|
|
Partner details
 |
|
Dell Software
1 Dell Way • TX 78664 Round Rock E-Mail: [email protected] Internet: http://software.dell.com/
Dell Software helps customers unlock greater potential through the power of technology — delivering scalable, affordable and simple-to-use solutions that streamline IT and mitigate risk. Combining Dell Software with Dell hardware and services drives unmatched efficiency and productivity to accelerate business results. http://software.dell.com/legal/privacy.aspx
|
Sponsored events
-
Congress: European Identity & Cloud Conference 2015
05.05. - 08.05.2015
, Munich, Germany
-
European Identity & Cloud Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
-
Congress: European Identity & Cloud Conference 2014
13.05. - 16.05.2014
, Munich, Germany
-
European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
-
Congress: European Identity & Cloud Conference 2012
17.04. - 20.04.2012
, Munich, Germany
-
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
-
Webinar: Why Access Governance Moves the Risk and Reward Balance in your Favour
15.11.2011
, 12:00 CET / 11:00am GMT
-
In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these policies to do their job. Following to Martin´s presentation, Quest Software´s Phil Allen will show practical approaches and best practices implementing such an Access Governance program.
-
Webinar: Why Managing Privileged Users Benefits your Business
27.09.2011
, 12:00 CEST
-
In this webinar, KuppingerCole's co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don'ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software's Director Identity Management EMEA, will talk about Quest Software's solution focus within the privileged user management sphere, which recently received a strong boost through the acquisition of e-DMZ Security.
-
Congress: European Identity Conference 2011
10.05. - 13.05.2011
, Munich
-
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
-
Webinar: Managing the Change - Getting on the Road to the Cloud through Small and Manageable Steps
13.12.2010
, 5:00pm CET, 11:00am EST
-
In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will discuss with Joe Baguley, Quest Software´s CTO Europe, about how to transition from a reactive, siloed IT to a more agile, cloud computing aware infrastructure through small, manageable steps and subtle changes in thinking.
-
Webinar: Building Operational Governance for SharePoint 2010
09.12.2010
, 5:00pm CET, 11:00am EST
-
During this free webinar, Martin Kuppinger will give an overview on SharePoint Governance, followed by SharePoint expert Joel Oleson who will show you how to simplify SharePoint 2010 management with operations plans that include governance and change management policies as well as governance best practices.
-
Webinar: Kontextbasierte Authentifizierung im Active Directory Umfeld
26.11.2010
, 11:00 Uhr
-
Die (automatische) Anpassung der Sicherheitsstufe eines Authentifizierungsvorgangs an den jeweiligen Kontext leistet einen erheblichen Beitrag zur operativen Effizienz und spart Geld. In diesem Webinar spricht Martin Kuppinger, Principal Analyst bei Kuppinger Cole, über die unterschiedlichen Ansätze adaptiver Authentifizierungsverfahren, bei denen unterschiedlich starke Authentifizierungswege für unterschiedliche Risiken angewendet werden können, und gibt eine Übersicht über Lösungen im Active Directory Umfeld. Reto Bachmann von Quest Software wird danach den Einsatz des Quest Defender in Kundenprojekten beschreiben.
-
Congress: Mittelstandsdialog Informationssicherheit
04.05. - 07.05.2010
, München
-
Die Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist für jedes Unternehmen unverzichtbar, unabhängig von dessen Größe. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit können sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die Möglichkeit, den für Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an IT-Security zu finden.
-
Congress: European Identity Conference 2010
04.05. - 07.05.2010
, Munich
-
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
-
Congress: CLOUD 2010
04.05. - 07.05.2010
, Munich
-
Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are - Join us in Munich for an exciting event beyond the hype.
-
Webinar: How to Easily Provide the Detailed Insight into your Systems the Auditors (and you) Need
21.01.2010
, 17:00 CET (16:00 BST, 11:00 EST, 8:00 PST)
-
Approaches to automate and optimize the auditing on access and providing reporting capabilities are mandatory – at any level of IT. To save time and improve quality, appropriate tools are a must. Is there a one-size-fits-all approach?
-
Webinar: Provisioning Trends: Schlank, voll automatisiert, kostengünstig
10.12.2009
, 14:00 - 15:00
-
Martin Kuppinger (Kuppinger Cole) und Reto Bachmann (Quest) bringen Sie in diesem Webinar auf den neuesten Stand im Bereich des automatisierten Provisioning
-
Webinar: Pass Your Next Compliance Audit With Confidence
19.11.2009
, 17:00-18:00 CEST, 11am Eastern
-
Bottom-Up or Top-Down or both? What is the appropriate approach to automate auditing on access and reporting on directories and identities and also on mail and file access? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views.
