Vai al contenuto principale

Guide tecniche

Guide tecniche approfondite e curate da esperti su guest WiFi, analytics, Captive Portal e tecnologia per le location.

351 guides

Spiegazione del NAC (Network Access Control)
Security

Spiegazione del NAC (Network Access Control)

An authoritative technical reference for IT leaders on Network Access Control (NAC), explaining its architecture, deployment models, and critical role in enterprise WiFi security. This guide provides actionable insights for securing network access across hospitality, retail, and corporate environments, detailing how platforms like Purple integrate to enforce robust access policies.

7 min di lettura2k parole
Randomizzazione del MAC Address: cos'è e come gestirla
Captive Portals

Randomizzazione del MAC Address: cos'è e come gestirla

This guide provides IT leaders and network architects with a comprehensive technical overview of MAC address randomisation. It details the impact on enterprise and guest WiFi networks and presents actionable strategies, including Purple's SecurePass technology, to mitigate risks and maintain robust analytics and security.

6 min di lettura1k parole
802.1X vs PSK vs Open WiFi: Qual è il metodo di autenticazione più adatto a te?
Authentication

802.1X vs PSK vs Open WiFi: Qual è il metodo di autenticazione più adatto a te?

This guide provides a definitive, vendor-neutral comparison of the three primary WiFi authentication methods—802.1X (WPA2/3-Enterprise), Pre-Shared Key (PSK), and Open WiFi—tailored for IT managers, network architects, and CTOs in hospitality, retail, events, and the public sector. It cuts through technical complexity to deliver actionable deployment guidance, real-world case studies, and a clear decision framework for securing both staff and guest networks. Understanding which authentication model to deploy is not merely a technical choice; it is a strategic business decision with direct implications for security posture, regulatory compliance, operational efficiency, and the ability to extract commercial value from your WiFi infrastructure.

8 min di lettura2k parole
Come integrare i dati del WiFi ospiti con il tuo CRM
Integrations

Come integrare i dati del WiFi ospiti con il tuo CRM

This guide provides a comprehensive technical reference for IT managers, network architects, and marketing leaders on integrating guest WiFi analytics with CRM platforms such as Salesforce and HubSpot. It covers the strategic rationale, core architectural patterns (Direct API and Webhooks), available data fields, and step-by-step deployment guidance. Venue operators in hospitality, retail, and events will find actionable frameworks for building a compliant, scalable, first-party data pipeline that drives measurable marketing ROI.

8 min di lettura2k parole
Conformità GDPR per la raccolta dati del Guest WiFi
Security

Conformità GDPR per la raccolta dati del Guest WiFi

This guide provides IT managers, network architects, and Data Protection Officers with a comprehensive, actionable framework for achieving GDPR compliance across guest WiFi deployments in hospitality, retail, and public-sector venues. It covers the full spectrum of data collected by guest WiFi networks, the legal requirements for obtaining valid consent, best-practice data retention policies, and how to implement a defensible compliance architecture. Venue operators will learn how to transform their guest WiFi from a potential regulatory liability into a strategic asset that builds customer trust and drives measurable business intelligence.

7 min di lettura2k parole
Integrazione di Cisco Meraki con Purple WiFi
Integrations

Integrazione di Cisco Meraki con Purple WiFi

This guide provides a definitive technical reference for deploying Purple WiFi on Cisco Meraki infrastructure, covering the dual-layer integration architecture — Dashboard API provisioning and Captive Portal API authentication — alongside step-by-step RADIUS and splash page configuration. It is designed for network engineers and IT managers who need to move from a functional guest WiFi deployment to a strategic guest intelligence platform, with measurable ROI outcomes drawn from live enterprise deployments including McDonald's Belgium, Harrods, and AGS Airports.

10 min di lettura2k parole
Cos'è l'autenticazione RADIUS e come funziona?
Authentication

Cos'è l'autenticazione RADIUS e come funziona?

This guide provides a definitive technical reference on RADIUS authentication for IT leaders managing enterprise and guest WiFi deployments. It demystifies the AAA protocol, explains how 802.1X and EAP methods work together, and details how Purple's cloud-based platform simplifies deployment for hotels, retail chains, stadiums, and public-sector organisations. Readers will leave with a clear implementation roadmap, real-world case studies, and the decision frameworks needed to migrate from insecure pre-shared keys to a robust, identity-driven network access control architecture.

6 min di lettura1k parole
Identity-Based Networking: cos'è e perché è importante
Network Design

Identity-Based Networking: cos'è e perché è importante

This guide provides a comprehensive technical reference on Identity-Based Networking (IBN) — what it is, how it works, and why it is a critical investment for any organisation managing large, diverse user populations across hotels, retail chains, stadiums, and public-sector venues. It covers the core IEEE 802.1X architecture, Purple's cloud-native implementation, real-world deployment scenarios, and a clear ROI framework to support procurement decisions.

