Notice: will be retired soon. Please visit our new site at

Cybersecurity/Identity & Access Management

Your job is to protect your infrastructure against misuse and direct threats, both internal and external. And that gets more complex as the technology does. Plus, it’s a job that gets harder as users want more access, the bad guys get more weapons, and your funding fails to keep pace.

These challenges apply to federal civilian agencies dealing with the ever-changing lists of mandates and memoranda, from Section 508 to HSPD-12 and the FICAM framework. They apply to the defense and intelligence community as they protect our security and support the warfighters on the front lines. They apply to state and local governments trying to do more with less while keeping their infrastructures safe and secure. And they apply to education institutions looking for ways to expand their ability to collaborate and share with other schools.

We provide powerful enterprise-wide solutions for cybersecurity, identity and access management (IAM), credential management, federation, compliance auditing and reporting. Quest One Identity Solutions include the industry’s most complete suite of privileged access management offerings that enable you to granularly control and audit administrative access to your environment.

Our Quest One solutions for identity intelligence provide your organization with complete control and 360-degree visibility on all IAM components so that you can make sound decisions in real time based on the needs of your organization – and not the limitations of your technology.

We’re the only vendor that can enable you to reach all of your IAM objectives – providing rapid time to value, unifying your existing infrastructure, and bringing simplicity to your organization’s complex security challenges.

To help agencies comply with the Federal Information Security Management Act (FISMA), federal cybersecurity experts published the Consensus Audit Guidelines, a document which identifies 20 security controls that are important for blocking cyberattacks. This technical brief explains how we can help you meet the requirements of 13 of these controls.

FICAM for All

The Federal Identity, Credential, and Access framework – FICAM – is the architectural foundation for cybersecurity in the federal government. Our cybersecurity capabilities support all of the key FICAM components: identity management, access management, credential management, federation, and auditing and reporting.

Public sector organizations across the board – federal, state, and local governments as well as institutions of higher learning – need these capabilities. Assuring that your users can do what they need to do, and access what they are allowed to access – no more, no less – is a key to securing your infrastructure. Enabling organizations to securely recognize identities from one another is a key to maximizing resources, increasing efficiency, and collaborating productively. And the ability to audit and report on your infrastructure is a key to regulatory compliance, forensics, and trending. Learn more »

One Solution

The industry-leading Quest One Identity Solutions, a suite of products anchored by Quest One Identity Manager, helps civilian agencies and the Department of Defense use the FICAM framework to meet the long list of federal cybersecurity mandates. The suite helps state and local governments and higher education institutions optimize the identity infrastructure already in place through automation and consolidation. And it makes single sign-on a reality across Windows and non-Windows identity repositories. Its identity intelligence technology ties together identities, roles, rules, workflows, policies, and approvals. Other Quest One products support provisioning, password management, and multifactor authentication. They also enable the truly granular control of privileged account management across Windows and Unix systems that’s needed to maintain security, compliance, and accountability.

Learn more about the Quest One Identity Solutions

Automating Access

ActiveRoles Server is our core IAM product for organizations that use Active Directory as the common directory service. It can provision, deprovision and reprovision accounts from AD or AD LDS to a number of targets, including LDAP directories, databases, and Google Apps. Learn more about ActiveRoles Server

Authentication Services is patented, next-generation technology that provides an Active Directory bridge to Unix, Linux, and Mac as well as a number of enterprise applications. Learn more about Authentication Services

Our cybersecurity and identity/access Management solutions provide the solid foundation you must have so that you can provide the safe and secure services your mission – and your users – require.

Privileged Acct Mgmt

Quest One Identity Solutions for privileged account management cover a range of needs from shared credential management and security to platform-specific delegation and all of the audit needs to enforce access control and separation of duties. When combined with identity intelligence, you’ll be able to establish a common policy set for privileged users and accounts, including the ability to certify those elevated access rights.

