IT Courses at GCA TRAINING_____________



Is Identity the ONLY Perimeter?

In a recent webcast, Ping Identity’s Aubrey Turner ended his discussion on “Devising Cloud Strategies and Solutions” with a question that caused some reflection: “Is Identity the ONLY perimeter?” The zero trust framework...


What Assembly Lines Teach Us About Identity Management

You might think manufacturing and IT have limited overlap, but there is a lot that can be learned by comparing them. In the book The Goal, written by Eliyahu Goldratt, a fictitious senior manager attempts to salvage a fa...


4 Key Steps to Prepare for an Identity and Access Management (IAM) Rollout

Executing The Right Identity and Access Management (IAM) Rollout Strategy Active Directory used to be the standard for leveraging application identity storage. When the Internet began to boom, Active Directory was no lon...


Identifying Skilled Engineers for Sailpoint IdentityIQ Implementations

How Proper Identity And Access Management Greatly Benefits Hospitals And Healthcare Community Health Systems, Inc. (CHS) is one of the USA’s leading operators of general acute care hospitals, operating 158 hospitals in 2...


Sailpoint Identity IQ Connectors and Productivity Suite

What is Sailpoint Identity IQ? SailPoint IdentityIQ is a world class identity management and governance solution. Based on our expertise implementing SailPoint IdentityIQ, GCA has created a suite of enhancements that wil...

Call Now ButtonTalk To Our CTO Now