8 min di lettura2k parole
Ubiquiti UniFi e Purple WiFi: Guida all'integrazione
Integrations

Ubiquiti UniFi e Purple WiFi: Guida all'integrazione

This guide provides a definitive technical reference for integrating the Purple WiFi intelligence platform with Ubiquiti UniFi network deployments, covering architecture, step-by-step controller configuration, and GDPR-compliant data capture. It is designed for IT managers, network architects, and operations directors who need to deploy a secure, feature-rich guest WiFi experience across hospitality, retail, events, and public-sector environments. By correctly configuring the UniFi Network Controller to leverage Purple's external captive portal, organisations can transform a standard cost centre into a valuable source of visitor analytics and marketing intelligence.

8 min di lettura2k parole
Come il Guest WiFi supporta l'analisi degli spazi e il monitoraggio dell'affluenza
Analytics

Come il Guest WiFi supporta l'analisi degli spazi e il monitoraggio dell'affluenza

This guide provides a technical and operational framework for leveraging guest WiFi to gain deep insights into visitor behaviour within physical venues. It details how to capture and analyse data for footfall tracking and dwell time calculation, enabling IT and operations leaders to make data-driven decisions that optimize staffing, enhance venue layout, and increase business ROI.

7 min di lettura2k parole
WiFi gestito in cloud vs WiFi basato su controller: quale scegliere?
Network Design

WiFi gestito in cloud vs WiFi basato su controller: quale scegliere?

This guide provides a vendor-neutral technical comparison of cloud-managed WiFi and controller-based (on-premise) WiFi architectures, helping IT managers, network architects, and CTOs make an informed deployment decision. It covers the architectural trade-offs across scalability, data sovereignty, cost model, and offline resilience, with real-world case studies from hospitality, retail, and public-sector environments. It also explains how Purple's WiFi intelligence platform integrates with either architecture to deliver guest experience management, first-party data capture, and GDPR-compliant analytics.

9 min di lettura2k parole
WiFi Multi-Tenant: Architettura e Gestione
Network Design

WiFi Multi-Tenant: Architettura e Gestione

This authoritative technical reference guide provides IT managers, network architects, and venue operators with a comprehensive framework for designing, deploying, and managing multi-tenant WiFi networks across complex environments such as hotels, retail centres, stadiums, and multi-dwelling units (MDUs). It covers the critical architectural differences between single-venue and multi-tenant deployments, with a focus on tenant isolation, bandwidth management, and compliance. By leveraging Purple's enterprise WiFi intelligence platform, organisations can transform shared network infrastructure into a secure, scalable, and commercially valuable service.

8 min di lettura2k parole
IPSK spiegato: Identity Pre-Shared Key per l'accesso WiFi
Authentication

IPSK spiegato: Identity Pre-Shared Key per l'accesso WiFi

This guide provides IT managers, network architects, and venue operations directors with a definitive technical reference on Identity Pre-Shared Keys (IPSK) for WiFi access — explaining the architecture, comparing it against standard PSK and 802.1X Enterprise, and delivering actionable deployment guidance for hospitality, retail, events, and public-sector environments. It addresses the critical operational challenge of providing secure, individually-managed WiFi access across mixed-device fleets — including IoT and headless devices — without the infrastructure overhead of a full 802.1X deployment. Purple's platform is positioned as the orchestration layer that automates IPSK key lifecycle management at scale.

10 min di lettura2k parole
Guest WiFi vs Staff WiFi: Best Practice per la Segmentazione di Rete
Network Design

Guest WiFi vs Staff WiFi: Best Practice per la Segmentazione di Rete

This guide provides an authoritative technical reference for IT managers and network architects on the critical practice of separating guest and staff WiFi through network segmentation. It covers the security risks of running a flat, unsegmented network, the technical architecture of VLAN-based isolation, and vendor-neutral implementation guidance for hospitality, retail, and public-sector venues. The guide demonstrates how proper segmentation simultaneously mitigates data breach risk, satisfies compliance mandates such as PCI DSS and GDPR, and enables guest WiFi to become a revenue-generating business asset.

7 min di lettura2k parole
Come configurare Purple WiFi per la prima volta: una panoramica tecnica
Hardware

Come configurare Purple WiFi per la prima volta: una panoramica tecnica

This technical reference guide provides IT managers, network architects, and CTOs with a comprehensive overview of the Purple WiFi platform's initial setup process. It covers the core technical architecture, hardware integration, portal configuration, and best practices for a successful deployment in enterprise environments like hotels, retail, and stadiums. Following this guide, IT teams can confidently deploy a secure, GDPR-compliant guest WiFi solution that delivers both seamless connectivity and actionable business intelligence.

10 min di lettura2k parole