Quest One solutions for privileged password management, session management and command delegation ensure that you can provide elevated privileges at a highly granular level, through role-based policies – or on an ad hoc basis – without disclosing passwords to the privileged user. We give you all the auditing and reporting capabilities you need for security, compliance and forensic purposes, including keystroke logging and session recording and playback. Quest One solutions for privileged account management tie together all of your enterprise platforms – applications, databases, Windows, Unix, Linux, Macs and mainframes to offer:

  • A consistent and auditable policy
  • An enterprise password vault
  • Session audit
  • Granular delegation of privileged access
  • Keystroke logging
  • Sudo enhancement


The Transglobal Secure Collaboration Program (TSCP) is a unique global government-industry partnership supported by the U.S. Department of Defense and the UK Ministry of Defence. Its goal is to develop and implement new global information security specifications for secure collaboration, information sharing and identity assurance in mission-critical environments. Common standards will enable the global aerospace and defense industries, as well government entities, to cooperate on projects without jeopardizing classified and sensitive information. Visit for more information

We offer innovative technology that supports efficient and secure identity and access management for TSCP partners. Learn more »


White Papers

10 Reasons You Absolutely Need an Active Directory Reporting Solution to Pass Audits, Improve Security and Reduce Costs Better Together: How the Quest One Identity Solution Products Enhance Each Other Choosing the Right Active Directory Bridge Solution Collecting Compliance Evidence: The Role of Event Logs Controlling and Managing Super User Access Dell vWorkspace Feature Set as it Relates to Higher Education Embracing Bring Your Own Device (BYOD) - How to Balance User Freedom with Corporate Control Hey, Can I Borrow Your Keys? I'd Like to Trash the Kingdom: Managing Privilege in Unix Based Systems How Password Lifecycle Management Can Save Money and Improve Security How to Leverage Desktop Virtualization in Finance Identity and Access Management: You Have to Be Compliant, You Want Security and Efficiency. Why Not Get It All? Identity Management Government Survey Results Improving the Efficiency and Effectiveness of an Identity and Access Management Framework Kuppinger Cole Vendor Report - Quest Software Multifactor Authentication for Dummies eBook Quest Software Edition Overcoming Identity and Access Management Challenges eBook Series Provisioning for Dummies eBook Quest Software Edition Research Report - Strong User Authentication: Best-in-Class Performance at Assuring Identities Role Management for Dummies eBook Quest Software Edition Solving the Privilege Management Paradox Tenets of Identity Management The FICAM Framework: Challenges and Guidance for Federal Identity, Credential and Access Management The Power of One: Simplify Identity and Access Management The Service Provider Management Imperative: Leverage the Right Solutions to Seize New Market Opportunities back to top

Case Studies

Barry University Adapts Quickly to Changes Using ActiveRoles Server to Automate Its Provisioning Process and Manage Active Directory Brighter Future for Knox County Schools City of Phoenix Active Directory Consolidation Cornell University Manages and Centralizes a Distributed AD Environment with Quest ActiveRoles Server Gwinnett County Public Schools Finds a Better Way to Manage Electronic Accounts and Provisioning Howard County, MD Performance and Progress Keeping IT in Shape: Texas Health and Human Services Commission stays healthy with its new Active Directory system. Large University Understands Importance of AD Management Los Angeles County Public Health Active Directory Consolidation Mobile network operator enables secure access for consultants Oklahoma City Finds an Easy, Inexpensive Way to Implement Two-Factor Authentication for 5,000 Users Oldham Council Learns Quest has the Answer for Efficient and Secure AD Management Quest Defender Provides Secure, Affordable Two-Factor Authentication for Oklahoma City Quest Solutions Help Georgian College Graduate to a More Secure, Easily Managed Active Directory and Exchange Environment San Bernardino County Streamlines Identity and Access Management For Greater Efficiency Swiss Post Speeds Delivery of Active Directory with ActiveRoles The National College of Ireland Gets a Higher Education on Identity Management - and Greater Productivity - from Quest The W. P. Carey School of Business Makes a Smart Investment in Quest ActiveRoles™ Server Torre-Pacheco City Council Reduces Desktop Maintenance Costs and Improves End-user Services with Quest vWorkspace Working Together to Improve Public Safety: Wake County, NC Sherriff's Office back to top

Support Docs, Notes and Guides

Cybersecurity FAQ's back to top