# Kommando --- ## Sider - [Registration form](https://kommando.com/registration-form/): Registration form Non-Human Identities: Den nye sikkerhetsutfordringen 03. sep. 2025, 12:00 – 16:00 Kommando Offices (5th floor) - [Thank you event](https://kommando.com/thank-you-event/): Get Ready to Secure Non-Human Identities! Thank you for registering for our upcoming seminar, «Securing Non-Human Identities,» on September 3rd,... - [Contact thank you](https://kommando.com/contact-thank-you/): Thank You for Your Inquiry! Your message has been successfully sent to the Kommando team. We appreciate you taking the... - [Code of Conduct](https://kommando.com/code-of-conduct/): Explore Kommando’s Code of Conduct — our ethical foundation for employees, leadership, and partners. Learn how we promote integrity, transparency, and accountability in everything we do. - [Privacy Policy](https://kommando.com/privacy-policy/): Privacy Policy This Data Privacy Policy provides an overview of our data processes and explains how Kommando collects and uses... - [Silverfort](https://kommando.com/silverfort/): Protect the unprotectable with Kommando and Silverfort. Extend MFA, Zero Trust, and ITDR to legacy systems and service accounts—without agents or proxies. Secure your hybrid environment in real time. - [CyberArk](https://kommando.com/cyberark/): Kommando is a trusted Nordic CyberArk partner delivering advanced Identity Security and Privileged Access Management. Discover how we combine global technology with local expertise to protect your business. - [SailPoint](https://kommando.com/sailpoint/): Secure your digital future with Kommando and SailPoint. Our IGA solutions help Nordic organizations manage user access, ensure compliance, and prevent breaches through smart, scalable identity governance. - [Hjem](https://kommando.com/): Take control of identity security with Kommando. We deliver tailored IGA, PAM, and advisory services to help Nordic organizations reduce risk, stay compliant, and secure access with confidence. - [Insights](https://kommando.com/insights/): Stay informed with Kommando Insights — your source for the latest in identity security, IAM trends, cybersecurity tips, and updates from our partners like CyberArk, SailPoint, and Silverfort. - [About Us](https://kommando.com/about-us/): Kommando is a trusted identity security partner for organizations across the Nordics. Discover how our tailored IAM, IGA, and PAM solutions help safeguard your business from evolving cyber threats. - [Contact](https://kommando.com/contact/): Need support or want to learn more about Kommando’s identity security solutions? Contact our teams in Norway or Sweden for general inquiries, media requests, or technical support. --- ## Innlegg - [Non-Human Identities: Den nye sikkerhetsutfordringen](https://kommando.com/non-human-identities-den-nye-sikkerhetsutfordringen/): ons. 03. sep. | Kommando Offices (5th floor) Time & Place 03. sep. 2025, 12:00 – 16:00 Kommando Offices (5th... - [Kommando Welcomes Silverfort as New Technology Partner to Enhance Identity Security Across the Nordic Market](https://kommando.com/kommando-welcomes-silverfort-as-new-technology-partner-to-enhance-identity-security-across-the-nordic-market/): Kommando is excited to announce its new technology partnership with Silverfort, a leading provider of unified identity security. This collaboration... - [Security Self Assessment Tips](https://kommando.com/security-self-assessment-tips/): Check out the infographic below for insights into our best practice recommendations for ensuring your self-assessment is effective and of... - [International Women's Day](https://kommando.com/international-womens-day/): Today, we celebrate the incredible achievements of women globally and empower the next generation of trailblazers! At Kommando, we’re proud... - [CyberArk Announces 2023 Global Partner of the Year Award Winners | Nasdaq](https://kommando.com/cyberark-announces-2023-global-partner-of-the-year-award-winners-nasdaq/): NEWTON, Mass. & PETACH TIKVA, Israel–(BUSINESS WIRE)– CyberArk (NASDAQ: CYBR), the identity security company, today announced the winners of its... - [Kommando named as CyberArk's EMEA 2023 Services Delivery Partner of the Year](https://kommando.com/kommando-named-as-cyberarks-emea-2023-services-delivery-partner-of-the-year/): We are thrilled to announce that Kommando has recently been named CyberArk’s EMEA 2023 Services Delivery Partner of the Year... - [CyberArk Partner meet-up for Benelux & Nordics in Amsterdam.](https://kommando.com/cyberark-partner-meet-up-for-benelux-nordics-in-amsterdam/): Thanks the CyberArk team and all other partners for knowledge transfer and discussions around identity security at this year’s CyberArk... - [Happy International Women's Day!](https://kommando.com/happy-international-womens-day/): In light of International Women’s Day, we have created a series of 3 short videos dedicated to all women out... - [Kommando welcomes SailPoint onboard as New Strategic Technology Partner](https://kommando.com/kommando-welcomes-sailpoint-onboard-as-new-strategic-technology-partner/): As technology continues to bring more users, applications, and data together, these connections also bring more vulnerability. Kommando is therefore... - [New Managing Director of Kommando Sweden Onboard!](https://kommando.com/new-managing-director-of-kommando-sweden-onboard/): We are excited and honored to welcome Peter Agild and Magnus Skog on board to our growing team. Peter will... --- ## People --- ## Solutions --- ## Services - [Secrets