Support for your product in a single location.
New releases, updates and patches.
Maximize your investmentFind out how we can help
Our leaders' commentary on news inthe software industry. Read now
Where do you want to be?Search jobs
The Quest One Identity Solutions offering minimizes the burden imposed on IT by compliance and audit demands. In addition to providing control of access and administration of identities, Quest One improves the way you “prove” your compliance through automation and reporting consolidation.
For user activity monitoring Quest One gives you the ability to:
Already know which product will simplify your work? Review this list to find it – and browse related products.
Review the capability categories below to find a solution for your specific IT challenges.
Quest One enables you to quickly and accurately determine and report on security incidents including what happened, who did what, how it was done, and who approved the access that resulted in the breach.
Quest One provides the ability to quickly and easily find accounts and users that have inappropriate access rights. These capabilities include an extremely deep discovery of Active Directory environments as well as access governance for the entire enterprise.
Quest One enables you to lock down critical resources to ensure that users cannot maliciously or unintentionally access data they should not access or perform tasks they are not authorized to perform.
Browse the technology platform categories below to find solutions for your unique IT challenges.
The ChangeAuditor family of products audits, alerts and reports on all changes made to: Active Directory (ADAM/ADLDS), Exchange, EMC, NetApp, SQL Server, Windows file servers and even queries against Active Directory—all in real time and without enabling native auditing.
Discover the who, what, where, when and why of user access activities across a wide range of systems, applications and platforms.
Gather event details beyond the capabilities available in native logs and tools, and turn meaningless log data into meaningful intelligence.
Identify and control user and group access rights to resources enterprise-wide, including the history of rights – who requested, who approved and how frequently rights are used.
ActiveRoles Server provides out-of-the-box user and group account management, strictly enforced administrator-based role security, day-to-day identity administration and built-in auditing and reporting for Windows-centric environments.
Automate the discovery of inappropriate access rights, orphaned accounts, and “mis-authorized” accounts across the enterprise.
Discover the who, what, where, when and why of user access rights and activities across a wide range of systems, applications and platforms.
Track the validity and change history of security policy including changes to access rights, Group Policy objects and Exchange environments.
Quickly and easily assess exactly who has rights to what and whether those rights are appropriate – including request and approval history.
Track changes to critical identity information including access rights, Group Policy objects, request and fulfillment and more.
Generate “smart alerts” for any activity that falls outside of approved security policy. In addition, Quest One enables you to proactively and automatically mediate violations.
Assess security policy and correctly associate access rights with the correct individual and report on the entire lifecycle of rights.
Get the most from your investment with help from our highly rated support team, training programs, and implementation services.
©2013 Dell Inc. ALL RIGHTS RESERVED. Acquisitions - Enstratius, PacketTrap, RemoteScan