October 25, 2016GCA Technology & BeyondTrust to Exhibit at 2016 ISSA International Conference

TAMPA, Fla., Oct.25, 2016 - GCA Technology Services (GCA), a leading IT security provider focused on Identity and Access Management (IAM) solutions for enterprises, today announced that they will be exhibiting at the 2016 ISSA International Conference with their vendor partner BeyondTrust. The event will be held November 2-3rd in Dallas, Texas. This year’s theme of "Survival Strategies in a Cyber World" will focus on helping cybersecurity professionals develop sound governance policies, practices, and processes in a world of often contradictory legal and regulatory requirements.

“We are looking forward to being part of the ISSA International Conference this year, and the opportunity for GCA and our partner BeyondTrust to talk about the protection that a Privileged Access Management (PAM) platform can provide for enterprises,” said Jim Quasius, President and CEO of GCA. “With all of the recent data breaches stemming from cybercriminals preying on users with privileged credentials, we delighted to bring BeyondTrust’s PowerBroker to ISSA members as a solution for mitigating risk and simplifying compliance.”

GCA and BeyondTrust will be located together at Booth #603.

 

About GCA Technology Services

Founded in 1991, GCA Technology Services (GCA) is a security provider specializing in Identity and Access Management (IAM) solutions. We help enterprisesenable and secure access to business data by managing their digital identities, and offer a best of breed portfolio of leading IAM vendors. Our team’s expertise, experience and tenacity equip us with the tools to design, deploy and manage complex IAM projects that solve business challenges for our clients and enhance their profitability and competitiveness.

Visit us at www.gca.net, or follow us on Twitter or LinkedIn.

About BeyondTrust

BeyondTrust is a global information security software company that helps organizations prevent cyber attacks and unauthorized data access due to privilege abuse. Our solutions give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Access Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your company goes. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com

MEDIA CONTACT

Jennifer A. Bryant
Vice President, Marketing
(813) 498-2873
 

jbryant@gca.net