-
Webinar: Single Sign-on for SAP Environments
11.11.2009
, 17:00-18:00 CET, 11am Eastern
-
The identity management marketplace offers a number of different solutions enabling Active Directory-based single sign-on for SAP, making life for SAP endusers much easier and at the same time offering a good potential to reduce the costs of managing your IT infrastructure. In this webinar, Martin Kuppinger (Kuppinger Cole), will talk about the different concepts of SAP-SSO and why Kerberos is a real option in such an environment. Then, Jackson Shaw and Reto Bachmann (Quest Software) will present some best practices based on Quest´s solution for SAP.
-
Webinar: Vereinfachung der Berechtigungsanalyse und -Verwaltung
20.08.2009
, 14:00 - 15:00
-
In diesem Webinar geht Martin Kuppinger zunächst auf die Notwendigkeit ein, konsistente Autorisierungsstrategien zu entwickeln, die bei minimiertem administrativen Aufwand einen durchgängigen Schutz von Informationen bieten – indem man sich auf das Wesentliche konzentriert und sich nicht in Punktlösungen verzettelt. Reto Bachmann von Quest Software wird daran anschliessend anhand von Praxisbeispielen beschreiben, wie sich das Berechtigungsmanagement unter Einsatz des Quest Access Managers einfach und transparent gestalten lässt.
-
Congress: European Identity Conference 2009
05.05. - 08.05.2009
, Munich
-
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
-
Congress: 2nd European Identity Conference
22.04. - 25.04.2008
, Munich
-
For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world deployments. With its community-like social networking and knowledge sharing opportunities, the European Identity Conference has become an annual must-attend event.
Reports
-
Vendor Report: Dell IAM - 70812
06.05.2014
Dave Kearns €495.00
-
While relatively new to the Identity marketplace, Dell has a long history in technology far exceeding most of its competitors. Its world-wide presence dwarfs most of its competition and includes resellers, VARs and system integrators with a strong knowledge and much experience of the product lines acquired by Dell through the acquisition of Quest Software.
The identity and access management products from the Quest portfolio, mostly rebranded with the Dell One Identity name, were already considered leaders in their categories at the time Dell acquired them. This is still true. Many of the products, in fact, were already mature when acquired by Quest in the dozen years before the Dell acquisition.
Dell continues to innovate the product lines as the recent release of new modules for data governance and cloud access show. Dell has engendered fierce brand loyalty over the years and this is expected to continue with the IAM/IAG product lines.
Order the report
-
Whitepaper: Migrating Sun Identity Manager to Quest One Identity Manager - 71000
17.10.2012
Martin Kuppinger €295.00
-
This document adds to the KuppingerCole Advisory Notes #70,607 “Migration Options for your Legacy Provisioning” and #70,610 “Migration Options and Guidelines for Oracle Waveset Identity Manager”. It focuses on the Sun Identity Manager (SIM) product, now also known as Oracle Waveset Identity Management and historically as Waveset Lighthouse. This product has an officially defined end-of-life which causes customers to evaluate their migration options.
The purpose of this document is to provide the facts and consequences regarding a migration from SIM (and its variants) to Quest One Identity Manager and related components. It is meant as a source of information on what to look at specifically when taking into account that migration option. Notably it does not imply that this is the only or favored option for migration. It is one viable option for many organizations. Nevertheless, the migration target and future architecture have to be carefully evaluated...
Order the report
-
Snapshot: Quest One Identity Manager Data Governance Edition - 70722
22.08.2012
Martin Kuppinger €190.00
-
Over the past few years, companies have started investing in Access Governance to better manage access certification, access analytics, and access requests. However that is not sufficient. It is, though, a big step forward for organizations which have not only installed a piece of software but also implemented the required organization, guidelines, and processes...
Order the report
-
Product Report: Quest One Identity Manager 5 - 70133
01.12.2011
Martin Kuppinger €195.00
-
In 2010, Quest Software acquired the German software vendor Völcker Informatik AG, based in Berlin. Völcker had established itself in recent years as a provider of technically innovative solutions and a vendor to be reckoned with in the field of Identity and Access Management (IAM). In the process, the company has become highly visible in the German-speaking market and has succeeded in creating a substantial customer base including many large and well-known corporations, particularly in the German-speaking market. However, Völcker has no longer been a niche player, but instead enjoyed a solid reputation as an established vendor in the IAM market space. The product which has been renamed Quest One Identity Manager – formerly known name as ActiveEntry – is a core piece of Quest’s IAM offerings now, called Quest One. In contrast to Völcker, Quest has the marketing and sales reach to address customers worldwide. Thus Quest One Identity...
Order the report
-
Product Report: Quest Defender
20.09.2010
Martin Kuppinger €95.00
-
Quest Defender is an authentication platform solution that, unlike others in the market, offers true two-factor authentication supporting a wide range of tokens, thus providing strong authentication for a wide range of devices along with simplified token distribution. A special feature, though hardly surprising coming from Quest, is the deep integration it provides with Active Directory, Microsoft’s near-ubiquitous directory service. Identities, roles and policies are administered within Active Directory itself, thus enabling users to hitch on to existing AD infrastructures and transforming them into a foundation for strong authentication. Integration with other systems is also possible, either in the form of strong authentication solutions already in place or by transmitting requests to other directory services. We are impressed by Quest Defender’s ability to integrate flexibly with legacy systems as well as applications and existing partial solutions for strong...
Order the report
-
Product Report: Quest Defender
16.08.2010
Martin Kuppinger €95.00
-
Der Quest Defender ist eine Lösung im wachsenden Markt für flexible Authentifizierungsplattformen. Im Gegensatz zu anderen Lösungen setzt der Quest Defender konsequent auf eine Zwei-Faktor-Authentifizierung. Dabei werden sehr viele unterschiedliche Tokens unterstützt, so dass es dennoch eine große Bandbreite für die Authentifizierung gibt – sowohl im Hinblick auf die Unterstützung von Endgeräten als auch die Authentifizierungsstärke und die erforderliche Logistik für die Verteilung von Tokens. Eine Besonderheit des Produkts, die aber bei Quest nicht überraschend ist, ist die enge Active Directory-Integration. Die Identitäten, Rollen und Richtlinien werden im Active Directory gespeichert. Damit können bestehende Active Directory-Infrastrukturen, wie sie sich in den meisten Unternehmen finden, einfach als Basis für die starke Authentifizierung verwendet werden. Gleichzeitig wird aber die Integration mit...
Order the report
-
Product Report: Quest Single Sign-On solutions for SAP
09.11.2009
Martin Kuppinger €95.00
-
The two products discussed here, Quest Single Sign-On for SAP GUI and ABAP and Quest Single Sign-On for NetWeaver, are Quest’s offering in the market for Single Sign-On (SSO) between Active Directory-infrastructures and SAP-environments on the basis of Kerberos. Quest also offers a „classic“ SSO solution called Quest Enterprise Single Sign-On as an option for infrastructures which do not run Kerberos. Authenticating primarily via Active Directory which is standard in many companies brings some big advantages. In addition, all necessary information is consolidated within Active Directory. Other operating systems such as Unix, Linux or Apple can be integrated easily by using Quest’s standard SSO solution. The solution offers true Single Sign-On at the system level. Both products are certified for SAP and support additional functions such as data encryption over SNC (Secure Network Communications). KCP ranks both products rank among the most effective...
Order the report
-
Product Report: Quest Single Sign-On solutions for SAP
07.10.2009
Martin Kuppinger €95.00
-
Mit den beiden Produkten Quest Single Sign-On for SAP GUI and ABAP und Quest Single Sign-On for NetWeaver bietet Quest eine marktführende Lösung für das Single Sign-On zwischen Active Directory-Infrastrukturen und SAP-Umgebungen auf Basis von Kerberos an. Als Option für Infrastrukturen, in denen man keine Kerberos-basierende Lösung einsetzen möchte, gibt es zudem noch Quest Enterprise Single Sign-On, eine klassische Enterprise Single Sign-On-Lösung. Der Vorteil ist, dass dabei die primäre Authentifizierung über das Active Directory, die in sehr vielen Umgebungen Standard ist, genutzt wird. Zudem werden auch alle erforderlichen Informationen im Active Directory konsolidiert. Weitere Plattformen wie Unix, Linux und der Apple Macintosh lassen sich über ergänzende Single Sign-On-Lösungen von Quest in dieses Konzept integrieren. Es wird mit einem echten Single Sign-On auf Systemebene gearbeitet. Die Produkte sind für SAP...
Order the report
-
Product Report: Quest ActiveRoles Server
16.07.2009
Martin Kuppinger €95.00
-
Quest’s ActiveRoles Server belongs to the category of Enterprise Provisioning products, but it is not a typical standard-issue provisioning solution. Instead, it is a tool for role-based administration of both Active Directory and a growing number of other system environments. As is to be expected, its greatest strengths are in management of Active Directory environments, where its functionality extends significantly beyond just simple provisioning. On the other hand, Quest has been systematically augmenting and improving the product’s existing provisioning functions over the years and through various releases cycles. The result is a powerful solution for Identity & Access Management (IAM) that extends far beyond Active Directory. It can be best applied in environments where Active Directory is employed or in which Active Directory plays a major role. It fully addresses the special requirements of typical Active Directory environments, as well as cases where an...
