...
Dell Software     Dell Software
1 Dell Way • TX 78664 Round Rock
E-Mail: sales@software.dell.com
Internet: http://software.dell.com/

Dell Software helps customers unlock greater potential through the power of technology — delivering scalable, affordable and simple-to-use solutions that streamline IT and mitigate risk. Combining Dell Software with Dell hardware and services drives unmatched efficiency and productivity to accelerate business results. http://software.dell.com/legal/privacy.aspx

Congress: European Identity & Cloud Conference 2015 05.05. – 08.05.2015 , Munich, Germany
European Identity & Cloud Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Congress: European Identity & Cloud Conference 2014 13.05. – 16.05.2014 , Munich, Germany
European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Congress: European Identity & Cloud Conference 2012 17.04. – 20.04.2012 , Munich, Germany
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Webinar: Why Access Governance Moves the Risk and Reward Balance in your Favour 15.11.2011 , 12:00 CET / 11:00am GMT
In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these policies to do their job. Following to Martin´s presentation, Quest Software´s Phil Allen will show practical approaches and best practices implementing such an Access Governance program.
Webinar: Why Managing Privileged Users Benefits your Business 27.09.2011 , 12:00 CEST
In this webinar, KuppingerCole’s co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don’ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software’s Director Identity Management EMEA, will talk about Quest Software’s solution focus within the privileged user management sphere, which recently received a strong boost through the acquisition of e-DMZ Security.
Congress: European Identity Conference 2011 10.05. – 13.05.2011 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Webinar: Managing the Change – Getting on the Road to the Cloud through Small and Manageable Steps 13.12.2010 , 5:00pm CET, 11:00am EST
In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will discuss with Joe Baguley, Quest Software´s CTO Europe, about how to transition from a reactive, siloed IT to a more agile, cloud computing aware infrastructure through small, manageable steps and subtle changes in thinking.
Webinar: Building Operational Governance for SharePoint 2010 09.12.2010 , 5:00pm CET, 11:00am EST
During this free webinar, Martin Kuppinger will give an overview on SharePoint Governance, followed by SharePoint expert Joel Oleson who will show you how to simplify SharePoint 2010 management with operations plans that include governance and change management policies as well as governance best practices.
Webinar: Kontextbasierte Authentifizierung im Active Directory Umfeld 26.11.2010 , 11:00 Uhr
Die (automatische) Anpassung der Sicherheitsstufe eines Authentifizierungsvorgangs an den jeweiligen Kontext leistet einen erheblichen Beitrag zur operativen Effizienz und spart Geld. In diesem Webinar spricht Martin Kuppinger, Principal Analyst bei Kuppinger Cole, über die unterschiedlichen Ansätze adaptiver Authentifizierungsverfahren, bei denen unterschiedlich starke Authentifizierungswege für unterschiedliche Risiken angewendet werden können, und gibt eine Übersicht über Lösungen im Active Directory Umfeld. Reto Bachmann von Quest Software wird danach den Einsatz des Quest Defender in Kundenprojekten beschreiben.
Congress: Mittelstandsdialog Informationssicherheit 04.05. – 07.05.2010 , München
Die Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist für jedes Unternehmen unverzichtbar, unabhängig von dessen Größe. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit können sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die Möglichkeit, den für Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an IT-Security zu finden.
Congress: European Identity Conference 2010 04.05. – 07.05.2010 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Congress: CLOUD 2010 04.05. – 07.05.2010 , Munich
Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are – Join us in Munich for an exciting event beyond the hype.
Webinar: How to Easily Provide the Detailed Insight into your Systems the Auditors (and you) Need 21.01.2010 , 17:00 CET (16:00 BST, 11:00 EST, 8:00 PST)
Approaches to automate and optimize the auditing on access and providing reporting capabilities are mandatory – at any level of IT. To save time and improve quality, appropriate tools are a must. Is there a one-size-fits-all approach?
Webinar: Provisioning Trends: Schlank, voll automatisiert, kostengünstig 10.12.2009 , 14:00 – 15:00
Martin Kuppinger (Kuppinger Cole) und Reto Bachmann (Quest) bringen Sie in diesem Webinar auf den neuesten Stand im Bereich des automatisierten Provisioning
Webinar: Pass Your Next Compliance Audit With Confidence 19.11.2009 , 17:00-18:00 CEST, 11am Eastern
Bottom-Up or Top-Down or both? What is the appropriate approach to automate auditing on access and reporting on directories and identities and also on mail and file access? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views.
Webinar: Single Sign-on for SAP Environments 11.11.2009 , 17:00-18:00 CET, 11am Eastern
The identity management marketplace offers a number of different solutions enabling Active Directory-based single sign-on for SAP, making life for SAP endusers much easier and at the same time offering a good potential to reduce the costs of managing your IT infrastructure. In this webinar, Martin Kuppinger (Kuppinger Cole), will talk about the different concepts of SAP-SSO and why Kerberos is a real option in such an environment. Then, Jackson Shaw and Reto Bachmann (Quest Software) will present some best practices based on Quest´s solution for SAP.
Webinar: Vereinfachung der Berechtigungsanalyse und -Verwaltung 20.08.2009 , 14:00 – 15:00
In diesem Webinar geht Martin Kuppinger zunächst auf die Notwendigkeit ein, konsistente Autorisierungsstrategien zu entwickeln, die bei minimiertem administrativen Aufwand einen durchgängigen Schutz von Informationen bieten – indem man sich auf das Wesentliche konzentriert und sich nicht in Punktlösungen verzettelt. Reto Bachmann von Quest Software wird daran anschliessend anhand von Praxisbeispielen beschreiben, wie sich das Berechtigungsmanagement unter Einsatz des Quest Access Managers einfach und transparent gestalten lässt.
Congress: European Identity Conference 2009 05.05. – 08.05.2009 , Munich
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Congress: 2nd European Identity Conference 22.04. – 25.04.2008 , Munich
For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world deployments. With its community-like social networking and knowledge sharing opportunities, the European Identity Conference has become an annual must-attend event.
Vendor Report: Dell IAM – 7081206.05.2014Dave Kearns €495.00
While relatively new to the Identity marketplace, Dell has a long history in technology far exceeding most of its competitors. Its world-wide presence dwarfs most of its competition and includes resellers, VARs and system integrators with a strong knowledge and much experience of the product lines acquired by Dell through the acquisition of Quest Software.The identity and access management products from the Quest portfolio, mostly rebranded with the Dell One Identity name, were already considered leaders in their categories at the time Dell acquired them. This is still true. Many of the products, in fact, were already mature when acquired by Quest in the dozen years before the Dell acquisition.Dell continues to innovate the product lines as the recent release of new modules for data governance and cloud access show. Dell has engendered fierce brand loyalty over the years and this is expected to continue with the IAM/IAG product lines.

