https://catalogartifact.azureedge.net/publicartifacts/quest.odr-hs2-517285ce-2367-4055-96ad-7ba910c215e7/577f18f5-5362-4c71-828b-07250ede099a_QuestLogo216x216.png
Protect your hybrid AD environment and mitigate risk with the NIST Framework
The solutions in our hybrid AD cyber resiliency suite work hand-in-hand and build on each other to give you the ability to:
- Identify indicators of exposure (IOEs) and prioritize the attack paths an adversary could take to own your environment.
- Protect your environment so attackers can’t make changes to critical groups, GPO settings or exfiltrate your AD database to steal credentials.
- Detect indicators of compromise (IOCs) with real-time auditing, anomaly detection and alerting.
- Respond to threats and rapidly gather information to speed investigations.
- Recover AD from any attack, big or small, and restore business operations, data integrity and customer data in minutes instead of days, weeks or even months
Vue d’ensemble
https://catalogartifact.azureedge.net/publicartifacts/quest.odr-hs2-517285ce-2367-4055-96ad-7ba910c215e7/34b4b0c8-1555-49b0-807c-e6fa6d58e763_ODRscreenshot011280x720.png
https://catalogartifact.azureedge.net/publicartifacts/quest.odr-hs2-517285ce-2367-4055-96ad-7ba910c215e7/f4fded88-6ac5-4e7a-8e34-2e3c69d8b863_ODRscreenshot021280x720.png
Autres applications de Quest
KACE Systems Management Appliance (SMA)QuestLifecycle asset management, patching, compliance, distribution, security & integrated service desk
+1
Applicable to:
Virtual Machines
NaN out of 5
One Identity Safeguard for Privileged PasswordsQuestManage and protect privileged credentials with password vaulting
+1
Applicable to:
Virtual Machines
NaN out of 5
erwin Data ModelerQuestAccelerate Azure Synapse Adoption with Graphical Data Modeling and Schema Design
+1
Applicable to:
SaaS
NaN out of 5
One Identity Active RolesQuestActive Roles increases security of AD and AAD through workflow automation
+1
Applicable to:
SaaS
NaN out of 5
KACE Asset Management Appliance (AMA)QuestLifecycle asset management, software compliance, inventory, software metering, and reporting
+1
Applicable to:
Virtual Machines
NaN out of 5