Stäng meny

Webinars On Demand

Stay up to date on various cyber security topics covered in our webinars on demand

Bringing Active Directory Back from Hell

When your first gate of protection has already been broken through and you are trying to survive. The intruders are already in your network and have ...

Solve Role Maintenance with SailPoint

Build and maintain roles with the right access — continuously Empowering your users with the right access is critical to success. That’s why you nee...

Can You Block Lateral Movement in Real Time?

The Dos and Don'ts of Endpoint Detection & Response


Solve the Blind Spots of MFA and Service Accounts

With identity threats on the rise it is more essential than ever to ensure that you’re able to confront the wide array of attacks that utilize compro...

Active Directory Security from CISO to CISO

Being in the thankless position of a Chief Information Security Officer (CISO), where nobody says a word until something goes completely wrong, requi...

WEBINAR: Can you face a Security Audit?

Is your organization compliant with security laws and requirements? You have a choice… …Do nothing – ”keep your fingers crossed” and hope that ...

How to Succeed with your IdM Initiative

Embarking on an Identity and Access Management (IAM) initiative? We understand the challenges you face, and we're here to guide you on the path to re...

© Copyright 2022 | Kommando | All Rights Reserved

Drammensveien 127, 0277 Oslo

Linnégatan 2, 114 47 Stockholm

Åby Arenaväg 8A, 431 62 Mölndal

To top