Order the report

Whitepaper: Migrating Sun Identity Manager to Quest One Identity Manager – 7100017.10.2012Martin Kuppinger €295.00
This document adds to the KuppingerCole Advisory Notes #70,607 “Migration Options for your Legacy Provisioning” and #70,610 “Migration Options and Guidelines for Oracle Waveset Identity Manager”. It focuses on the Sun Identity Manager (SIM) product, now also known as Oracle Waveset Identity Management and historically as Waveset Lighthouse. This product has an officially defined end-of-life which causes customers to evaluate their migration options. The purpose of this document is to provide the facts and consequences regarding a migration from SIM (and its variants) to Quest One Identity Manager and related components. It is meant as a source of information on what to look at specifically when taking into account that migration option. Notably it does not imply that this is the only or favored option for migration. It is one viable option for many organizations. Nevertheless, the migration target and future architecture have to be carefully evaluated…

Order the report

Snapshot: Quest One Identity Manager Data Governance Edition – 7072222.08.2012Martin Kuppinger €190.00
Over the past few years, companies have started investing in Access Governance to better manage access certification, access analytics, and access requests. However that is not sufficient. It is, though, a big step forward for organizations which have not only installed a piece of software but also implemented the required organization, guidelines, and processes…

Order the report

Product Report: Quest One Identity Manager 5 – 7013301.12.2011Martin Kuppinger €195.00
In 2010, Quest Software acquired the German software vendor Völcker Informatik AG, based in Berlin. Völcker had established itself in recent years as a provider of technically innovative solutions and a vendor to be reckoned with in the field of Identity and Access Management (IAM). In the process, the company has become highly visible in the German-speaking market and has succeeded in creating a substantial customer base including many large and well-known corporations, particularly in the German-speaking market. However, Völcker has no longer been a niche player, but instead enjoyed a solid reputation as an established vendor in the IAM market space. The product which has been renamed Quest One Identity Manager – formerly known name as  ActiveEntry – is a core piece of Quest’s IAM offerings now, called Quest One. In contrast to Völcker, Quest has the marketing and sales reach to address customers worldwide. Thus Quest One Identity…

