Wednesday, 29 February 2012 07:34

Quest Software announces industry's most complete solution for identity and access management

By Michelle Taylor

Today's ever-increasing threat landscape has resulted in the deployment of disparate identity and access management (IAM) solutions that require an inordinate amount of time, resources and costs to administer. Unlike traditional IAM platforms, Quest Software has taken a completely unified approach with Quest One Identity Solutions, which is now reinforced by the newly acquired BiTKOO granular access technology. As a result, Quest Software is positioned to deliver the most comprehensive IAM solution on the market that lets businesses save time, reduce costs and increase security.

Quest Software has expanded its Quest One Identity Solutions portfolio to deliver the market's most robust solution for externalising, unifying, securing, and simplifying access control, one of the most troublesome components of IAM strategy.

Quest Software is currently re-branding the BiTKOO solutions and will soon be releasing Quest One Authorisation Policy Server (the former BiTKOO Keystone solution) and Quest One Authorisation Policy Server for SharePoint (the former BiTKOO Keystone for SharePoint solution).

The integration of the Quest One Identity Solutions portfolio with the Keystone technology of BiTKOO, a leading externalised authorisation management specialist acquired by Quest Software in December 2011, extends Quest One's power, letting businesses save time, reduce costs and increase security.

The Quest One Identity Solutions portfolio further improves access control with:

* seamless security integration: BiTKOO technology eliminates a 'siloed' and disjointed security strategy through a security dial tone approach.  This 'dial tone' acts as a common security paradigm, which is easily and consistently implemented and eliminates ad-hoc, inconsistent and custom security coding on individual applications

* compliance confidence: BiTKOO technology complements Quest One's powerful capabilities for gathering information and increasing visibility into who has access to what, when and how they got it, and how it was approved

* fast, cost effective implementation: the addition of BiTKOO technology rounds out the Quest One portfolio by providing additional capabilities that support Quest One's modular and integrated approach, which can be implemented precisely to the customer's needs.

Nick Nikols, vice president and general manager, Identity and Access Management, Quest Software, said, 'Government regulations and increased security concerns are critical factors affecting businesses today. Organisations need the confidence that their enterprises are secure and compliant without sacrificing business agility.

'Quest Software's core objective with Quest One is to reduce complexity, cost and risk in the enterprise by providing a simplified and business-focused approach to identity and access management.  The addition of the BiTKOO technology into the Quest One Identity Solutions portfolio is a significant advancement in offering customers and partners a more complete, best-in-class identity management solution. '


As part of our Lead Machine Methodology we will help you get more leads, more customers and more business. Let us help you develop your digital marketing campaign

Digital Marketing is ideal in these tough times and it can replace face to face marketing with person to person marketing via the phone conference calls and webinars

Significant opportunity pipelines can be developed and continually topped up with the help of Digital Marketing so that deals can be made and deals can be closed

- Newsletter adverts in dynamic GIF slideshow formats

- News site adverts from small to large sizes also as dynamic GIF slideshow formats

- Guest Editorial - get your message out there and put your CEO in the spotlight

- Promotional News and Content - displayed on the homepage and all pages

- Leverage our proven event promotion methodology - The Lead Machine gets you leads

Contact Andrew our digital campaign designer on 0412 390 000 or via email



Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.




Recent Comments