Product Report: Quest Defender
A special feature, though hardly surprising coming from Quest, is the deep integration it provides with Active Directory, Microsoft’s near-ubiquitous directory service. Identities, roles and policies are administered within Active Directory itself, thus enabling users to hitch on to existing AD infrastructures and transforming them into a foundation for strong authentication. Integration with other systems is also possible, either in the form of strong authentication solutions already in place or by transmitting requests to other directory services.
We are impressed by Quest Defender’s ability to integrate flexibly with legacy systems as well as applications and existing partial solutions for strong authentication. This greatly facilitates either “peaceful coexistence” of different systems or the gradual migration to Quest Defender.
Limitations exist in support of non-OTP hard tokens. However, there are enough alternatives to choose from. On the other hand, mobile users are well supported.
Customers in search of a solution for strong authentication should consider Quest Defender for a number of very good reasons. First, it is extremely simple to implement, yet both powerful and com-prehensive. If offers different approaches to authentication for different types of users, with flexible configuration of access methods and resources. This means that the method by which users authenticate can be chosen with an eye to both costs and the desired level of security. In all, Quest Defender can be said to be a remarkable way to implement a lean, but powerful platform fitting most strong authentication needs. We therefore recommend it for further evaluation when considering an investment in this area.
|Sep 20, 2010||
Product Report: Quest Defender
Quest Defender is an authentication platform solution that, unlike others in the market, offers true two-factor authentication supporting a wide range of tokens, thus providing strong authentication for a wide range of devices along with simplified token distribution. A special feature,…
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
This week Skylight Cyber disclosed that they were able to fool a popular “AI”-based Endpoint Protection (EPP) solution into incorrectly marking malware as safe. While trying to reverse-engineer the details of the solution's Machine Learning (ML) engine, the researchers found that it contained a secondary ML model added specifically to whitelist certain types of software like popular games. Supposedly, it was added to reduce the number of false positives their "main engine" was [...]
AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]