Order the report

Product Report: Quest Defender20.09.2010Martin Kuppinger €95.00
Quest Defender is an authentication platform solution that, unlike others in the market, offers true two-factor authentication supporting a wide range of tokens, thus providing strong authentication for a wide range of devices along with simplified token distribution. A special feature, though hardly surprising coming from Quest, is the deep integration it provides with Active Directory, Microsoft’s near-ubiquitous directory service. Identities, roles and policies are administered within Active Directory itself, thus enabling users to hitch on to existing AD infrastructures and transforming them into a foundation for strong authentication. Integration with other systems is also possible, either in the form of strong authentication solutions already in place or by transmitting requests to other directory services. We are impressed by Quest Defender’s ability to integrate flexibly with legacy systems as well as applications and existing partial solutions for strong…

Order the report

Product Report: Quest Defender16.08.2010Martin Kuppinger €95.00
Der Quest Defender ist eine Lösung im wachsenden Markt für flexible Authentifizierungsplattformen. Im Gegensatz zu anderen Lösungen setzt der Quest Defender konsequent auf eine Zwei-Faktor-Authentifizierung. Dabei werden sehr viele unterschiedliche Tokens unterstützt, so dass es dennoch eine große Bandbreite für die Authentifizierung gibt – sowohl im Hinblick auf die Unterstützung von Endgeräten als auch die Authentifizierungsstärke und die erforderliche Logistik für die Verteilung von Tokens. Eine Besonderheit des Produkts, die aber bei Quest nicht überraschend ist, ist die enge Active Directory-Integration. Die Identitäten, Rollen und Richtlinien werden im Active Directory gespeichert. Damit können bestehende Active Directory-Infrastrukturen, wie sie sich in den meisten Unternehmen finden, einfach als Basis für die starke Authentifizierung verwendet werden. Gleichzeitig wird aber die Integration mit…

Order the report

Product Report: Quest Single Sign-On solutions for SAP09.11.2009Martin Kuppinger €95.00
The two products discussed here, Quest Single Sign-On for SAP GUI and ABAP and Quest Single Sign-On for NetWeaver, are Quest’s offering in the market for Single Sign-On (SSO) between Active Directory-infrastructures and SAP-environments on the basis of Kerberos. Quest also offers a „classic“ SSO solution called Quest Enterprise Single Sign-On as an option for infrastructures which do not run Kerberos. Authenticating primarily via Active Directory which is standard in many companies brings some big advantages. In addition, all necessary information is consolidated within Active Directory. Other operating systems such as Unix, Linux or Apple can be integrated easily by using Quest’s standard SSO solution. The solution offers true Single Sign-On at the system level. Both products are certified for SAP and support additional functions such as data encryption over SNC (Secure Network Communications). KCP ranks both products rank among the most effective…

Order the report

Product Report: Quest Single Sign-On solutions for SAP07.10.2009Martin Kuppinger €95.00
Mit den beiden Produkten Quest Single Sign-On for SAP GUI and ABAP und Quest Single Sign-On for NetWeaver bietet Quest eine marktführende Lösung für das Single Sign-On zwischen Active Directory-Infrastrukturen und SAP-Umgebungen auf Basis von Kerberos an. Als Option für Infrastrukturen, in denen man keine Kerberos-basierende Lösung einsetzen möchte, gibt es zudem noch Quest Enterprise Single Sign-On, eine klassische Enterprise Single Sign-On-Lösung. Der Vorteil ist, dass dabei die primäre Authentifizierung über das Active Directory, die in sehr vielen Umgebungen Standard ist, genutzt wird. Zudem werden auch alle erforderlichen Informationen im Active Directory konsolidiert. Weitere Plattformen wie Unix, Linux und der Apple Macintosh lassen sich über ergänzende Single Sign-On-Lösungen von Quest in dieses Konzept integrieren. Es wird mit einem echten Single Sign-On auf Systemebene gearbeitet. Die Produkte sind für SAP…

Order the report

Product Report: Quest ActiveRoles Server16.07.2009Martin Kuppinger €95.00
Quest’s ActiveRoles Server belongs to the category of Enterprise Provisioning products, but it is not a typical standard-issue provisioning solution. Instead, it is a tool for role-based administration of both Active Directory and a growing number of other system environments. As is to be expected, its greatest strengths are in management of Active Directory environments, where its functionality extends significantly beyond just simple provisioning. On the other hand, Quest has been systematically augmenting and improving the product’s existing provisioning functions over the years and through various releases cycles. The result is a powerful solution for Identity & Access Management (IAM) that extends far beyond Active Directory. It can be best applied in environments where Active Directory is employed or in which Active Directory plays a major role. It fully addresses the special requirements of typical Active Directory environments, as well as cases where an…