Management](https://kommando.com/services/secrets-management/): Secrets Management Secrets are everywhere: in code, in pipelines, in config files. And if they’re not managed properly, they turn... - [Endpoint Privilege Management](https://kommando.com/services/endpoint-privilege-management/): Endpoint Privilege Management (EPM) Local admin rights are one of the biggest risks hiding on your endpoints. Endpoint Privilege Management... - [Privileged Access Management](https://kommando.com/services/privileged-access-management/): Privileged Access Management Protect privileged accounts, stop lateral spread, and gain audit-ready control over who can do what across your... - [Identicy Advicory](https://kommando.com/services/identify-advisory/): Identify Advisory Identity security isn’t just about buying tools. It’s about making the whole thing work together. Our Identity Advisory... - [Identity Governance & Administration](https://kommando.com/services/identity-governance-administration/): Identity Governance & Administration (IGA) Implement a robust IGA framework to ensure the right individuals have the right access at... - [Cloud Infrastructure Entitlement Management](https://kommando.com/services/cloud-infrastructure-entitlement-management/): Cloud Infrastructure Entitlement Management (CIEM) CIEM gives you visibility into every identity and permission across your cloud platforms and helps... - [Access Management](https://kommando.com/services/access-management/): Access Management Access Management isn’t just a technical checkbox anymore. It’s a critical part of staying secure, productive, and audit-ready.... --- # # Detailed Content ## Sider - Published: 2025-07-04 - Modified: 2025-07-07 - URL: https://kommando.com/registration-form/ Registration form Non-Human Identities: Den nye sikkerhetsutfordringen03. sep. 2025, 12:00 – 16:00 Kommando Offices (5th floor) --- - Published: 2025-07-04 - Modified: 2025-07-04 - URL: https://kommando.com/thank-you-event/ Get Ready to Secure Non-Human Identities! Thank you for registering for our upcoming seminar, "Securing Non-Human Identities," on September 3rd, 2025, at Kommando Offices in Oslo. We're thrilled you'll be joining us for what promises to be an enlightening half-day event. This seminar is essential for anyone looking to stay ahead in IT security, especially given that a typical company has 50x more machine identities than human ones, and these non-human identities are at the heart of most identity-related security incidents. We'll explore strategies to navigate this complex landscape driven by digitalization, cloud, IoT, and AI. Keep an eye on your inbox for a detailed confirmation email with all the practical information you'll need. See you on September 3rd! --- - Published: 2025-07-04 - Modified: 2025-07-04 - URL: https://kommando.com/contact-thank-you/ Thank You for Your Inquiry! Your message has been successfully sent to the Kommando team. We appreciate you taking the time to connect with us. We aim to respond to all inquiries within 1-2 business days. Please keep an eye on your inbox for our reply. If your inquiry is urgent, you can also reach us directly at post kommando. com or contact one of our employees. --- > Explore Kommando’s Code of Conduct — our ethical foundation for employees, leadership, and partners. Learn how we promote integrity, transparency, and accountability in everything we do. - Published: 2025-07-01 - Modified: 2025-07-01 - URL: https://kommando.com/code-of-conduct/ Code of Conduct IntroductionThe Code of Conduct purpose is to guide how Kommando as a company and employees, the Board and Management are expected to act. The Code of Conduct shall contribute to strengthening Kommando's culture, daily work, discussions and decisions. Kommando's Code of Conduct shall be based on our values and are our ethical guidelines. 1. 1 Our Mission and ValuesOur MissionThe mission will provide direction for our choices and priorities. Everything we do should be in line with our mission. We continuously strive to become a market leader within the technologies we choose to work with and deliver to our clients. We provide expertise, market leading solutions and services within cybersecurity and automation. Our expert has extensive knowledge and experience in information security. We help organizations manage critical information within identity-, access- and privileged management. We strive to bring valuable knowledge to the table through collaboration with our partners. Our ValuesSmart – We deliver quality ahead of quantity and keep our promises. We take responsibility and stand up for our customers and each other. Doer – We lead and advise, always looking for new, simpler, and smarter solutions with a genuine interest in our customers. Simple – We simplify everyday life for our customers through clear communication, focusing on what matters, and removing complexity. 1. 