IT Courses at GCA TRAINING_____________

Blog

The-Top-Five-Reasons-to-Consider-a-Hybrid-SIEM-Managed-Service

The Top Five Reasons to Consider a Hybrid SIEM Managed Service

Should I Consider A Hybrid SIEM Managed Service For My Organization? When it comes to managing your SIEM, it’s a round-the-clock undertaking. It can be difficult to set up the tools to ensure you’re getting the maximum b...

Data-Access-Governance-Before-and-After

The Top Five Reasons You May Have Dirty User Data

The Dangers Of Dirty User Data In Your Organization Every organization has dirty data somewhere. With the sheer number of identities your company has to manage, it’s easy for small errors to happen. Dirty data can really...

Identity-and-Access-Management-for-Hospitals-and-Healthcare

Identity and Access Management for Hospitals and Healthcare

How Proper Identity And Access Management Greatly Benefits Hospitals And Healthcare Community Health Systems, Inc. (CHS) is one of the USA’s leading operators of general acute care hospitals, operating 158 hospitals in 2...

Identity-Management-Solution-Transforms-User-Access-for-Hospital

Identity Management Solution Transforms User Access for Hospital

How Successful Identity Management Implementation Greatly Boosted A Hospital’s Productivity. When a leading operator of acute care hospitals became fed up with their inefficient IT provisioning systems and growing ...

Top-5-Identity-Management-Considerations-for-CISO-CIO-and-IT-Directors

Top 5 Identity Management Considerations for CISO / CIO and IT Directors

Important Elements Of Implementing An Identity Management Strategy In this article, I outline some of my top areas of consideration for Senior IT Managers and the CISO / CIO deciding on investments in Identity Management...

Identity-and-Access-Management-is-Never-One-Size-Fits-All

Identity and Access Management is Never One-Size-Fits-All

Why Each Company Has A Different IAM Solution It’s incredible how provisioning processes differ at organizations.  You would think that as companies get bigger more of their processes start to merge.  Having worked...

The-Intersection-of-PAM-IAM-Part-2-Password-Vaulting

The Intersection of PAM & IAM – Part 2 – Password Vaulting

The Importance Of Password Vaulting  In IAM & PAM In the previous article, Part 1 – Access Control was discussed as the first step in setting up a successful Privileged Access Management (PAM) program. Many peo...

Identity-and-Access-Managemen-Not-a-DIY-Project

Identity and Access Management: Not a DIY Project

Is Your IAM Strategy Too Complicated? Take a moment to think about all the data you have, who can access it and who governs it. Does that seem unreasonable? It should. Identity and access management is a robust process t...

The-Intersection-of-PAM-IAM---Part-3---Privilege-Escalation-Delegation

The Intersection of PAM & IAM – Part 3 – Privilege Escalation & Delegation

Privilege Escalation & Delegation: The Final Step To Successful PAM & IAM Implementation See Part 1:  Access Controls     See Part 2:  Password Vaulting Once an organization has secured the paths for access contr...

Identity-Governance-Administration-Tools-Are-Not-Just-Connectors

Identity Governance Administration Tools Are Not Just Connectors

How Much Utility Does Today’s Identity Governance Administration Tools have? I frequently speak with leaders at organizations who think of Identity Governance Administration (IGA) programs as automating provisionin...

Call Now ButtonTalk To Our CTO Now