Stäng meny

Webinars On Demand

Stay up to date on various cyber security topics covered in our webinars on demand

Bringing Active Directory Back from Hell

When your first gate of protection has already been broken through and you are trying to survive. The intruders are already in your network and have ...

Solve Role Maintenance with SailPoint

Build and maintain roles with the right access — continuously Empowering your users with the right access is critical to success. That’s why you nee...

Can You Block Lateral Movement in Real Time?

Solve the Blind Spots of MFA and Service Accounts

With identity threats on the rise it is more essential than ever to ensure that you’re able to confront the wide array of attacks that utilize compro...

The Dos and Don'ts of Endpoint Detection & Response

(EDR / XDR)

Active Directory Security from CISO to CISO

Being in the thankless position of a Chief Information Security Officer (CISO), where nobody says a word until something goes completely wrong, requi...

WEBINAR: Can you face a Security Audit?

Is your organization compliant with security laws and requirements? You have a choice… …Do nothing – ”keep your fingers crossed” and hope that ...

© Copyright 2022 | Kommando | All Rights Reserved


Drammensveien 127, 0277 Oslo

Linnégatan 2, 114 47 Stockholm

Åby Arenaväg 8A, 431 62 Mölndal

Close
To top