2 To whom does this apply? The Code of Conduct applies to all employees (and consultants) regardless of position, with a special responsibility for the Board and Management to facilitate and promote its... --- - Published: 2025-07-01 - Modified: 2025-07-07 - URL: https://kommando.com/privacy-policy/ Privacy Policy This Data Privacy Policy provides an overview of our data processes and explains how Kommando collects and uses personal data. PurposeThis Privacy Policy (“Policy”) explains how Kommando (“Kommando”, “us,” “our,” or “we”) collects, uses, discloses, and protects personal information submitted via our website, contact forms, email, or phone. Kommando consists of:Kommando AS – Parent company located in NorwayKommando AB – Subsidiary company located in SwedenKommando AS – Subsidiary company located in DanmarkThe Policy outlines how we collect, process, store, and share personal data, which includes any information that can identify an individual directly or indirectly (e. g. , name, contact info). ApplicationAs a company processing personal data about European citizens, Kommando complies with the EU General Data Protection Regulation (GDPR, Regulation (EU) 2016/679). Why we may use personal dataWe may use your personal data for purposes including:Delivering website features (based on consent or legitimate interest)Administering seminar participation (based on consent)Regulatory compliance (legal obligation)Delivering services to customers (contract)Operating, evaluating, and improving our organization (contract)Other purposes you authorize when submitting data (consent)Types of personal data collectedWhen you visit our websiteIP addressWeb browser typeLanguage preferencesWhen you register for a seminarFull nameContact information (email and phone number)Company affiliationTitleFood allergies (for events with catering)Feedback survey data (anonymized)When you are a customerFull nameContact information (email and phone number)Company affiliationTitleMinutes of meetingsOther authorized data as requestedHow Kommando processes personal dataKommando protects your personal data from loss, misuse, unauthorized access, disclosure, modification, and destruction using industry best practices and GDPR-compliant measures. We ensure that all third-party... --- > Protect the unprotectable with Kommando and Silverfort. Extend MFA, Zero Trust, and ITDR to legacy systems and service accounts—without agents or proxies. Secure your hybrid environment in real time. - Published: 2025-06-10 - Modified: 2025-07-03 - URL: https://kommando.com/silverfort/ Silverfort Extend MFA and identity Zero Trust to resources that couldn't be protected before. Our partnership with Silverfort Silverfort is the first platform to provide modern identity security for all corporate users, service accounts, and resources, including previously unprotectable legacy systems and command-line interfaces involved in over 80% of data breaches and ransomware attacks. Using innovative agentless and proxyless technology, Silverfort integrates with existing IAM infrastructure to enforce Multi-Factor Authentication (MFA), Identity Threat Detection and Response (ITDR), and Zero Trust policies across hybrid environments, stopping identity threats in real time. Solve the identity protection challenges that truly matter You don’t roll out an IGA program just for the sake of it. You do it because it solves very real problems — ones that affect security, compliance, efficiency, and even how your people experience day-to-day work. Extend MFA to resources that couldn't be protected before Extend MFA protection (including your existing MFA product) to critical resources without modifying them, including legacyapplications, command-line access tools, file shares, IT infrastructure, industrial systems and many others. Discover, monitor and protect your service accounts automatically Gain immediate visibility into all service accounts (non-human identities), monitor and analyze their activity, and enforcepolicies that prevent anyone from using them outside of their intended purpose, without having to modify them. Block ransomware spread and lateral movement in real time Enforce adaptive MFA policies on high-risk access, including command-line tools that attackers frequently use like PowerShell, PsExec and WMI, to prevent ransomware spread and limit its impact to the... --- > Kommando is a trusted Nordic CyberArk partner delivering advanced Identity Security and Privileged Access Management. Discover how we combine global technology with local expertise to protect your business. - Published: 2025-06-06 - Modified: 2025-07-01 - URL: https://kommando.com/cyberark/ CyberArk Empowering Nordic Customers with CyberArk: Unleashing the Synergy of Global Technologies and Local Expert. Our partnership with CyberArk We take immense pride in our strategic partnership with CyberArk, the undisputed global leader in Identity Security and Privileged Access Management. Together, we bring a fusion of cutting-edge technology and unmatched local expertise, empowering Nordic organizations to conquer the ever-evolving threat landscape. The Nordic Advantage: Empowering Nordic Organizations by Combining Global Technologies with Local InsightsAs cyber threats grow increasingly sophisticated, protecting sensitive identities and privileged accounts has become a top priority for Nordic businesses. That's why we have united forces with CyberArk, combining their market-leading technologies with our region-specific knowledge to deliver a cybersecurity solution tailored exclusively for the Nordic market. Why Choose CyberArk and Kommando? You don’t roll out an IGA program just for the sake of it. You do it because it solves very real problems — ones that affect security, compliance, efficiency, and even how your people experience day-to-day work. Comprehensive Identity Security Platform The CyberArk Identity Security Platform is built to secure human and machine identities, enabling secure access for any identity, from anywhere, on any device. Award-Winning Customer Experience Kommando, has been recognized as CyberArk Regional Partner of the Year in 2018 and EMEA Services Delivery Partner of the Year in 2021. Together, we provide a seamless experience that prioritizes your success. Proven Risk-Based Identity Security Roadmaps