Quest One Identity Solutions reinforced by the newly acquired BiTKOO granular access technology

February 28, 2012

4 Min Read

PRESS RELEASE

SAN FRANCISCO--(BUSINESS WIRE)--Quest Software, Inc. (NASDAQ: QSFT):

Today’s ever-increasing threat landscape has resulted in the deployment of disparate Identity and Access Management (IAM) solutions that require an inordinate amount of time, resources and costs to administer. Unlike traditional IAM platforms, Quest Software has taken a completely unified approach with Quest One Identity Solutions, which now is reinforced by the newly acquired BiTKOO granular access technology. As a result, Quest is uniquely positioned to deliver the most comprehensive IAM solution on the market that enables businesses to save time, reduce costs and increase security.

Tweet This: Simplify & improve #application authorization with the @Quest One Identity Solutions portfolio. http://bit.ly/w3myzm #QuestOne #RSAC

News Facts:

Quest Software has expanded its Quest One Identity Solutions portfolio to deliver the market’s most robust solution for externalizing, unifying, securing, and simplifying access control – one of the most troublesome components of IAM strategy.

Quest is currently re-branding the BiTKOO solutions and will soon be releasing Quest One Authorization Policy Server (the former BiTKOO Keystone solution) and Quest One Authorization Policy Server for SharePoint (the former BiTKOO Keystone for SharePoint solution). The integration of the Quest One Identity Solutions portfolio with the Keystone technology of BiTKOO, a leading externalized authorization management specialist acquired by Quest in December 2011, extends Quest One’s power, enabling businesses to save time, reduce costs and increase security. The Quest One Identity Solutions portfolio further improves access control with: Seamless security integration: BiTKOO technology eliminates a “siloed” and disjointed security strategy through a security dial tone approach. This “dial tone” acts as a common security paradigm, which is easily and consistently implemented and eliminates ad-hoc, inconsistent, and custom security coding on individual applications. Compliance confidence: BiTKOO technology fully complements Quest One’s powerful capabilities for gathering information and increasing visibility into who has access to what, when and how they got it, and how it was approved. Fast, cost effective implementation: The addition of BiTKOO technology rounds out the Quest One portfolio by providing additional capabilities that fully support Quest One’s modular and integrated approach, which can be implemented precisely to the customer’s needs. RSA Conference: Quest Software will showcase its market-leading products at the RSA Conference, booth 2339 in San Francisco, Feb. 27-March 2.

Supporting Quotes:

Nick Nikols, vice president and general manager, Identity and Access Management, Quest Software “Government regulations and increased security concerns are critical factors affecting businesses today. Organizations need the confidence that their enterprises are secure and compliant without sacrificing business agility. Our core objective with Quest One is to reduce complexity, cost and risk in the enterprise by providing a simplified and business-focused approach to identity and access management. The addition of the BiTKOO technology into the Quest One Identity Solutions portfolio is a significant advancement in offering our customers and partners a more complete, best-in-class identity management solution. With today’s announcement, Quest has raised the bar for the IAM market and made costly, ineffective IAM solutions a thing of the past.”

Blake Cooke, lead developer, Electronic Services Section of the Franchise Tax Board “Security is of the utmost importance for our customers, who rely on us to help them conduct business on the Internet, so choosing an identity and access management solution that would allow us to ensure that our users have precise access to the right applications was no small endeavor. Only Quest, with its BiTKOO Keystone technology, met our stringent requirements for compliance, security controls and visibility across the entire organization. Yet, it was surprisingly simple to deploy. Now taxpayers, business entities, and tax professionals are able to conduct business with the FTB through secure self-serve applications. The shift has improved our customer service and has freed up our internal resources and personnel, a cost savings we’re now able to pass on to our end users.”

Martin Kuppinger, analyst, Kuppinger Cole “Dynamic authorization management is a core piece of identity and security services and application security infrastructures. Quest’s acquisition of BiTKOO makes Quest one of the vendors with a comprehensive portfolio of IAM solutions and a really interesting competitor in that market.”

Todd Rossin, managing partner and co-founder, IDMWORKS “The Quest One value is realized within the first few minutes of a demonstration or proof of concept. Developers are impressed by the flexibility and immediately begin to think of the opportunities to replace their archaic methods of implementing authorization within their applications. Our business community and auditors welcome the adherence to standards (XACML 3.0) and consistency that the technology introduces. In short, it helps our clients solve complex business issues and provides peace of mind through innovative and simple solutions.”

Supporting Resources:

Quest Software, Inc.: http://www.quest.com/ More Quest news: http://www.quest.com/newsroom/ Twitter: http://mobile.twitter.com/quest Facebook: http://www.quest.com/facebook LinkedIn: http://www.linkedin.com/ Quest TV: http://www.quest.com/tv/

About Quest:

Established in 1987, Quest Software (Nasdaq: QSFT) provides simple and innovative IT management solutions that enable more than 100,000 global customers to save time and money across physical and virtual environments. Quest products solve complex IT challenges ranging from database management, data protection, identity and access management, monitoring, user workspace management to Windows server management.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights