Product Report: Quest Defender
A special feature, though hardly surprising coming from Quest, is the deep integration it provides with Active Directory, Microsoft’s near-ubiquitous directory service. Identities, roles and policies are administered within Active Directory itself, thus enabling users to hitch on to existing AD infrastructures and transforming them into a foundation for strong authentication. Integration with other systems is also possible, either in the form of strong authentication solutions already in place or by transmitting requests to other directory services.
We are impressed by Quest Defender’s ability to integrate flexibly with legacy systems as well as applications and existing partial solutions for strong authentication. This greatly facilitates either “peaceful coexistence” of different systems or the gradual migration to Quest Defender.
Limitations exist in support of non-OTP hard tokens. However, there are enough alternatives to choose from. On the other hand, mobile users are well supported.
Customers in search of a solution for strong authentication should consider Quest Defender for a number of very good reasons. First, it is extremely simple to implement, yet both powerful and com-prehensive. If offers different approaches to authentication for different types of users, with flexible configuration of access methods and resources. This means that the method by which users authenticate can be chosen with an eye to both costs and the desired level of security. In all, Quest Defender can be said to be a remarkable way to implement a lean, but powerful platform fitting most strong authentication needs. We therefore recommend it for further evaluation when considering an investment in this area.
|Sep 20, 2010||
Product Report: Quest Defender
Quest Defender is an authentication platform solution that, unlike others in the market, offers true two-factor authentication supporting a wide range of tokens, thus providing strong authentication for a wide range of devices along with simplified token distribution. A special feature,…
Latest Related Reports
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
During the KuppingerCole webinar run March 16th, 2017, which has been supported by ForgeRock, several questions from attendees were left unanswered due to a huge number of questions and a lack of time to cover them all. Here are answers to questions that couldn’t be answered live during the [...]
Today, the Cyber Defence Center (CDC) or Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes [...]