IT Courses at GCA TRAINING_____________

IAM

testing

How to Mitigate Risk with Proper IAM Testing

Problem Statement Skimping out proper testing is easy; testing is too often treated with a subjective approach versus a systematic approach. It is too easy for a developer to say, “oh yeah, I tested that.” Many times...

CIAM

What is CIAM and How Can It Help Increase Retail Sales?

Identity management is on a visible path of merging with corporate strategy. In the past, identity management was a functional necessity to manage customer orders, profiles, and accounts. Now it is quickly becoming a str...

gca_IAM_blog

What to Look for In Reliable IAM Professional Services

In the event of an incident, you need to know your IAM provider will be here for you. If a crisis occurs at your organization, executives will be clamoring for answers. Your IAM provider needs to be able to resolve the i...

close up programmer man hand typing on keyboard at computer desktop for input code language to software for fix bug and defect in operation room , development of technology and work from home concept

How GCA Got 18,000 BYOD
Devices Back Online

At GCA, we are our client’s trusted partners. In times of crisis, we work hard to ensure they can rely on us to resolve any incidents quickly. Our top resources react fast in high-pressure situations and we keep an open ...

Data protection and insurance. Concept of business security, safety of information from virus, crime and attack. Internet secure system.

Top 3 Reasons Why You Need IAM Experts

Third-party research tells us that more than 50% of first-time IAM projects fail. For 4 out of 5 projects that do get past implementation, executives believe they do not deliver enough value. This is where an IAM expert ...

shutterstock_669226057

Evaluating the Limits of Data Governance Policies

Limits In IAM The Limit is a mathematical construct that describes what the output of a function does, given that the input is behaving in a certain way. Evaluating limits is a useful way to determine what happens to the...

shutterstock_1745458508

Capital One’s Story: The $80 Million Price of Not Following Best Practices

There are big fines waiting out there for organizations that do not take information security seriously. In 2019, Capital One paid an $80 million civil penalty for its role in a security breach that exposed the personal ...

password-management

How Better Password Management Creates Better Employee Output

Problem Statement Skimping out proper testing is easy; testing is too often treated with a subjective approach versus a systematic approach. It is too easy for a developer to say, “oh yeah, I tested that.” Many times...

ransomware

Key Takeaways:
Colonial Pipeline Attack

No one would have guessed that a typical ransomware attack would create a domino effect that ended in half of the United States going without gas. The Colonial Pipeline Attack was the wake-up call a lot of IT leaders nee...

Featured Image

Gartner Identity & Access Management Summit 2019 Takeaways

For the second year in a row, GCA attended Gartner’s Identity & Access Management Summit 2019 in Las Vegas, Nevada. We spent three days learning about new IAM strategies, sharing insights and meeting with leaders in ...

Call Now ButtonTalk To Our CTO Now