Ormit Solutions Ltd

Latest News

Splash Access featured at Cisco Merkai Wireless Field Day

Raj Krishna, Wireless Product Manager – Presenting the Cisco Meraki Wireless Platform Katie Lane Lead Product Manager – Demonstrating features from Splash Access Recorded at Cisco Meraki Wireless Field Day.

Featured Post

Cisco Meraki Active Directory

Meraki MR/MX AD Support   Cisco Meraki devices (MR access points and MX security appliances) support the use of a sign-on Splash Page.   This requires network users to authenticate in a web browser before being allowed access to the … Read More

Featured Post

Meraki splash page examples

Meraki Splash Pages   Take a look at our Meraki Splash examples, we allow you to create a custom splash page instantly and start capturing data. Meraki Splash Access allows you to fully control the look and feel of your … Read More

Featured Post

Prevent Guest Device Re-Access

Splash Access is pleased to announce another new feature across its full product range . Prevent Guest Device Re-Access allows you to give a user free wifi for a set period of time then stop the user reconnecting for set … Read More

Featured Post

123-txt Cloud based SMS service

Splash Access is please to announce full integration into 123-txt for SMS Authentication and messaging . 123-txt is an established SMS messaging service developed and supported by ProcessFlows UK Limited. The solution is entirely cloud-based, sitting on the Microsoft Azure … Read More

Featured Post

Authorize.Net for Cisco Meraki

Authorize.Net The Authorize.Net Payment Gateway allows you to accept credit cards and electronic checks from websites and deposit funds automatically into your merchant bank account. Designed to save time and money for small- to medium-sized businesses. SplashAccess is now able … Read More

Featured Post

Cisco Meraki Reception Lobby Ambassador

Reception / Lobby Ambassador Splash Access’ NEW PRODUCT, the Reception / Lobby Ambassador, is a straight forward easy to use system in which the receptionist has complete control over how the guest is granted access to the network. How does … Read More

Featured Post