IT Courses at GCA TRAINING_____________

Blog

Featured Image

Gartner Identity & Access Management Summit 2019 Takeaways

For the second year in a row, GCA attended Gartner’s Identity & Access Management Summit 2019 in Las Vegas, Nevada. We spent three days learning about new IAM strategies, sharing insights and meeting with leaders in ...

superhero businessman looking at city skyline at sunset. the concept of success, leadership and victory in business.

How to Adapt As A Leader Based On Who You Are Leading

Leadership vs. Management One of the biggest misconceptions that people in positions of power seem to believe is that by landing themselves a leadership position, they inherently have the necessary skillset to sufficient...

Zero Trust

Relationships Built On Zero Trust

Zero Trust vs. Too Much Trust In a Zero Trust Relationship, it’s not you, it’s me. Or more accurately – it’s not you, it’s the business necessity of keeping information and identities protected within an organizati...

IT Terminology

IT Terminology For The Busy Professional

Emerging Technologies Are Hard To Keep Up With By now, many of you have likely stumbled across the viral social media video of a child in a convenience store articulating the meaning of blockchain in simplistic terms to ...

AdobeStock_81343637

Do You Have Shadows Lurking In Your IT?

What is Shadow IT? When you think of a shadow, what are some of the first things that come to mind: maybe a scene from a scary movie you watched against your better judgement, or perhaps an ominous late night venture thr...

security-risk-mitigation

The Circus Act of Balancing Business Optimization & Security Risk Mitigation

Juggling security risk mitigation and optimization  As an information technology leader, your job is equal parts of security risk mitigation and circus juggler. Not only is it your job to mitigate the ever-present threat...

Implementation-Services-Header

Data Access Governance: Before and After

Implementing A Proper Data Access Governance Solution It’s amazing what a properly deployed Data Access Governance solution can do for an organization. When I walked into our client’s office on a hot Texas morning, I kne...

Automating-Identity-Management-Processes-Dont-Go-it-Alone

Automating Identity Management Processes: Don’t Go it Alone

Identity Management Automation: Vendor Vs. In-House Solution Has someone from your organization approached you about automating manual identity management processes?  Let’s face it, there are many mundane tasks present i...

4-Keys-to-a-Successful-Identity-Management-Implementation

4 Keys to a Successful Identity Management Implementation

Implementing A Successful Identity Management Strategy Are you looking to implement a solution for Identity Governance Administration (IGA), Identity and Access Management (IAM), or just plain old Identity Management (ID...

4-Key-Steps-to-Prepare-for-an-Identity-and-Access-Management-IAM-Rollout

4 Key Steps to Prepare for an Identity and Access Management (IAM) Rollout

Executing The Right Identity and Access Management (IAM) Rollout Strategy Active Directory used to be the standard for leveraging application identity storage. When the Internet began to boom, Active Directory was no lon...

Call Now ButtonTalk To Our CTO Now