When evaluating Real-Time Location System (RTLS) solutions, many organisations — especially IT teams — raise important questions:
These concerns are valid — but it’s important to understand how modern RTLS architectures differ.
This post explains why Crowd Connected’s solution is designed to avoid these pitfalls — and why it is safe, secure, and IT-friendly.
Vendors like Cisco Spaces argue that BLE-based RTLS solutions can create a “shadow network” — a collection of devices operating outside IT’s normal visibility and control.
In some older or poorly designed systems, this is true:
Crowd Connected’s RTLS hardware architecture was deliberately designed to avoid this problem:
✅ Battery-powered devices do not connect to the IT network
✅ Only a single gateway connects to the IP network
✅ Proven wireless coexistence
✅ No impact on WiFi AP performance
Risk / Concern | Typical BLE Gateway RTLS | WiFi AP BLE RTLS | Crowd Connected |
---|---|---|---|
Creates many new IP devices? | Yes | No (but limited placement) | No — only 1 gateway |
Requires extensive IT management? | Yes | No | No |
Potential interference with WiFi? | Possible (if poor design) | Yes (AP BLE radios share band) | No — proven coexistence |
Impact on WiFi tuning/performance? | No | Yes | No |
Fully controlled by IT? | Partial | Partial | Yes — single endpoint |
If your IT team is concerned about “shadow networks,” “WiFi interference,” or “RTLS security,” you should strongly consider Crowd Connected’s architecture:
✅ No uncontrolled network sprawl
✅ Minimal attack surface
✅ Proven RF coexistence with WiFi
✅ Single gateway under IT control
✅ Superior RTLS performance
Have questions?
👉 Contact us — we’re happy to provide full technical details for your IT and security review.
Thank you for submitting your details. You're signed up to our newsletter!
There was a problem submitting this form. Please check your entries, ensure you're online, and try again.