Product Report: Quest Defender
A special feature, though hardly surprising coming from Quest, is the deep integration it provides with Active Directory, Microsoft’s near-ubiquitous directory service. Identities, roles and policies are administered within Active Directory itself, thus enabling users to hitch on to existing AD infrastructures and transforming them into a foundation for strong authentication. Integration with other systems is also possible, either in the form of strong authentication solutions already in place or by transmitting requests to other directory services.
We are impressed by Quest Defender’s ability to integrate flexibly with legacy systems as well as applications and existing partial solutions for strong authentication. This greatly facilitates either “peaceful coexistence” of different systems or the gradual migration to Quest Defender.
Limitations exist in support of non-OTP hard tokens. However, there are enough alternatives to choose from. On the other hand, mobile users are well supported.
Customers in search of a solution for strong authentication should consider Quest Defender for a number of very good reasons. First, it is extremely simple to implement, yet both powerful and com-prehensive. If offers different approaches to authentication for different types of users, with flexible configuration of access methods and resources. This means that the method by which users authenticate can be chosen with an eye to both costs and the desired level of security. In all, Quest Defender can be said to be a remarkable way to implement a lean, but powerful platform fitting most strong authentication needs. We therefore recommend it for further evaluation when considering an investment in this area.
|Sep 20, 2010||
Product Report: Quest Defender
Quest Defender is an authentication platform solution that, unlike others in the market, offers true two-factor authentication supporting a wide range of tokens, thus providing strong authentication for a wide range of devices along with simplified token distribution. A special feature,…
Latest Related Reports
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Today, companies are increasingly operating on the basis of IT systems and are thus dependant on them. Cyber risks must therefore be understood as business risks. The detection and prevention of cyber security threats and appropriate responses to them are among the most important activities to [...]
The EU GDPR (General Data Protection Regulation), becoming effective May 25, 2018, will have a global impact not only on data privacy, but on the interaction between businesses and their customers and consumers. Organizations must not restrict their GDPR initiatives to technical changes in consent management or PII protection, but need to review how they onboard customers and consumers and how to convince these of giving consent, but also review the amount and purposes of PII they collect. The impact of GDPR on businesses will be far bigger than most currently expect. [...]