Product Support
Support for your product in a single location.
Downloads
New releases, updates and patches.
Professional Services
Maximize your investmentFind out how we can help
Executive Blog
Our leaders' commentary on news inthe software industry. Read now
Careers
Where do you want to be?Search jobs
Providing employees with the right access to business-critical information should be managed by the business and not by IT. That’s why the Quest One Identity Solutions offering empowers the business to govern the access necessary to operate in an agile and effective manner, while reducing the burden on IT.
For access governance Quest One gives you the visibility and control necessary to:
Already know which product will simplify your work? Review this list to find it – and browse related products.
Review the capability categories below to find a solution for your specific IT challenges.
The Quest One Identity Solutions offering overcomes some of the biggest challenges associated with access attestation and recertification – namely the conflict between IT’s ability to gather the information (but lack of understanding of the actual business needs associated with entitlements) and the business’ understanding of who should access what (but lack of visibility into the actual systems and technologies that control entitlements). Learn more »
The Quest One Identity Solutions offering provides an end-to-end solution for the entire lifecycle of providing employees with the access they need to do their jobs. Quest One automates request and fulfillment to move these processes out of the hands of IT and into the hands of the business. Learn more »
The Quest One Identity Solutions offering provides a closed-loop approach to access governance that ensures complete adherence to established policies and controls in the hands of the right people.
The Quest One Identity Solutions offering automates multi-platform data access governance to satisfy compliance requirements and quickly address security threats – and prevent them in the first place! Learn more »
The Quest One Identity Solutions offering enables automated, codeless, business-driven provisioning of user identities and access privileges enterprise-wide. Quest One adds identity intelligence to provisioning to overcome the typical security, cost, deployment and complexity limitations of “traditional” IAM frameworks at a fraction of the cost and deployment burden. Learn more »
The Quest One Identity Solutions offering provides federation by enabling a single point of user authentication and a single authorization mechanism across organizational barriers.
The Quest One Identity Solutions offering enables consistent management of access to heterogeneous applications, Web services and data across the enterprise through fine-grained authorization using the XACML standard.
The Quest One Identity Solutions offering synchronizes identity data (users, groups, passwords and supporting data for roles) enterprise-wide to support a unified and intelligent approach to identity and access management.
The Quest One Identity Solutions offering consolidates all roles, actions, policies, rights and resources into a single, well-controlled and flexible IAM structure that adjusts as needs and systems evolve. Quest One provides you with control and a clear view of all IAM components, enabling you to make sound decisions based on real-time intelligence, thus reducing risk. Learn more »
The Quest One Identity Solutions offering helps you control access by providing an optimized structure with automation to address all of your enterprise role management needs. Quest One enables you to granularly define and administer roles, as well as attach business-driven access control, policy, workflows and attestations to roles in order to meet security, efficiency and compliance objectives. Learn more »
Browse the technology platform categories below to find solutions for your unique IT challenges.
Quest One moves access certification away from IT and firmly into the hands of business managers. With Quest One, those that are in the know, now have quick and easy access to all the information they need to confidently review and certify access rights across the entire enterprise.
Quest One automates the process of approving access requests according to established security and compliance policies. Using identity intelligence, an intuitive interface allows access requests to be processed immediately through a complete workflow that includes all required approvals, audit trails and notifications. Quest One eliminates the delays and errors associated with IT-driven access request and fulfillment.
Quest One gives business managers complete visibility into what their employees have access to (in terms they understand). Views are automatically generated based on manager role, need-to-know factors and with a close eye to separation of duties and established policy.
Quest One not only shows managers “what” their employees have access to, but it also provides complete drill-down details that make recertification even more accurate. Quest One augments the “what” of access certification with a view into how the employee got the access in question, who approved it and when, and even why that access was granted in the first place.
Quest One gives users and managers the ability to request access without engaging in an endless round of emails and phone calls. Familiar shopping cart interfaces (controlled by role-based rules) ensure that employees get what they need and managers keep employees productive from day one – with all necessary approvals and audit trails.
ActiveRoles Server provides out-of-the-box user and group account management, strictly enforced administrator-based role security, day-to-day identity administration and built-in auditing and reporting for Windows-centric environments.
Quest One ensures that fulfilling access requests happens rapidly and completely without requiring IT intervention. Quest One’s modeled approach to IAM means that a single request, workflow and approval process results in a rapid and accurate provisioning of all required access.
Quest One overcomes the time, cost and functionality shortcomings of traditional enterprise provisioning solutions by leveraging a modeled approach to IAM. Quest One workflows are easily configured rather than entirely customized, which provides much quicker deployment times and dramatically increased flexibility. These fulfillment processes can include all the self-service, automated approvals, notification and fulfillment needs of even the most complex environments.
Quest One presents entitlement, request, fulfillment and certification data in clear, easy-to-understand dashboard displays. Dashboard views are role-based, enabling you to present each business manager with the data they need in a manner that is easy to understand, interpret, and actionable (right from the dashboard).
Quest One removes the manual, error-prone processes typically associated with IT-driven access governance. With Quest One, attestations can be scheduled to occur regularly, automatically generating the required data, presenting it to the appropriate mangers, and notifying all relevant parties of the required action.
Quest One augments the "who has access to what right now" reports required for recertification and provides complete visibility into the historical aspect of who has ever had access to a particular resource, and what any individual has ever had access to.
Delivers fine-grained authorization for multiple SharePoint sites to meet the real-world demands of security-conscious enterprises.
