Product Support
Support for your product in a single location.
Downloads
New releases, updates and patches.
Professional Services
Maximize your investmentFind out how we can help
Executive Blog
Our leaders' commentary on news inthe software industry. Read now
Careers
Where do you want to be?Search jobs
A user identity drives everything in the user workspace – including applications, settings and permissions. To provide a seamless experience for users, you need to have a single user identity that governs their presence on every device and platform. With Quest, you can proactively define, configure, protect and support the user identity. Centrally manage all aspects of one identity for each user while providing a more standardized and secure environment. Rely on us to:
Already know which product will simplify your work? Review this list to find it – and browse related products.
Review the capability categories below to find a solution for your specific IT challenges.
Browse the technology platform categories below to find solutions for your unique IT challenges.
We help you centralize management of all aspects of the user identity -- including security privileges, single sign-on and consolidation of user-specific access -- across physical, virtual and cloud environments.
With Quest, you can proactively configure, secure and support the user experience in Windows desktops as well empower users to securely reset forgotten passwords used in Active Directory. Powerful management tools can also be integrated to the help desk team to immediately diagnose and resolve issues from within help desk tickets.
We let IT administrators grant selected privileges to users so they can update their own PCs, reducing help desk calls while maintaining a secure network.
Webthority is an integrated security solution that enables you to provide employees, customers and partners with secure, browser-based access to essential information without adding infrastructure or complexity.
Quest lets you consolidate multiple SaaS and on-premise web resources and applications in one location as well as provide instant access. We help you implement a secure reverse proxy architecture so that only the appropriate users have remote access using AD-based SSO. We also enable two-factor and multi-factor authentication to network, web and applications-based resources.
Get the most from your investment with help from our highly rated support team, training programs, and implementation services.