LATEST NEWS

DataBank Establishes $725M Financing Facility to Support Growth. Read the press release.

Get a Quote

Request a Quote

Tell us about your infrastructure requirements and how to reach you, and one of team members will be in touch shortly.

Schedule a Tour

Tour Our Facilities

Let us know which data center you'd like to visit and how to reach you, and one of team members will be in touch shortly.

Get a Quote

Request a Quote

Tell us about your infrastructure requirements and how to reach you, and one of team members will be in touch shortly.

Schedule a Tour

Tour Our Facilities

Let us know which data center you'd like to visit and how to reach you, and one of team members will be in touch shortly.

Get a Quote

Request a Quote

Tell us about your infrastructure requirements and how to reach you, and one of team members will be in touch shortly.

Schedule a Tour

Tour Our Facilities

Let us know which data center you'd like to visit and how to reach you, and one of team members will be in touch shortly.

Identity Access Management in Enterprise IT Webinar

Identity Access Management in Enterprise IT Webinar

Identity Access Management (IAM) technologies can be used to initiate, record, and manage user identities and their access permissions to provide oversight and visibility into all aspects of the company user base.

Businesses and organizations are under increased regulatory scrutiny when it comes to protecting access to critical information. Identity Access Management (IAM) technologies can be used to initiate, record, and manage user identities and their access permissions to provide oversight and visibility into all aspects of the company user base. It is important for IT leaders to have a comprehensive system to control user access by identifying users and their roles, updating as needed, assigning levels of access, and protecting sensitive data within the system with the appropriate security measures. These tightly controlled and automated systems align with the increasing security requirement.

What Will This Webinar Address?

  • IAM in enterprise IT addresses the following:
  • Creating one digital identity for each end user
  • Defining and Managing Roles and Access Privileges of users and devices
  • Managing access to cloud and on-premises applications
  • Onboarding and offboarding individuals
  • Maintaining and modifying access across each device as needed
  • Track user activities

About Mark Houpt

CISO

Mark serves as DataBank’s Chief Information Security Officer and is responsible for developing and maintaining the company’s security program road map and data center compliance programs. He brings over 30 years of extensive information security and information technology experience in a wide range of industries and institutions. Mr. Houpt holds an MS-ISA (Masters Information Security and Assurance), numerous security and technical certifications (CISSP, CEH, CHFI, Security +, Network+) and qualified for DoD IAT Level III, IAM Level III, IASAE Level II, CND Analyst, CND Infrastructure Support, CND Incident Responder, and CND Auditor positions and responsibilities.

Mark is an expert in understanding and the interpretation of FedRAMP, HIPAA and PCI-DSS compliance requirements. He is an active member of ISC2, ASIS International, COMPTIA, IAPP, and ISACA, among other leading national and international security organizations. Mark drives DataBank’s information security and compliance initiatives to ensure that the company’s solutions continuously meet rigorous and changing compliance and cyber-security standards.

Discover the DataBank Difference

Discover the DataBank Difference

Explore the eight critical factors that define our Data Center Evolved approach and set us apart from other providers.
Download Now
Get Started

Get Started

Discover the DataBank Difference today:
Hybrid infrastructure solutions with boundless edge reach and a human touch.

Get A Quote

Request a Quote

Tell us about your infrastructure requirements and how to reach you, and one of the team members will be in touch.

Schedule a Tour

Tour Our Facilities

Let us know which data center you’d like to visit and how to reach you, and one of the team members will be in touch shortly.