Best Software for 2025 is now live!
Product Avatar Image

Quest Software

Show rating breakdown
692 reviews
  • 51 profiles
  • 42 categories
Average star rating
4.3
Serving customers since
1987
Profile Type
Category

All Profiles

Profile Filters
Profile Type
Category
Product Avatar Image
Quest IT Security Search

1 review

IT Security Search is a Google-like, IT search engine that enables IT administrators and security teams to quickly respond to security incidents and analyze event forensics. The tool's web-based interface correlates disparate IT data from many Quest security and compliance solutions into a single console and makes it easier than ever.

Product Avatar Image
Quest Secure Copy

1 review

Secure Copy is an automated solution for securely migrating data, shares, printers and more. The tool gives you the flexibility to control how data is migrated and doesn't require the use of agents or scripts. Secure Copy enables you to quickly, safely and easily migrate data from one server to another, consolidate file servers, and move data to an NAS/SAN device.

Product Avatar Image
Unified Communications Diagnostics

1 review

UC Diagnostics helps administrators detect problems in their messaging environments by displaying Exchange and Skype for Business Server messaging-component activities through a single, easy-to-use interface.

Product Avatar Image
Quest Intrust

1 review

Only with Quest InTrust, you can monitor all user workstation and administrator activity from logons to logoffs and everything in between.

Product Avatar Image
One Identity Safeguard

1 review

With One Identity Safeguard for Privileged Sessions, you can control, monitor and record privileged sessions of administrators, remote vendors and other high-risk users. Content of the recorded sessions is indexed to simplify searching for events and reporting so you can more easily meet your auditing and compliance requirements. In addition, Safeguard for Privileged Sessions serves as a proxy, and inspects the protocol traffic on the application level and can reject any traffic violating the protocol - thus making it an effective shield against attacks. In transparent mode, only minimal network changes are required and users do not have to change their workflow or client applications, which makes implementation a breeze. However, workflow can be configured so you can authenticate users, limit access to specific resources, authorize and view active connections, and receive an alert if connections exceed preset time limits.

Product Avatar Image
Quest Security Explorer

0 reviews

Security Explorer provides an array of security enhancements, including the ability to identify who has rights to resources across the entire organization. You can also grant, revoke, clone, modify and overwrite permissions quickly and from a central location.

Profile Name

Star Rating

441
252
51
10
4

Quest Software Reviews

Review Filters
Profile Name
Star Rating
441
252
51
10
4
Vimanshu T.
VT
Vimanshu T.
Talent Acquisition Specialist
12/08/2023
Validated Reviewer
Verified Current User
Review source: Organic

Toad for Oracle

In toad we can connect to any PROD & NON PROD databases. We can easily add space , datafiles to the particular tablespace. We can easily do any activity like updating or deleting anything on servers.
Gopi K.
GK
Gopi K.
Cybersecurity Student at St.Lawrence College, Kingston, Canada. Former Information Technology Engineer at Dubai Technologies, Dubai UAE
12/06/2023
Validated Reviewer
Review source: G2 invite
Incentivized Review

Best Backup & DIsaster Recovery suite!

The best part about this software is that is the usability. The way the user interface is designed is very flawless and it's easy to use even for a person who does not have much computer experience! It is easy to implement and it can be integrated to other softwares easily.
RS
Rose S.
12/04/2023
Validated Reviewer
Review source: G2 invite
Incentivized Review

Worsen IT Security Auditing

This product is worst when it comes to testing security measures, about firewalls. I encountered many difficulties using it which is a disadvantage. The software is less user friendly. It provides functionalities that do not ensure the protection of my systems.

About

Contact

HQ Location:
Aliso Viejo, CA

Social

@Quest

What is Quest Software?

At Quest, we create software solutions that simplify IT management and help customers achieve IT resilience. Our solutions maximize the value of our customers’ data performance, streamline migration and modernization processes, enhance Active Directory and Office 365 management capabilities and strengthen cybersecurity. Since 1987, we have partnered with more than 130,000 organizations, including 95 percent of the Fortune 500, to help them become data empowered, protect their identities and directories, and reduce their potential attack surface. Quest provides a broad range of service offerings to support our solutions and meet the ever-changing customer needs in an evolving enterprise IT landscape. Quest is headquartered in Aliso Viejo, California, and has more than 3,500 team members located in 39 countries.

Details

Year Founded
1987
Ownership
NYSE: DGX