CyberArk has developed a blueprint for measurable, risk-based Identity Security roadmaps, ensuring your organization's security excellence. Innovative Privileged Attack... --- > Secure your digital future with Kommando and SailPoint. Our IGA solutions help Nordic organizations manage user access, ensure compliance, and prevent breaches through smart, scalable identity governance. - Published: 2025-06-06 - Modified: 2025-07-01 - URL: https://kommando.com/sailpoint/ SailPoint With the increasing number of remote workers, vendors, and third-party users, maintaining a tight grip on access privileges is no longer optional; it's a necessity. What is Identity and Access Governance, and why is it crucial for your business? Identity and Access Governance refers to the process of managing and overseeing user access to critical resources within an organization. It provides you with the tools to control who can access what data, applications, and systems, while ensuring compliance with industry regulations and internal policies. With the increasing number of remote workers, vendors, and third-party users, maintaining a tight grip on access privileges is no longer optional; it's a necessity Why choose Kommando and SailPoint for your Identity and Access Governance Needs? Local expertise Our partnership with SailPoint combines the expertise of two industry-leading cybersecurity firms. Together, we have years of experience in safeguarding organizations from cyber threats, ensuring that your sensitive data remains secure and your organization stays compliant with industry standards. Comprehensive IGA Solution SailPoint offers a comprehensive suite of Identity Governance and Administration tools, providing you with a holistic approach to cybersecurity. From identity verification and access request management to privilege management and role-based access control, our platform has it all covered. User-Friendly Interface We understand the importance of simplicity when dealing with complex cybersecurity tasks. SailPoint's user-friendly interface makes it easy for your IT team to manage access controls, track user activity, and respond to potential security incidents swiftly. Seamless Integration Kommando and SailPoint's IGA solution... --- > Take control of identity security with Kommando. We deliver tailored IGA, PAM, and advisory services to help Nordic organizations reduce risk, stay compliant, and secure access with confidence. - Published: 2025-05-23 - Modified: 2025-07-04 - URL: https://kommando.com/ We help you take control of identity security From strategy to operations, we ensure the right people have the right access at the right time. Explore our services Contact us We help organisations take control of digital identities with clarity and confidence Through tailored solutions and deep expertise, we secure access across your systems, users and environments. Our approach combines strategic insight, trusted technology and long-term support – so you can reduce risk, stay compliant, and build a strong foundation for the future. See our services --- > Kommando is a trusted identity security partner for organizations across the Nordics. Discover how our tailored IAM, IGA, and PAM solutions help safeguard your business from evolving cyber threats. - Published: 2025-05-23 - Modified: 2025-07-07 - URL: https://kommando.com/about-us/ Your Trusted Nordic Identity Security Partner From strategy to operations, we ensure the right people have the right access at the right time. About us Since our establishment in 2017, Kommando has been dedicated to delivering top-notch Identity Security solutions and services. We take pride in helping businesses and organizations across the Nordics protect their access and identities from ever-evolving digital threats. At Kommando, we understand the unique challenges faced by organizations in today's dynamic cyber landscape. That's why our skilled local resources possess a deep understanding and extensive experience in assisting customers with complex IT environments. We are committed to realizing your ambitions related to Identity Security and providing tailored solutions that fit your specific needs. Trusted partnerships. Proven platforms. We work closely with leading global identity security providers to deliver robust, future-ready solutions tailored to your environment. Our partnerships ensure that you benefit from powerful technology, best practices, and seamless integration. Evaluating system and infrastructure security to identify vulnerabilities exploitable by attackers. Read more In-depth consultations to aid companies in identifying, managing, and enhancing their security strategies. Read more Swift response to security breaches or incidents, including investigation and recovery. Read more Your Identity Security Matters to Us At Kommando, safeguarding your organization's identity security is our top priority. We recognize that securing access and identities forms the cornerstone of a robust defense strategy. Trust in our expertise to protect your digital assets and keep your organization one step ahead of evolving threats. Milestones Kommando founded in OsloWith... --- > Need support or want to learn more about Kommando’s identity security solutions? Contact our teams in Norway or Sweden for general inquiries, media requests, or technical support. - Published: 2025-05-23 - Modified: 2025-07-07 - URL: https://kommando.com/contact/ Contact us General Inquiries post kommando. com Press & Media NorwayMarius BrekkeCEO & Managing Director, Norwaymarius. brekke kommando. comSwedenPeter AgildManaging