IT Courses at GCA TRAINING_____________



Is Identity the ONLY Perimeter?

In a recent webcast, Ping Identity’s Aubrey Turner ended his discussion on “Devising Cloud Strategies and Solutions” with a question that caused some reflection: “Is Identity the ONLY perimeter?” The zero trust framework...


What Assembly Lines Teach Us About Identity Management

You might think manufacturing and IT have limited overlap, but there is a lot that can be learned by comparing them. In the book The Goal, written by Eliyahu Goldratt, a fictitious senior manager attempts to salvage a fa...


How to Mitigate Risk with Proper IAM Testing

Problem Statement Skimping out proper testing is easy; testing is too often treated with a subjective approach versus a systematic approach. It is too easy for a developer to say, “oh yeah, I tested that.” Many times...


What is CIAM and How Can It Help Increase Retail Sales?

Identity management is on a visible path of merging with corporate strategy. In the past, identity management was a functional necessity to manage customer orders, profiles, and accounts. Now it is quickly becoming a str...


Director of Mental Conditioning: Cybersecurity’s New Role?

Recently, one of GCA’s partners made an interesting hire: a Director of Mental Conditioning. Derin McMains (who is now the Director of Mental Conditioning at ReliaQuest) was a former minor league baseball player and Peak...

security access management

GCA Employee Awarded Badges for Unparalleled SailPoint Expertise

GCA employee Chris Cohoon, the SailPoint Practice Manager, has earned the SailPoint IdentityIQ Development Architect, Security Architect, and Cloud Architect badges. Chris is the only person in the world who has been awa...


What to Look for In Reliable IAM Professional Services

In the event of an incident, you need to know your IAM provider will be here for you. If a crisis occurs at your organization, executives will be clamoring for answers. Your IAM provider needs to be able to resolve the i...

close up programmer man hand typing on keyboard at computer desktop for input code language to software for fix bug and defect in operation room , development of technology and work from home concept

How GCA Got 18,000 BYOD
Devices Back Online

At GCA, we are our client’s trusted partners. In times of crisis, we work hard to ensure they can rely on us to resolve any incidents quickly. Our top resources react fast in high-pressure situations and we keep an open ...


Why You Should Expect the Unexpected During Access Reviews

There are many terms for Identity Governance (like Access Reviews Recertifications, Certifications, etc.) but they all boil down to essentially the same definition: the process to review access assigned to identities at ...


Zero Trust Implementation:
The First Step

What is Zero Trust? Zero Trust is the idea of a framework that is built around the premise of continuous validation: always questioning who someone is and what they want to do. In a zero trust model, you assume every use...

Call Now ButtonTalk To Our CTO Now