Order the report
-
Product Report: Quest ActiveRoles Server
01.05.2009
Martin Kuppinger €95.00
-
Der Quest ActiveRoles Server ist der Produktkategorie Enterprise Provisioning zuzuordnen. Das Produkt ist dabei keine typische Provisioning-Lösung, sondern im Kern ein Werkzeug für die rollenbasierte Verwaltung von Active Directory-Umgebungen, das inzwischen auch eine zunehmende Zahl von anderen Systemumgebungen unterstützt. Entsprechend liegen die spezifischen Stärken des Produkts auch beim Management von Active Directory-Umgebungen, wo es in der Funktionalität signifikant über typische Provisioning-Produkte hinausgeht. Auf der anderen Seite hat Quest die Funktionalität im Bereich des Provisionings über die vergangenen Jahre und Releases hinweg deutlich ausgebaut und damit eine leistungsfähige Lösung für das Identity und Access Management (IAM) auch über das Active Directory hinaus geschaffen. Der Einsatzbereich liegt also in jedem Fall in Umgebungen, in denen es ein Active Directory gibt und bei denen das Active...
Order the report
Podcasts
-
Why Access Governance Moves the Risk and Reward Balance in your Favour
15.11.2011
-
In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these policies to do their job. Following to Martin´s presentation, Quest Software´s Phil Allen will show practical approaches and best practices implementing such an Access Governance program.
Watch
-
Why Managing Privileged Users Benefits your Business
28.09.2011
-
In this webinar, KuppingerCole's co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don'ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software's Director Identity Management EMEA, will talk about Quest Software's solution focus within the privileged user management sphere, which recently received a strong boost through the acquisition of e-DMZ Security.
Watch
-
Managing the Change - Getting on the Road to the Cloud through Small and Manageable Steps
14.12.2010
-
In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will discuss with Joe Baguley, Quest Software´s CTO Europe, about how to transition from a reactive, siloed IT to a more agile, cloud computing aware infrastructure through small, manageable steps and subtle changes in thinking.
Watch
-
Building Operational Governance for SharePoint 2010
10.12.2010
-
During this free webinar, Martin Kuppinger will give an overview on SharePoint Governance, followed by SharePoint expert Joel Oleson who will show you how to simplify SharePoint 2010 management with operations plans that include governance and change management policies as well as governance best practices.
Watch
-
Kontextbasierte Authentifizierung im Active Directory Umfeld
28.11.2010
-
Die (automatische) Anpassung der Sicherheitsstufe eines Authentifizierungsvorgangs an den jeweiligen Kontext leistet einen erheblichen Beitrag zur operativen Effizienz und spart Geld. In diesem Webinar spricht Martin Kuppinger, Principal Analyst bei Kuppinger Cole, über die unterschiedlichen Ansätze adaptiver Authentifizierungsverfahren, bei denen unterschiedlich starke Authentifizierungswege für unterschiedliche Risiken angewendet werden können, und gibt eine Übersicht über Lösungen im Active Directory Umfeld. Reto Bachmann von Quest Software wird danach den Einsatz des Quest Defender in Kundenprojekten beschreiben.
Watch
-
Provisioning Trends: Schlank, voll automatisiert, kostengünstig
11.12.2009
-
Martin Kuppinger (Kuppinger Cole) und Reto Bachmann (Quest) bringen Sie in diesem Webinar auf den neuesten Stand im Bereich des automatisierten Provisioning
Watch
-
Pass Your Next Compliance Audit With Confidence
19.11.2009
-
Bottom-Up or Top-Down or both? What is the appropriate approach to automate auditing on access and reporting on directories and identities and also on mail and file access? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views.
Watch
-
Single Sign On for SAP Environments
11.11.2009
-
The identity management marketplace offers a number of different solutions enabling Active Directory-based single sign-on for SAP, making life for SAP endusers much easier and at the same time offering a good potential to reduce the costs of managing your IT infrastructure. In this webinar, Martin Kuppinger (Kuppinger Cole), will talk about the different concepts of SAP-SSO and why Kerberos is a real option in such an environment. Then, Jackson Shaw and Reto Bachmann (Quest Software) will present some best practices based on Quest´s solution for SAP.
Watch
-
Vereinfachung der Berechtigungsanalyse und -Verwaltung
20.08.2009
-
In diesem Webinar geht Martin Kuppinger zunächst auf die Notwendigkeit ein, konsistente Autorisierungsstrategien zu entwickeln, die bei minimiertem administrativen Aufwand einen durchgängigen Schutz von Informationen bieten – indem man sich auf das Wesentliche konzentriert und sich nicht in Punktlösungen verzettelt. Reto Bachmann von Quest Software wird daran anschliessend anhand von Praxisbeispielen beschreiben, wie sich das Berechtigungsmanagement unter Einsatz des Quest Access Managers einfach und transparent gestalten lässt.
Watch
|