IT Courses at GCA TRAINING_____________

shutterstock_669226057

Evaluating the Limits of Data Governance Policies

Limits In IAM The Limit is a mathematical construct that describes what the output of a function does, given that the input is behaving in a certain way. Evaluating limits is a useful way to determine what happens to the...

shutterstock_1608251770

3 Steps to Success
for IAM Program Buy-In

The first step to any IAM initiative is obtaining buy-in from stakeholders. The core challenge in communicating IAM initiatives is that they are highly technical, yet the stakeholders have varying technical capabilities....

GCA-success-story-healthcare

Success Story: Identity Governance in a Large Healthcare Organization

Many organizations describe their Active Directory as a mess or a disaster. If you feel the same way, you’re not alone. Read on to learn how GCA helped a large healthcare organization get their systems in order with iden...

shutterstock_1745458508

Capital One’s Story: The $80 Million Price of Not Following Best Practices

There are big fines waiting out there for organizations that do not take information security seriously. In 2019, Capital One paid an $80 million civil penalty for its role in a security breach that exposed the personal ...

Data or network protection, businessman press shield icon, web button, virus cyber security. Insurance Digital crime by hacker concepts. Information security against viruses, System binary Matrix.

What is CyberArk and How Does It Work?

What is CyberArk? CyberArk is a popular IAM security tool. CyberArk offers several products and solutions—we’ll talk about that in more detail below. The easiest way to define the purpose of CyberArk is by calling it a p...

password-management

How Better Password Management Creates Better Employee Output

According to Gartner, between 20% and 50% of all IT Help Desk calls are for password resets. For the end-user, this can be an extremely disruptive and frustrating process. As identity management specialists, GCA has seen...

Cybersecurity Digital Technology Security 3D Illustration

How to Use CyberArk Password Vault

What is the Enterprise Password Vault? CyberArk’s Enterprise Password Vault (EPV) enables organizations to secure, manage, automatically change and log all activities associated with all types of Privileged Passwords and...

ransomware

Key Takeaways:
Colonial Pipeline Attack

No one would have guessed that a typical ransomware attack would create a domino effect that ended in half of the United States going without gas. The Colonial Pipeline Attack was the wake-up call a lot of IT leaders nee...

Smart Female IT Programer Working on Desktop Computer in Data Center System Control Room. Team of Young Professionals Doing Code Programming

ForgeRock OpenAM Vulnerability: What You Need to Know

On Monday, July 12, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) gave notice of a vulnerability with ForgeRock’s OpenAM. This popular Access Management platform is used as a front end for web applica...

Featured Image

Gartner Identity & Access Management Summit 2019 Takeaways

For the second year in a row, GCA attended Gartner’s Identity & Access Management Summit 2019 in Las Vegas, Nevada. We spent three days learning about new IAM strategies, sharing insights and meeting with leaders in ...

Call Now ButtonTalk To Our CTO Now