HSIA Reporting
HSIA provides reports on new and returning users, demographics, gender, preferred devices, browsers, and OS information. analyze and display information about visitors and users such as login sources, login duration, login preferences, age, and so on, and generate network analytics and reports about the most popular OS, devices, browsers, and so on.
WiFi Login Pages
The creation and deployment of branded login pages on a global level or per property level allows extremely flexible and customizable landing pages. User redirection after login (based on age, gender, visits, birthday, platform, browser type, or login source).
WiFi Advertising
Display image and video advertising on the login page based on user type. Create AD campaigns based on number of impressions, top customers, clicks, and date. Built-in digital marketing tools for email and SMS marketing belong to a geofenced location or are global.Filter guest data based on several criteria.
Bandwidth & Policy Management
To control the amount of bandwidth used by different users and applications, QoS is used to prioritize different types of network traffic based on their importance, ensuring that critical applications and services receive sufficient bandwidth. Set limits on the amount of bandwidth that can be used by individual users, devices, or applications; provide real-time visibility of the network's usage; identify any issues or bottlenecks; and make any necessary adjustments to the network's configuration. User and network-level restrictions and limits help prevent abuses such as excessive bandwidth usage and unauthorized access.
Powerful Dashboard
HSIA's central control panel allows you to monitor, manage, and configure the network. It provides not only real-time visibility into the network's performance and usage, but also the ability to perform a variety of tasks, including user management (create, modify, and delete user accounts, and assign different levels of access to the network. Security management: tools for managing security-related functions such as intrusion detection systems, and access control. Network configuration:ability to configure various aspects of the network, such as the network topology, IP addresses, and other network settings. Reporting: real-time and historical reports on network usage, performance, and availability, as well as other key metrics.