By Em Turner
•
February 19, 2026
WiFi authentication is broken. Employees share passwords on Post-it notes. Guests abandon a captive portal before entering their email. IT teams spend hours manually revoking access for leavers. This experience has barely evolved in twenty years. The cost of this broken system is significant. When everyone shares the same password, there’s no visibility into who is actually on the network, creating major security blind spots. Every forgotten password is a support ticket, and every captive portal is a barrier for users. If a person's WiFi access is not revoked immediately and automatically when they leave, it creates a security problem. There’s a better way. The solution is a shift to identity-centric networks. Traditional security focuses on the network itself: firewalls and VLANs. This made sense when networks had clear boundaries. Today, that perimeter has dissolved. Users move between locations and devices multiply. The network boundary is no longer a useful security concept. This guide breaks down what identity-based networks actually are, why they represent a genuine step-change from traditional WiFi, and how you can introduce the concept in client conversations without drowning anyone in jargon. The problem with the way WiFi has always worked To understand the benefits of identity-based networks, you first need to understand why the existing model is broken, because it has been, for a long time, and most organisations have simply learned to live with it. Traditional WiFi authentication comes in two main flavours. The first is the shared password — a WPA2-PSK key that everyone in the building uses, often written on a whiteboard or pinned to a noticeboard. The second is the captive portal — the frustrating splash page that guests often abandon. Both approaches were designed for a simpler time: smaller offices, fewer devices, lower stakes. But in 2026, they create serious problems. The shared password problem When everyone uses the same WiFi password, you lose visibility over who is actually on your network. You can see devices, but not identities. This creates several compounding issues: Leavers stay connected. When an employee leaves, their device doesn't. Unless someone manually changes the password (which disrupts everyone still using it) former staff, contractors, and disgruntled ex-employees retain access indefinitely. Passwords spread uncontrollably. Slack messages, sticky notes, text messages to the cleaner…WiFi passwords find their way to people who were never meant to have them. And once a password is out, you can't put it back. You can't see what's happening. There's no audit trail. No way to know who connected at 11pm on a Tuesday, or whether that device belongs to a trusted employee or someone sitting in the car park. Role-based access is impossible. Senior leadership, temporary contractors, delivery drivers, and full-time staff all share the same password and the same network access. There's no way to differentiate. The captive portal problem Guest WiFi portals are designed to feel like a security measure, but they fail on almost every dimension: They're frustrating. Most people have experienced the friction: the page that doesn't load, the agreement button that won't work, the re-authentication every time you return. It's the exact opposite of a good customer experience. The data they collect is low quality. "WiFi4cookies@gmail.com" is not a lead. When people enter an email purely to get online, accuracy goes out the window. Marketing teams end up with bloated, unreliable contact lists. They're not actually secure. Captive portals typically run on open networks, which means data is transmitted unencrypted from the moment a user connects, before they even see the login page. That's a meaningful liability. The 3 products Purple delivers on IBN Purple's identity-based network platform covers three distinct use cases, each addressing a different kind of WiFi environment. As a partner, understanding the distinctions is essential so you can sell the right product into the right situation, and so you can identify opportunities to bundle all three. 1) Staff WiFi: Passwordless Zero Trust Purple's Staff WiFi product is built for organisations where employees need secure, seamless access across one or many locations. Staff authenticate once via their corporate IdP (Entra ID, Google Workspace, or Okta), and their device connects automatically from then on at every office, every branch, every coworking space running Purple. The killer feature is automatic revocation: when an employee leaves and their account is deactivated in the directory, their WiFi access disappears at the same moment. No IT ticket. No password reset. No window of vulnerability. 2) Multi-Tenant WiFi: The at-home experience In environments where multiple residents or guests share the same building (student accommodation, hotels, build-to-rent properties, care homes) traditional WiFi creates a dilemma: shared passwords mean everyone can see each other's devices, but managing individual access is operationally nightmarish. Purple's Multi-Tenant WiFi solves this with Private Area Networks (PANs): each resident or guest gets their own isolated network bubble that contains all of their personal devices. A student can connect their laptop, phone, gaming console, and smart speaker, and they all sit inside a single private space, invisible to their neighbours. Simple iPSK handles legacy devices that don't support browser-based authentication. 3) Guest WiFi: Frictionless, secure, data-rich Purple's Guest WiFi replaces the captive portal with the Purple app: guests authenticate once with their email, get an encrypted connection from their very first packet, and reconnect automatically every time they visit. For the business, this means real marketing data from genuinely opted-in contacts, powerful footfall analytics, CRM integration, and a guest experience that actually reflects well on the brand. For IT, it means ISO-certified compliance and no open networks. Why this matters right now Firstly, hybrid work has made the old model untenable. When staff are moving between offices, client sites, and co-working spaces daily, the idea that a single shared password provides any meaningful security has become impossible to defend. Identity-based access is the only approach that scales with how people actually work now. Data protection regulation has raised the stakes for guest WiFi. GDPR and its equivalents require that personal data is collected lawfully, minimally, and with meaningful consent. Captive portal email captures were always borderline, and as regulators become more sophisticated, the risk of continuing with them is growing. And for clients who run multi-site operations, the analytics case for IBN is increasingly hard to ignore. Knowing who is on your network (not just that someone is) opens up a range of insights that shared-password WiFi simply cannot deliver. How to introduce IBN in a client conversation The most common mistake partners make when introducing Purple is leading with the technology. "We use WPA2-Enterprise via a cloud-native RADIUS alternative" is accurate, but it's not a conversation opener. The better approach is to start with the problem your client already knows they have, and work towards IBN as the natural solution. Here are three opening questions that tend to unlock the right conversation: For IT-led conversations: "When someone leaves the company, how quickly does their WiFi access get turned off?" "If I asked you right now who is connected to your staff network, could you tell me?" "How do you handle WiFi access for contractors or temporary staff?" For business-led conversations: "Are you capturing useful data from your guest WiFi, or just email addresses people never check?" "Has your cyber insurer asked you about network access controls recently?" "How much time does your IT team spend on WiFi support calls or password resets?" Once the problem is on the table, the IBN explanation almost writes itself. "What if your network already knew who each person was, so they never needed a password — and access stopped the moment they left the business?" That's a concept most decision-makers grasp within 30 seconds, and it naturally opens the door to a deeper conversation about Purple. How about booking a demo so you can see the benefits for yourself?