Blog.

Wren:IDM Cookbook

Wren:IDM Cookbook

We have created a selection of step-by-step recipes (samples) demonstrating key Wren:IDM features to make the beginnings easier.

read more
Why consider Zero Trust

Why consider Zero Trust

Zero Trust is a security model that assumes every access to a network, application, or data storage must be verified and authorized.

read more
New Redesigned ISIC Mobile app

New Redesigned ISIC Mobile app

We have been working with ISIC - International Student Identity Card for over 10 years. That's why we're thrilled that we were able to create a brand new mobile app for them in collaboration with SYNETECH. In its modern and secure user environment students from all...

read more