Director, Swedenpeter. agild kommando. comDenmarkKim Buchwald MikkelsenManaging Director, Denmarkkim. buchwald. mikkelsen kommando. com Service & Support support kommando. comService desk login Send us an inquiry --- --- ## Innlegg - Published: 2025-07-04 - Modified: 2025-07-07 - URL: https://kommando.com/non-human-identities-den-nye-sikkerhetsutfordringen/ - Kategorier: Ukategorisert ons. 03. sep. | Kommando Offices (5th floor) Time & Place 03. sep. 2025, 12:00 – 16:00 Kommando Offices (5th floor), Karenslyst Allé 9A, 0278 Oslo, Norway About the event Kommando inviterer til et halvdagsseminar hvor vi dykker ned i et av de mest aktuelle - temaene innen IT-sikkerhet: Sikring av Non-Human Identities. Visste du at: En vanlig bedrift har 50x flere maskinidentiteter enn menneskelige? Over 80 % av Identitets-relaterte sikkerhetshendelser i 2024 involverte Non-Human Identities? Eksplosiv vekst av Non-Human Identities drives av digitalisering, sky, IoT og AI? Hvordan oppdage, håndtere og sikre disse "usynlige" identitetene i din virksomhet? Dette er spørsmål vi møter hver dag i dialog med nordiske virksomheter. Bli med oss 3. september når vi utforsker hvordan din virksomhet kan få kontroll på Non-Human Identities. På dette seminaret vil vi se nærmere på:   Hva er "Non-Human Identities" - og hvorfor er det viktig nå? Fra kartlegging til kontinuerlig kontroll: Slik bygger du et praktisk rammeverk Governance og compliance: verktøy og metoder for administrasjon Beste praksis for sikkerhet: rettigheter, tilgang, credentials og overvåking Live teknologidemo: se hvordan ulike plattformer hjelper deg å oppdage, håndtere og sikre Non-Human Identities Agenda: 11:30 - 12:00 Registrering og lett servering 12:00 - 12:10 Introduksjon og praktisk informasjon 12:10 - 12:40 Keynote - Storebrand 12:40 - 13:10 Keynote #2 tbc 13:10 - 13:30: Pause 13:30 - 14:15 Kommando «How to» : Non-Human Identities 14:15 - 14:30: Pause 14:30 - 16:00: Live teknologi demo: Non-Human Identities 14:30 - 15:00 - Silverfort - Se alt og... --- - Published: 2025-06-06 - Modified: 2025-07-07 - URL: https://kommando.com/kommando-welcomes-silverfort-as-new-technology-partner-to-enhance-identity-security-across-the-nordic-market/ - Kategorier: Ukategorisert Kommando is excited to announce its new technology partnership with Silverfort, a leading provider of unified identity security. This collaboration will bring Silverfort's innovative Identity Security Platform to the Nordic market, enhancing the security landscape for businesses in the region. Silverfort is the first and only platform to unify the security of identity infrastructure into a single platform, giving teams the visibility and context to enforce real-time identity protection cloud and on-prem environments. Uniquely, Silverfort extends Multi-Factor Authentication (MFA) to systems and interfaces that were previously unprotectable, such as legacy systems, command-line interfaces, service accounts (non-human identities), and IT/OT infrastructure. It delivers unified authentication and access policies across all users, assets, and environments, both on-premises and in the cloud, in a non-intrusive way. This agentless and proxyless technology integrates seamlessly with existing IAM infrastructure to enforce MFA, Identity Threat Detection and Response (ITDR), and Zero Trust policies across hybrid environments, effectively stopping identity threats in real time. Key benefits of the Silverfort Identity Security Platform include: Agentless and Proxyless MFA: Extend MFA protection to critical resources without modification, covering legacy applications, command-line access tools, file shares, IT infrastructure, and industrial systems. Service Account Visbility & Security: Discovery unknown service accounts for full visibility, Monitor and analyze activity, and enforce policies to prevent misuse without any modifications. Ransomware Mitigation: Enforce adaptive MFA policies on high-risk access, including command-line tools like PowerShell, PsExec, and WMI, to block ransomware spread and limit its impact. Cloud Identity Provider Integration: Connect legacy systems to cloud identity providers such as Entra... --- - Published: 2024-05-08 - Modified: 2025-06-06 - URL: https://kommando.com/security-self-assessment-tips/ - Kategorier: Ukategorisert Check out the infographic below for insights into our best practice recommendations for ensuring your self-assessment is effective and of value to your business. Should you need our assistance, we're here to help bring your project to fruition. For more information, reach out to us at post@kommando. no --- - Published: 2024-04-04 - Modified: 2025-07-07 - URL: https://kommando.com/international-womens-day/ - Kategorier: Ukategorisert Today, we celebrate the incredible achievements of women globally and empower the next generation of trailblazers! At Kommando, we're proud to support and uplift women in tech. As part of our commitment, we've asked some of our colleagues for advice they would give to younger women just entering the IT workforce... Happy International Women's Day --- - Published: 2024-02-13 - Modified: 2025-06-06 - URL: https://kommando.com/cyberark-announces-2023-global-partner-of-the-year-award-winners-nasdaq/ - Kategorier: Ukategorisert NEWTON, Mass. & PETACH TIKVA, Israel--(BUSINESS WIRE)-- CyberArk (NASDAQ: CYBR), the identity security company, today announced the winners of its 2023 Global Partner of the Year awards. The annual awards recognize top-performing partners, specifically those with demonstrated ability to deliver exceptional customer value and