Welcome!

Machine Learning Authors: Liz McMillan, Yeshim Deniz, Pat Romanski, Elizabeth White, Corey Roth

News Feed Item

Dell’s Quest Software Placed in a Challengers Position in Gartner’s Magic Quadrant for Identity Access and Governance

Dell Software today announced that Quest Software, now a part of Dell, is positioned in the Challengers quadrant of the 2012 Gartner Magic Quadrant for Identity and Access Governance (IAG). Dell Quest’s position in the quadrant is based on its completeness of vision and ability to execute for Identity and Access Management and the current IAG functionality incorporated into Quest® One Identity Manager, part of Quest One Identity Solutions.

The report, issued on December 17, 2012, evaluates a vendor’s ability to execute, including the ability to enable IT providers’ and business users’ performance to be competitive, efficient and effective, and to positively impact revenue, retention and reputation. Vendors also are judged on their ability and success in capitalizing on their vision. Quest One Identity Solutions enable access governance, privileged account management, identity administration, and user activity monitoring — today’s most pressing identity and access challenges.

“We believe our position in the Challengers quadrant underscores our evolving mission to provide our customers with exceptional quality, user experience, and service levels, as well as low cost of ownership and business value,” said John Milburn, vice president and general manager, Quest Identity and Access Management, Dell Software. “We will continue to innovate while we execute on our vision to deliver solutions that will change the face of the security industry.”

The new IAG market reflects industry changes brought about by the nexus of forces — cloud, mobile, social and information. According to Gartner, IAG as a discipline within enterprises continues to evolve. The competitive differentiator for Quest One Identity Solutions is that it empowers the business owner (not IT) to govern employees’ access to business-critical information by providing the right users with the right access for just the right amount of time, while ensuring the organization continues to operate in a secure and compliant manner.

News Facts:

  • Quest Software continues to innovate in the creation of a compelling Identity and Access Management-related product set, and has capitalized on its vision with a significant number of customer wins.
  • Quest One Identity Manager protects the organization by giving access control to the business owners who actually know who should have access to which sensitive data.
  • In addition to helping data owners (not IT) determine who should have access, Quest One Identity Manager automates the request-and-approval workflow, keeping the sensitive data secure, while reducing the burden on IT.
  • Quest One Identity Manager enables organizations to integrate with other Quest One solutions, including Quest ActiveRoles® Server, Quest Password Manager, Quest Webthority, Quest Defender® and Quest One Quick Connect, to add additional IAM functionality.

Supporting Resources:

About the Magic Quadrant:

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Dell

Dell Inc. (NASDAQ: DELL) listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com and http://www.quest.com.

RSS Feeds:

Technorati Tags:
Quest Software

Dell is a trademark of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.

Quest, Quest Software, and the Quest logo are trademarks or registered trademarks of Quest Software in the United States and certain other countries. All other names mentioned herein may be trademarks of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

CloudEXPO Stories
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Digital Transformation is well underway with many applications already on the cloud utilizing agile and devops methodologies. Unfortunately, application security has been an afterthought and data breaches have become a daily occurrence. Security is not one individual or one's team responsibility. Raphael Reich will introduce you to DevSecOps concepts and outline how to seamlessly interweave security principles across your software development lifecycle and application lifecycle management. With these new automated application security methodologies, organizations will be able to minimize their risk with digital transformation & migration to the cloud, comply to new regulations, and prevent data breaches from ever happening.
With more than 30 Kubernetes solutions in the marketplace, it's tempting to think Kubernetes and the vendor ecosystem has solved the problem of operationalizing containers at scale or of automatically managing the elasticity of the underlying infrastructure that these solutions need to be truly scalable. Far from it. There are at least six major pain points that companies experience when they try to deploy and run Kubernetes in their complex environments. In this presentation, the speaker will detail these pain points and explain how cloud can address them.
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Get started on automating your way to a brighter future!