Authenticate your users on your Wi-Fi network.
have it your way.

A captive portal is a smart way to authenticate users on your wireless network. Instead of distributing a shared password or leaving the connection available for everyone all the time, you can leave the users to do the authentication themselves when it suits them. It could be a “pay per use” authentication (you have to pay $1 for each hour of usage of the Internet connection, for example), or it could be a free connection but only after accepting “terms and conditions” or even better again: the user can access your Internet connection after accepting a post (like a check-in) on their Facebook wall or after liking your Facebook page.

Using our solutions you can support the following authentication method :

VOUCHER

Using voucher id and generated password to login , which you can create in bulk , give it out in form of voucher slip , cards or any media you desire.

SOCIAL LOGIN

User login using social media account such as facebook , twitter , google+ , linked , weibo and other popular social account , this increase your brand awareness.

PROPERTY MANAGEMENT SYSTEM

Hotelier, using our system guest can login using their check-in information.

3RD PARTY SOFTWARE

Using our publish API, you can virtually authenticate user using any source of data as credential.

ACCOUNT

Normal account created with expiry function , suitable for long term user.

SMS

Let user login request login account via sms. this validate their phone no and provide security of identity.

ACTIVE DIRECTORY

Want to deploy captive portal at enterprise level? , our solutions let you authenticate user using their Microsoft Active directory account credential.

Storyboard or User Journey

What You Get

Simplifies IT Management

  • Easy for end users to connect to the Internet through any device
  • Reduces support costs with an intuitive web-based management console
  • Self Sign-up for easy on-boarding of guest or user
  • Adapt to any existing network infrastructure

 

Safe and Secure

  • Protects your corporate network and isolates traffic from unmanaged devices
  • Provides open Internet access to all users while maintaining control and enabling privacy
  • Legal Compliance check to ensure your network while open to public comply to respective country legal requirement
  • Manage onslaught of “Bring Your Own Device” ( BYOD) with policy and managment

 

Improves Productivity

  • Helps both employees and visitors get work done on their preferred companion devices
  • Employees are always connected and reachable wherever they go in the workplace

 

Provide insight

  • Understand Trend of user behaviour
  • Use Social Login to enable insight of your user social media*

 

Contact Us

Thank you for your feedback/ enquiry. Send us an email and we'll get back to you, asap.

Not readable? Change text.

Start typing and press Enter to search