Product Avatar Image

Quest Software

Show rating breakdown
692 reviews
  • 51 profiles
  • 42 categories
Average star rating
4.3
Serving customers since
1987
Profile Type
Category

All Profiles

Profile Filters
Profile Type
Category
Product Avatar Image
Quest IT Security Search

1 review

IT Security Search is a Google-like, IT search engine that enables IT administrators and security teams to quickly respond to security incidents and analyze event forensics. The tool's web-based interface correlates disparate IT data from many Quest security and compliance solutions into a single console and makes it easier than ever.

Product Avatar Image
Quest Secure Copy

1 review

Secure Copy is an automated solution for securely migrating data, shares, printers and more. The tool gives you the flexibility to control how data is migrated and doesn't require the use of agents or scripts. Secure Copy enables you to quickly, safely and easily migrate data from one server to another, consolidate file servers, and move data to an NAS/SAN device.

Product Avatar Image
Unified Communications Diagnostics

1 review

UC Diagnostics helps administrators detect problems in their messaging environments by displaying Exchange and Skype for Business Server messaging-component activities through a single, easy-to-use interface.

Product Avatar Image
Quest Intrust

1 review

Only with Quest InTrust, you can monitor all user workstation and administrator activity from logons to logoffs and everything in between.

Product Avatar Image
One Identity Safeguard

1 review

With One Identity Safeguard for Privileged Sessions, you can control, monitor and record privileged sessions of administrators, remote vendors and other high-risk users. Content of the recorded sessions is indexed to simplify searching for events and reporting so you can more easily meet your auditing and compliance requirements. In addition, Safeguard for Privileged Sessions serves as a proxy, and inspects the protocol traffic on the application level and can reject any traffic violating the protocol - thus making it an effective shield against attacks. In transparent mode, only minimal network changes are required and users do not have to change their workflow or client applications, which makes implementation a breeze. However, workflow can be configured so you can authenticate users, limit access to specific resources, authorize and view active connections, and receive an alert if connections exceed preset time limits.

Product Avatar Image
Quest Security Explorer

0 reviews

Security Explorer provides an array of security enhancements, including the ability to identify who has rights to resources across the entire organization. You can also grant, revoke, clone, modify and overwrite permissions quickly and from a central location.

Product Avatar Image
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.

Arpio

16 reviews

Product Description

Arpio is the most comprehensive disaster recovery solution for AWS. We make it easy to automate and test DR so you can recover quickly from outages, ransomware, and other unexpected downtime.

Profile Name

Star Rating

441
252
51
10
4

Quest Software Reviews

Review Filters
Profile Name
Star Rating
441
252
51
10
4
Jim H.
JH
Jim H.
CIO/CISO/IT Director
01/20/2022
Validated Reviewer
Review source: Organic

The KACE is probably the best all around Appliance

This product is an excellent multifunctional use application that you can use it for asset tracking, scripting, inventory, patching, and even discovery. The cost is also reasonable for the capabilities. You can also highly customize the service desk.
Tia C.
TC
Tia C.
Open for new opportunities
01/19/2022
Validated Reviewer
Review source: G2 invite
Incentivized Review

Key account specialist

Very effective and efficient. Easy to use, very much user friendly.
SS
senthilkumar s.
01/15/2022
Validated Reviewer
Review source: G2 invite
Incentivized Review

Quest Recovery Manager - Backbone of Backup and Recovery Process

1. Without outages, It can be able to complete the backup process which results in less impact on the users. 2. Few of the repeated restoring/backup steps were automated and that reduces the manual effort and improves efficiency in the production support environment. 3. Its incremental backup feature is awesome. For example, if there is a minor change in the existing file, it backs up only the part of the file which has the change. Obviously, it's time-consuming.

About

Contact

HQ Location:
Aliso Viejo, CA

Social

@Quest

What is Quest Software?

At Quest, we create software solutions that simplify IT management and help customers achieve IT resilience. Our solutions maximize the value of our customers’ data performance, streamline migration and modernization processes, enhance Active Directory and Office 365 management capabilities and strengthen cybersecurity. Since 1987, we have partnered with more than 130,000 organizations, including 95 percent of the Fortune 500, to help them become data empowered, protect their identities and directories, and reduce their potential attack surface. Quest provides a broad range of service offerings to support our solutions and meet the ever-changing customer needs in an evolving enterprise IT landscape. Quest is headquartered in Aliso Viejo, California, and has more than 3,500 team members located in 39 countries.

Details

Year Founded
1987
Ownership
NYSE: DGX