accelerate the growth of identity security-based programs, powered by CyberArk. Accenture, AWS, CapGemini, CGI, Deloitte, KPMG and Kyndryl are among the award recipients... . . Read the entire article on Nasdaq: CyberArk Announces 2023 Global Partner of the Year Award Winners | Nasdaq --- - Published: 2024-02-12 - Modified: 2025-07-07 - URL: https://kommando.com/kommando-named-as-cyberarks-emea-2023-services-delivery-partner-of-the-year/ - Kategorier: Ukategorisert We are thrilled to announce that Kommando has recently been named CyberArk's EMEA 2023 Services Delivery Partner of the Year for UK | Northern Europe! This recognition is especially meaningful as it signifies the culmination of our collective efforts in providing exceptional service and expertise in the cybersecurity landscape. We are particularly proud to share that alongside this prestigious award, we have also signed with new strategic customers and obtained an incredible record high number of new significant technical certifications his past year. These achievements highlight our unwavering dedication to delivering top-notch cybersecurity solutions and staying at the forefront of industry advancements. We extend our heartfelt gratitude to CyberArk for this acknowledgement, as well as to our clients and partners for their continued trust and support. Without the commitment and perseverance of each member of our team, this remarkable success would not have been possible. Here's to more success ahead! --- - Published: 2023-07-14 - Modified: 2025-06-05 - URL: https://kommando.com/cyberark-partner-meet-up-for-benelux-nordics-in-amsterdam/ - Kategorier: Ukategorisert Thanks the CyberArk team and all other partners for knowledge transfer and discussions around identity security at this year's CyberArk partner meet-up. Kicking off the CyberArk Partner Meet-up right Kommando water anyone? Partner panel discussion led by Renske Galema at the CyberArk Partner Meet-up --- - Published: 2021-03-08 - Modified: 2025-06-06 - URL: https://kommando.com/happy-international-womens-day/ - Kategorier: Ukategorisert In light of International Women's Day, we have created a series of 3 short videos dedicated to all women out there who are building their careers within IT or aspiring to become an IT professional in one way or another.   We see you, and would love to hear more from you.   Happy International Women's Day ! Kommando IWD Video Series  Video 1 of 3: International Women's Day - Being a Woman in IT Video 2 of 3: International Women's Day -Why Cyber Security? Video 3 of 3: International Women's Day - Why Choose Kommando? --- - Published: 2021-02-04 - Modified: 2025-06-05 - URL: https://kommando.com/kommando-welcomes-sailpoint-onboard-as-new-strategic-technology-partner/ - Kategorier: Ukategorisert As technology continues to bring more users, applications, and data together, these connections also bring more vulnerability. Kommando is therefore pleased to welcome SailPoint onboard as a new technology partner in the Nordics.   With SailPoint’s identity securityplatform, we will be able to provide our clients with an easier way to implement their digital transformation faster while reducing risk. Constant changes in the IT landscape, business and user patterns, and stringent regulatory compliance requirements have made organizations vulnerable to data breaches to date.   SailPoint can help organizations factor in these risks and challenges into their identity management strategy and to enforce policies that organizations previously had no way of controlling compliance with, allowing them to act in a timely manner before turning into another victim of a costly breach. “We thoroughly analyze and select the few solutions we want to work with and are pleased to have landed this partnership with SailPoint. Knowing that SailPoint is able to help extend end-to-end identity lifecycle and compliance management capabilities for entire ecosystems, while integrating well with other existing technologies, we are confident that we will bring a great added value to our clients,” said Marius Brekke, CEO of Kommando. "As we believe that leading competence is the master key to successful projects, Kommando will be investing time and resources into building a skilled team on SailPoint’s solutions going forward”, adds Brekke.   For more information on how SailPoint can be a fit to your organization's technological landscape, feel free to contact... --- - Published: 2020-11-05 - Modified: 2025-06-06 - URL: https://kommando.com/new-managing-director-of-kommando-sweden-onboard/ - Kategorier: Ukategorisert We are excited and honored to welcome Peter Agild and Magnus Skog on board to our growing team. Peter will be taking the lead as the Managing Director of our Swedish Offices, while Magnus will be our new Swedish Account Director who will be working closely with Peter and the rest of the team to further strengthen the organization and our position in the market. Read the full story covered in IDG Sweden: Säkerhetsbolag vill ta Kommando i Sverige – hämtar vd från Cygate --- --- ## People --- ## Solutions --- ## Services - Published: 2025-06-12 - Modified: 2025-07-01 - URL: https://kommando.com/services/secrets-management/ Secrets Management Secrets are everywhere: in code, in pipelines, in config files. And if they’re not managed properly, they turn into security risks fast. We walks you through what Secrets Management actually means, why it’s critical for modern infrastructure, and how we help you build a setup that keeps your credentials secure without slowing your teams down. What Is Secrets