Technology Overview

Software defined network authentication

What is offers a software-defined network authentication service specifically tailored for guest and visitor networks for brand-conscious commercial spaces with high foot-traffic. Adding services to your network is easy and does not require any special hardware or software. Simply configure the guest network to have our cloud-based service manage the authentication process for that specific network.’s authentication service will then identify, interact with, and authorize each user via a tailored on-brand experience, then seamlessly connect that customer relationship touchpoint to an organization's other business platforms including Salesforce, Eloqua, MVP Audience, and more.

The benefits for leveraging’s authentication network include:

  • Increased user profile validation
  • 24/7 guest network monitoring and end-user support
  • Zero tech time required to update content, automatic switching between different experiences for venues with different contexts
  • Seamlessly integrating data into other business systems without development time or file transfers
  • Does not require any special hardware, software, or drivers

The service allows network administrators to effortlessly meet business needs for their guest networks. For Marketing and Sales, creates a high performance on-premise marketing channel by leveraging free guest WiFi. The service provides a platform for establishing new customer relationships, driving marketing and sponsorship programs, while extending CRM and marketing platforms on-premise via a first-party channel to the organization's most attentive audience.

Privacy Focused authentication services do not consume, view or require access to any network traffic outside the authentication loop. authentication services do not operate via a proxy or require underlying network changes outside of setting up the authentication interaction. In most cases, the networking environment, including other internal authentication methods (both hardware and SDN) remain completely in place and untouched. authentication services do not process device probes or other non-opt-in information.

How does authentication work?

Guest and visitor devices attach to a designated network and are redirected to the service for identification and a relationship marketing interaction. If a device has been recently verified on a network, the user skips the identification process and automatically receives the marketing experience. A brand new device, or one without a recently verified profile, will identify itself with one of the allowed methods, e.g. email sign-in, then receive a marketing experience.

The marketing experiences are generated using data from the user profile and device type, using content created in the service's content management system. currently interfaces in over twenty five (25+) languages and is fully responsive to the user’s device.

Once the user completes the desired interactions, such as answering a survey question to decide to join a mailing list, authenticates that user on the network, the device is then authenticated onto that network using that user’s profile. The user's profile is associated with their device, session, and activity on the network, and steps are taken to eliminate profiles with false information. Therefore, the underlying network has a high quality user profile to associate with that device, session, and activity which completely eliminates the every device is unknown/‘Guest User’.

Integrating the data and profiles gathered by is effortless. The service provides dashboards and online tools, a dedicated data-mart for direct access and dozens of integrations to the world’s leading marketing and analytics platforms. makes it very easy to connect guest WiFi to various Marketing programs including email campaigns, re-targeting, look-a-like audiences and loyalty programs.

Why connect an authentication service to a guest network? provides identity, trust, and context previously unavailable on commercial open guest networks. Unknown guest WiFi devices become known users which helps curb bad behavior and reduce the risk associated with providing an open network. authentication service takes a cooperative approach to drive a significant increase in validity of profiles increasing the value produced by guest WiFi data capture. The service leverages key benefits such as network-shared blacklists of bad email addresses and pre-verified premium users to provide a greater return on investment over a siloed solution offering simple data capture without advanced validation. remotely manages and monitors our active partner networks 24/7, providing tools and resources to easily manage content creation, scheduling, and integrations to other business systems. is fully GDPR compliant and has additional dedicated, isolated instances within the EU and APAC regions. systems and data are protected by industry best practices which are consistently tested and reviewed including SOC.

How does the integration work?

Most enterprise-grade networks can be set to use authentication services within minutes. We currently support most enterprise-grade wireless networks, firewalls, and security appliances including Cisco/Cisco Meraki, Extreme Networks/WiNGs, Aruba, Ruckus and many more. services are implemented by a set of configuration changes enabling our web-services to manage the authentication of the guest user's device. automatically generates the required portal pages and splash pages that are appropriate. The user experience and content are managed with simple web-based tools that are generally managed directly by Marketing and Sales team members.

Manufacturers We Work With WiFi Marketing platform supports most enterprise-grade environments

Why Leverage Captive Portals To Uncover Hidden Customers

Unlock the secret to engaging your visitors and securing high-quality customer data through captive portals. Learn how to blend seamless access with impactful engagement directly from's CEO. Transform your Wi-Fi into a powerful marketing tool without compromising user experience.

Learn More