Deliver consistent and effective access control across heterogeneous home-grown applications (including SharePoint), Web services and data across the enterprise through fine-grained authorization using the XACML standard. Empowers application developers to easily build appropriate authorization into applications without deep security protocol expertise.
Who are your users? What resources (such as file shares) do you have in your environment? Quest One enables you to discover and document the extent of SharePoint, and identify unstructured or orphaned data.
Classify data to identify whether it’s confidential, affected by any regulations (e.g., handling credit card numbers in accordance with PCI), and still relevant, or should it be archived? Determine who the business owners of data should be, and assess your identity and access management policies.
Assign the appropriate business owners of data – based on their roles, locations or other attributes. Going forward, the business owner will be the one to grant access, not IT. Perform the necessary checks for compliance to ensure separation of duties and establish automated workflow processes for future requests.
The ChangeAuditor family of products audits, alerts and reports on all changes made to: Active Directory (ADAM/ADLDS), Exchange, EMC, NetApp, SQL Server, Windows file servers and even queries against Active Directory—all in real time and without enabling native auditing.
Schedule regular business-level attestation of access to ensure accuracy and security. Generate detailed reports for auditors to prove adherence to regulations.
Use an access request portal so that users can request access to resources based on their role. Appropriate personnel can review the access to validate and implement automated responses that remediate any deviations from the rules.
InTrust securely collects, stores, reports and alerts on event data from Windows, Unix and Linux systems, helping you comply with external regulations, internal policies and security best practices.
Secure sensitive data, groups or access rights that you want to ensure are never altered and set up real-time alerts to notify you if change attempts are made. Log all changes in a secure depository that can’t be altered, separate from standard event logs, for forensic analysis later.
Quest One enables you to provision, re-provision and de-provision user accounts and group membership access to any system, platform or application within the enterprise (physical or virtual) with an emphasis on configuration rather than customization.
Initiate provisioning actions through business personnel requests and automatically fulfill the necessary actions based on established and proven workflows and approvals.
Webthority is an integrated security solution that enables you to provide employees, customers and partners with secure, browser-based access to essential information without adding infrastructure or complexity.
Enhance application security by externalizing authentication and authorization to applications, Web resources, Web services, and data – protecting systems from direct exposure.
Quest One Quick Connect products synchronize identity data enterprise-wide for users, groups and roles to support a unified and intelligent approach to identity and access management.
Synchronize authorization objects (typically groups) between directories in Active Directory, integrated applications or data sources.
Synchronize identities (typically user accounts) to and from other systems enabling an Active Directory user to log onto non-Active Directory applications or data sources. Note: the PeopleSoft connector only syncs from PeopleSoft to other systems.
Set initial passwords during account creation, capture password changes in Active Directory and synchronize passwords between connected systems.
Quest One provides a unifying model to establish and implement enterprise-wide policies and roles to ensure they are applied consistently and efficiently. This means that all IAM operations, such as provisioning, occur according to established rules and policies defined by the organization. A single set of controlling factors influences all of IAM enterprise-wide.
Quest One identity intelligence capabilities deliver a complete 360-degree view of all components of IAM, their relationships to each other, the policies and rules that affect them and the impact of changes to present and future IAM operations. With Quest One, business managers gain complete visibility into what their employees have access to – in terms they understand.
Quest One enables you to implement an IAM strategy that best suits your organization. Quest One identity intelligence capabilities take into account your organizational structure and culture, operational requirements as well as existing (or new) roles, rules and policies.
Quest One supports your continually evolving identity, policy and access requirements. The solutions' identity intelligence capabilities dynamically adjust with any change to your IAM environment. Access rights are automatically updated as roles evolve, new systems come online or new personnel are introduced into the IAM mix.
Quest One enables you to easily and accurately correlate user identities, roles and policies to access requirements, systems and regulations. By establishing relationships between IAM components, access rights are automatically updated as roles evolve, new systems come online or new personnel are added.
Quest One improves virtually any IAM operation by infusing a layer of identity intelligence, enabling you to optimize IAM for your environment, organizational needs and objectives. For example, enterprise provisioning is controlled by a common set of roles and policies that adjust dynamically to changes.
Quest One provides the structure and automation that enables you to unify roles enterprise-wide and use them to control access, improve security and maintain compliance. A simple and familiar interface streamlines and automates the tedious and error-prone process of managing roles manually or with traditional IAM framework solutions.
Quest One overcomes the major challenge of enterprise role management – the process of defining and executing roles – by delivering a powerful and extremely flexible structure upon which roles can be defined, correlated with user identities, tied to business-driven workflows and controlled through business-defined attestations.
Quest One enables you to build access control based on defined and established roles correlated with business processes and needs. This flexible approach enables you to implement the amount of control that best fits your organization’s culture, regulatory burden and environment.
Quest One automates and provides structure for the entire lifecycle of enterprise roles. You can easily and accurately create and modify roles, change their associations with specific access points and assign them to individuals.
Quest One helps you implement role-based access control (RBAC) enterprise-wide through the establishment, execution and administration of strong role management principles. Quest One’s automation, structure and business-driven focus moves role-based access control from a difficult-to-achieve objective to a functional reality.
Quest One provides an abstraction layer that enables you to automatically use identities and their access rights to establish the appropriate roles. These automated role mining capabilities can define roles using statistical analysis, assign them to the correct individuals and even address necessary exceptions.
Quest One helps you implement attribute-based access control (ABAC) enterprise-wide through externalized authorization that draws entitlements from whichever attributes your security policy requires.
Get the most from your investment with help from our highly rated support team, training programs, and implementation services.