Management? Secrets Management is about keeping sensitive credentials safe like API keys, passwords, tokens, certificates, all that stuff. The things that connect your apps to each other, or to your infrastructure. The problem? These “secrets” often end up in the wrong place. Hardcoded into scripts. Left in plain text in config files. Shared over Slack. Or just... forgotten. And that’s where the risk creeps in. Secrets Management helps you fix that by putting all your credentials in one secure place: a vault, basically and controlling exactly who or what can access them. Not just people, but apps, containers and pipelines. It also lets you automate things like secret rotation so credentials don’t sit there untouched for years. And every access is logged, so if something weird happens, you’ve got the full trail. Why Secrets Management Actually Matters It’s easy to overlook secrets: until one leaks. And then it’s a problem. Not just for security, but for compliance, availability, and trust. Here’s why this stuff matters: You’re Reducing Risk If a hardcoded password makes it into a public repo (it happens more than you'd think), or an old API key never... --- - Published: 2025-06-12 - Modified: 2025-07-01 - URL: https://kommando.com/services/endpoint-privilege-management/ Endpoint Privilege Management (EPM) Local admin rights are one of the biggest risks hiding on your endpoints. Endpoint Privilege Management helps you remove unnecessary privileges, without getting in the way of your users. What Is Endpoint Privilege Management? Most people don’t need admin rights. But in a lot of companies, they still have them. Because it’s easier, or because IT doesn’t have the time to deal with every single request. And that’s where things start to get risky. Endpoint Privilege Management, or EPM, is really about fixing that. It gives you control over who can run what, when, and under what conditions. And it does it without locking people out or blowing up your support desk. Basically, it removes admin rights from day-to-day use. Users run as standard, which means malware or attackers can’t easily hijack elevated permissions. But when they actually do need admin access for something legitimate? They can request it, elevate for a specific task, or have it automatically approved based on clear policies. And when that’s done? Access drops back down. Simple as that. It keeps your endpoints a lot safer without grinding work to a halt. Why Endpoint Privilege Management Actually Matters The problem with admin rights isn’t new. But honestly? It’s still one of the most common ways attackers get in. All it takes is one phishing email, one malicious download, and suddenly that local admin account becomes their entry point. EPM helps you cut off that path. You’re Closing Doors Before They Open... --- - Published: 2025-06-12 - Modified: 2025-07-01 - URL: https://kommando.com/services/privileged-access-management/ Privileged Access Management Protect privileged accounts, stop lateral spread, and gain audit-ready control over who can do what across your entire environment. What Is Privileged Access Management? Not every account is created equal. Some accounts, like admin accounts, root accounts, or service accounts, can do serious damage if they fall into the wrong hands. That’s what makes them privileged. The problem is, many of these accounts are poorly controlled. Passwords get shared. Credentials sit unchanged for years. Or worse, nobody is quite sure who’s using them anymore. Privileged Access Management (PAM) is about fixing that. It puts all privileged accounts under strict control. Passwords are vaulted and rotated. Admin access isn’t handed out permanently. People request it when they need it and lose it when they don’t. Every action is logged. Every session can be monitored or recorded. And PAM doesn’t just apply to people. Service accounts, scripts, automation tools. They all use credentials too. PAM helps you control those as well. Bottom line: PAM gives you control over the accounts that matter most. It shrinks your attack surface and makes life much harder for anyone trying to move around inside your systems. Why Privileged Access Management Actually Matters Most attacks today don’t start with some fancy zero-day. They start with credentials. And privileged credentials? That’s what attackers are really after. Because once they get those, they can move freely, often without being noticed. PAM helps stop that. Block Lateral Movement Once an attacker lands somewhere, they usually try to... --- - Published: 2025-06-12 - Modified: 2025-07-01 - URL: https://kommando.com/services/identify-advisory/ Identify Advisory Identity security isn’t just about buying tools. It’s about making the whole thing work together. Our Identity Advisory helps you build the strategy, processes, and structure to get it right from the start. What Is Identity Advisory? Most companies already have identity tools. A few platforms here, some access processes there. Maybe some of it works, some of it doesn’t. But tools aren’t really the problem. The hard part is pulling everything together in a way that actually works for your business. That’s what Identity Advisory is about. We help you step back and get clarity. Where the gaps are, where the risks sit, and how everything connects. Not just technically, but also around ownership, approvals, reviews, policies. All the things that tend to fall through the cracks. Because at the end of the day, identity security isn’t only about technology. It’s also people and processes, and you structure this holistically through