Order the report

Product Report: Quest ActiveRoles Server01.05.2009Martin Kuppinger €95.00
Der Quest ActiveRoles Server ist der Produktkategorie Enterprise Provisioning zuzuordnen. Das Produkt ist dabei keine typische Provisioning-Lösung, sondern im Kern ein Werkzeug für die rollenbasierte Verwaltung von Active Directory-Umgebungen, das inzwischen auch eine zunehmende Zahl von anderen Systemumgebungen unterstützt. Entsprechend liegen die spezifischen Stärken des Produkts auch beim Management von Active Directory-Umgebungen, wo es in der Funktionalität signifikant über typische Provisioning-Produkte hinausgeht. Auf der anderen Seite hat Quest die Funktionalität im Bereich des Provisionings über die vergangenen Jahre und Releases hinweg deutlich ausgebaut und damit eine leistungsfähige Lösung für das Identity und Access Management (IAM) auch über das Active Directory hinaus geschaffen. Der Einsatzbereich liegt also in jedem Fall in Umgebungen, in denen es ein Active Directory gibt und bei denen das Active…

Order the report

Why Access Governance Moves the Risk and Reward Balance in your Favour15.11.2011
In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these policies to do their job. Following to Martin´s presentation, Quest Software´s Phil Allen will show practical approaches and best practices implementing such an Access Governance program. Watch
Why Managing Privileged Users Benefits your Business28.09.2011
In this webinar, KuppingerCole’s co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don’ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software’s Director Identity Management EMEA, will talk about Quest Software’s solution focus within the privileged user management sphere, which recently received a strong boost through the acquisition of e-DMZ Security. Watch
Managing the Change – Getting on the Road to the Cloud through Small and Manageable Steps14.12.2010
In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will discuss with Joe Baguley, Quest Software´s CTO Europe, about how to transition from a reactive, siloed IT to a more agile, cloud computing aware infrastructure through small, manageable steps and subtle changes in thinking. Watch
Building Operational Governance for SharePoint 201010.12.2010
During this free webinar, Martin Kuppinger will give an overview on SharePoint Governance, followed by SharePoint expert Joel Oleson who will show you how to simplify SharePoint 2010 management with operations plans that include governance and change management policies as well as governance best practices. Watch
Kontextbasierte Authentifizierung im Active Directory Umfeld28.11.2010
Die (automatische) Anpassung der Sicherheitsstufe eines Authentifizierungsvorgangs an den jeweiligen Kontext leistet einen erheblichen Beitrag zur operativen Effizienz und spart Geld. In diesem Webinar spricht Martin Kuppinger, Principal Analyst bei Kuppinger Cole, über die unterschiedlichen Ansätze adaptiver Authentifizierungsverfahren, bei denen unterschiedlich starke Authentifizierungswege für unterschiedliche Risiken angewendet werden können, und gibt eine Übersicht über Lösungen im Active Directory Umfeld. Reto Bachmann von Quest Software wird danach den Einsatz des Quest Defender in Kundenprojekten beschreiben. Watch
Provisioning Trends: Schlank, voll automatisiert, kostengünstig11.12.2009
Martin Kuppinger (Kuppinger Cole) und Reto Bachmann (Quest) bringen Sie in diesem Webinar auf den neuesten Stand im Bereich des automatisierten Provisioning Watch
Pass Your Next Compliance Audit With Confidence19.11.2009
Bottom-Up or Top-Down or both? What is the appropriate approach to automate auditing on access and reporting on directories and identities and also on mail and file access? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views. Watch
Single Sign On for SAP Environments11.11.2009
The identity management marketplace offers a number of different solutions enabling Active Directory-based single sign-on for SAP, making life for SAP endusers much easier and at the same time offering a good potential to reduce the costs of managing your IT infrastructure. In this webinar, Martin Kuppinger (Kuppinger Cole), will talk about the different concepts of SAP-SSO and why Kerberos is a real option in such an environment. Then, Jackson Shaw and Reto Bachmann (Quest Software) will present some best practices based on Quest´s solution for SAP. Watch
Vereinfachung der Berechtigungsanalyse und -Verwaltung20.08.2009
In diesem Webinar geht Martin Kuppinger zunächst auf die Notwendigkeit ein, konsistente Autorisierungsstrategien zu entwickeln, die bei minimiertem administrativen Aufwand einen durchgängigen Schutz von Informationen bieten – indem man sich auf das Wesentliche konzentriert und sich nicht in Punktlösungen verzettelt. Reto Bachmann von Quest Software wird daran anschliessend anhand von Praxisbeispielen beschreiben, wie sich das Berechtigungsmanagement unter Einsatz des Quest Access Managers einfach und transparent gestalten lässt. Watch
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.