: Identity Pre-Shared Keys for WiFi Access
Authentication

IPSK Explained: Identity Pre-Shared Keys for WiFi Access

This guide provides IT managers, network architects, and venue operations directors with a definitive technical reference on Identity Pre-Shared Keys (IPSK) for WiFi access — explaining the architecture, comparing it against standard PSK and 802.1X Enterprise, and delivering actionable deployment guidance for hospitality, retail, events, and public-sector environments. It addresses the critical operational challenge of providing secure, individually-managed WiFi access across mixed-device fleets — including IoT and headless devices — without the infrastructure overhead of a full 802.1X deployment. Purple's platform is positioned as the orchestration layer that automates IPSK key lifecycle management at scale.

10 mins read2k words
Guest WiFi vs Staff WiFi: Network Segmentation Best Practices
Network Design

Guest WiFi vs Staff WiFi: Network Segmentation Best Practices

This guide provides an authoritative technical reference for IT managers and network architects on the critical practice of separating guest and staff WiFi through network segmentation. It covers the security risks of running a flat, unsegmented network, the technical architecture of VLAN-based isolation, and vendor-neutral implementation guidance for hospitality, retail, and public-sector venues. The guide demonstrates how proper segmentation simultaneously mitigates data breach risk, satisfies compliance mandates such as PCI DSS and GDPR, and enables guest WiFi to become a revenue-generating business asset.

7 mins read2k words
How to Set Up Purple WiFi for the First Time: A Technical Overview
Hardware

How to Set Up Purple WiFi for the First Time: A Technical Overview

This technical reference guide provides IT managers, network architects, and CTOs with a comprehensive overview of the Purple WiFi platform's initial setup process. It covers the core technical architecture, hardware integration, portal configuration, and best practices for a successful deployment in enterprise environments like hotels, retail, and stadiums. Following this guide, IT teams can confidently deploy a secure, GDPR-compliant guest WiFi solution that delivers both seamless connectivity and actionable business intelligence.

10 mins read2k words