sound strategy and planning. And if that part’s not clear? The tech can’t fix it. Why Identity Advisory Actually Matters Identity is everywhere now. It touches every app, every system, every person. Which means when it’s not handled properly, the problems spread fast. You end up with messy access, unclear ownership, old accounts nobody remembers, and way too many people with way too much access. And fixing it after the fact? That gets painful, expensive, and slow. That’s why having the right identity strategy upfront matters. Clarity in the Chaos We help you step back and... --- - Published: 2025-06-12 - Modified: 2025-07-01 - URL: https://kommando.com/services/identity-governance-administration/ Identity Governance & Administration (IGA) Implement a robust IGA framework to ensure the right individuals have the right access at the right time. What is identity Governance & Administration (IGA)? Imagine knowing exactly who has access to what across your entire organization, and being confident that it’s correct at any given time. That’s what IGA is all about. Identity Governance & Administration, or IGA, is a way to manage digital identities and access in a structured, reliable way. It helps ensure that employees, consultants, and partners only have access to the systems and data they actually need. Nothing more, nothing less. Yes, it’s about security. But just as much, it’s about efficiency, compliance, and making everyday work easier for both IT and your end users. A lot of companies already have IAM, Identity & Access Management. But IGA goes a step further. It adds the "why" and the "should they" on top of "can they". Who should have access? Why? How do we make sure people don’t keep access after changing roles or leaving the company? And how do we prove all of this when auditors come knocking? With a solid IGA solution, you get clear answers to those questions and automate much of the messy, manual work that often slips through the cracks. Why IGA Actually Matters You don’t roll out an IGA program just for the sake of it. You do it because it solves very real problems: ones that affect security, compliance, efficiency, and even how your... --- - Published: 2025-06-12 - Modified: 2025-07-01 - URL: https://kommando.com/services/cloud-infrastructure-entitlement-management/ Cloud Infrastructure Entitlement Management (CIEM) CIEM gives you visibility into every identity and permission across your cloud platforms and helps you clean up anything that doesn’t belong. What Is CIEM? CIEM , or Cloud Infrastructure Entitlement Management is about making sure that every identity in your cloud environment only has the access it actually needs. Nothing more. That includes users, service accounts, roles and automated processes. anything that can touch data or infrastructure. CIEM gives you visibility into those entitlements, across every cloud you’re using, and helps you control them. Why does this matter? Because cloud permissions get out of hand fast. Especially in multicloud setups, where each platform handles access a bit differently. Over time, people accumulate access they don’t need anymore, or someone adds permissions “just in case” and no one remembers to remove them. CIEM helps you untangle that. It enforces least privilege, reduces risk, and gives you the tools to clean things up and keep them clean without slowing teams down. Why CIEM Actually Matters CIEM isn’t just another cloud security buzzword. It solves real problems that most teams don’t see until something goes wrong. A misconfigured role, an over-permissioned service account, or an access path nobody knew existed until after an incident. Better Security Most breaches today don’t happen because of zero-days. They happen because someone had too much access for too long. CIEM helps you spot that before it becomes a problem. It shows you who has access to what, and whether they actually... --- - Published: 2025-06-12 - Modified: 2025-07-01 - URL: https://kommando.com/services/access-management/ Access Management Access Management isn’t just a technical checkbox anymore. It’s a critical part of staying secure, productive, and audit-ready. What is Access Management? Access Management (AM) is about making sure the right people can access the right systems, at the right time. And just as importantly, keeping out the ones who shouldn’t. It covers three key things:Authentication (proving someone is who they say they are)Authorization (deciding what they’re allowed to do)Auditing (tracking what happens, so nothing slips under the radar)Why does it matter? Because in today’s IT setups with remote work, cloud services, and constant change access can get messy fast. And when that happens, security gaps open up. AM helps close those gaps. It reduces the risk of breaches, supports compliance with frameworks like GDPR and ISO 27001, and takes a load off IT by making access simpler and more consistent. It’s one of those things that, when done right, quietly makes everything else work better. Why Access Management Actually Matters Access is everywhere. And when it’s not managed properly, it becomes a risk. Not just a security risk, but a productivity and compliance one too. Here’s where Access Management makes a real difference: Stronger Security Most breaches start with compromised credentials or someone having access they shouldn’t. With proper AM in place, you control who gets in, what they can do, and how long they keep that access. MFA, session controls, and clear policies help stop attacks before they start. Compliance, Without the Stress Frameworks like GDPR,... --- ---