Product Support
Support for your product in a single location.
Downloads
New releases, updates and patches.
Professional Services
Maximize your investmentFind out how we can help
Executive Blog
Our leaders' commentary on news inthe software industry. Read now
Careers
Where do you want to be?Search jobs
Quest One helps you control and audit administrative access with privileged credentials through granular delegation and command control, keystroke logging and session audit, policy-based control, and secure and automated workflows. This approach enhances security and compliance while improving the efficiency of administering superuser access. Administrators are granted only the rights they need—nothing more, nothing less—and all activity is tracked and audited.
Already know which product will simplify your work? Review this list to find it – and browse related products.
Review the capability categories below to find a solution for your specific IT challenges.
Browse the technology platform categories below to find solutions for your unique IT challenges.
Quest One eliminates the “keys to the kingdom” problem across your enterprise. Administrators are granted only the rights they need—nothing more, nothing less—and all activity is tracked and audited.
Automate and secure the request, approval, issuance, return and automatic changing of administrative credentials across the entire diverse enterprise with a comprehensive audit trail of the process. Delivered via a secure, hardened appliance, the Quest One solution also overcomes the security concerns of passwords hard-coded into scripts as applications communicate with other applications or databases.
ActiveRoles Server provides out-of-the-box user and group account management, strictly enforced administrator-based role security, day-to-day identity administration and built-in auditing and reporting for Windows-centric environments.
Improve security and achieve compliance by implementing agent-based granular delegation of administrative access on Unix and Linux systems, as well as Active Directory and virtual desktops. Quest One also provides proxy-based command control for multiple operating systems, including Windows, Unix, Linux and Mac, as well as a variety of devices. The Quest One approach enables organizations to provide only the appropriate amount of access required for administrators to do their jobs across the widest range of systems and applications.
Gain comprehensive audit of activities performed with elevated privileges across a variety of systems. Capabilities include keystroke logging for delegated root access, including through Sudo, proxy-based session audit of activities on Windows, Unix, Linux, Mac, Web applications, databases, mainframes and devices, and complete tracking of policy and activities associated with the privilege safe.
Base elevated access on strong policy and group membership within Active Directory—including support for Unix and Linux—and on dedicated, platform-specific policies within the delegation tools themselves. This strategy eliminates ad-hoc, box-by-box authorizations across the entire population of non-Windows systems.
Strengthen administrative access security with multifactor authentication for pre-determined actions, roles or systems. Quest One integrates its multifactor authentication solutions with Active Directory (and AD-based role management solutions), non-Windows systems and platform-specific privileged account delegation tools.
Streamline administration and easily provide access control reporting for sudo. The Quest One solution enhances sudo 1.8.1 (and newer) with a central policy server, centralized management of sudo and the sudoers policy file, centralized reporting on sudoers access rights and activities, as well as keystroke logging of activities performed through sudo.
Centralize management of administrative accounts for mixed platforms, including Unix, Linux and Mac. Quest One enables you to leverage the built-in, role-based authorization capabilities of Active Directory for non-Windows systems.
Achieve flexible, granular access controls for Active Directory with role-based delegation, command control and session audit to ensure that all administrative actions are consistent with your organization's security standards. Business rules can be created to trigger approvals or constraints on role-based controls. In addition, password vault functionality can secure and control use of full administrative credentials.
Achieve flexible, granular access controls for the Windows administrator account through password vault functionality, session audit and command control.
Define a security policy that stipulates who has access to which root function, as well as when and where individuals can perform those functions. In addition, track all activities performed using elevated access (even down to the keystroke level). In addition, enhance open-source Sudo with centralized policy management, access reporting and keystroke logging. Visit the open source Sudo project to learn more about Quest’s sponsorship of the Sudo project and to download plug-ins.
Control superuser access on enterprise applications through a controlled and automated password vault that uses consistent policy to enforce proper request, approval, issuance, logging, return and changing of administrative credentials. This capability includes the application-to-application (A2A) and application-to-database (A2D) passwords that are typically hard-coded into scripts, eliminating a major security and compliance hole.
Control superuser access on applications through a controlled and automated password vault that uses consistent policy to enforce proper request, approval, issuance, logging, return and changing of administrative credentials. This capability includes the application-to-application (A2A) and application-to-database (A2D) passwords that are typically hard-coded into scripts, eliminating a major security and compliance hole.
Control superuser access on Web applications through a controlled and automated password vault that uses consistent policy to enforce proper request, approval, issuance, logging, return and changing of administrative credentials. This capability includes the application-to-application (A2A) and application-to-database (A2D) passwords that are typically hard-coded into scripts, eliminating a major security and compliance hole. In addition, Quest One provides the ability to perform session audit on administrative access to Web-based applications.
Control superuser access on RACF-based systems through a controlled and automated password vault that uses consistent policy to enforce proper request, approval, issuance, logging, return and changing of administrative credentials. In addition, Quest One provides the ability to perform session audit on administrative access to mainframes.
Control superuser access on SQL systems through a controlled and automated password vault that uses consistent policy to enforce proper request, approval, issuance, logging, return and changing of administrative credentials. In addition, Quest One provides the ability to perform session audit on administrative access to SQL.
Control superuser access on devices (for example routers) through a controlled and automated password vault that uses consistent policy to enforce proper request, approval, issuance, logging, return and changing of administrative credentials. In addition, Quest One provides the ability to perform session audit on administrative access to those same devices.
Get the most from your investment with help from our highly rated support team, training programs, and implementation services.