Quest is a global provider to 130,000 companies across 100 countries, including 95% of the Fortune 500 and 90% of the Global 1000. Quest has the experience to help you manage and protect your data, take control of your hybrid environments, keep track of all network-connected devices, stay compliant and govern every identity across the enterprise.
Balasys is Quest's value-added distributor and solution provider. We offer the following Quest solutions.
Change reporting and access logging for Active Directory (AD) and enterprise applications is cumbersome, time-consuming and, in some cases, impossible when using native IT auditing tools. This often results in data breaches and insider threats that can go undetected without protections in place.
Fortunately, Change Auditor has answer. With Change Auditor, you get complete, real-time IT auditing, in-depth forensics and comprehensive security monitoring on all key configuration, user and administrator changes for Microsoft Active Directory, Azure AD, Exchange,Office 365, file servers and more. Change Auditor also tracks detailed user activity for logons, authentications and other key services across enterprises to enhance threat detection and security monitoring. A central console eliminates the need and complexity for multiple IT audit solutions
Eliminate unknown security concerns, ensuring continuous access to applications, systems and users by tracking all events and those changes related to specific incidents.
Alleviate stress and complexity by automatically interpreting cryptic data and its severity for faster and better decision-making.
Mitigate security risks in seconds with real-time alerts to any device for immediate response, in or out of the office.
Reduce the performance drag on servers by collecting events without the use of native auditing.
Streamline compliance reporting, isolated for internal policies and external regulations, including SOX, PCI DSS, HIPAA, FISMA, SAS 70 and more.
Provide managers and auditors evidence of appropriate IT controls for peace of mind
Security and system administrators have a broad range of responsibilities, including achieving and maintaining IT security and compliance across their Microsoft environments. But, as organizations grow both on premises and expand into the cloud, they often lack visibility in terms of users, groups, permissions, applications and more. This can result in compromised security and potential data loss. Knowing who can access what information in your Microsoft environment is imperative if you want to keep your data and users secure.
With Enterprise Reporter, you can gain visibility into critical configurations— no matter the Microsoft platform. Our comprehensive reporting solution enhances compliance with security best practices and internal policies while helping you ensure compliance with external regulatory mandates, including HIPAA, GDPR, PCI, SOX, FISMA, and more. And when paired with Security Explorer, you’ll be able to modify permissions quickly from within your reports. This means you can immediately close security vulnerabilities, reduce risk and ensure proper access while saving time. With the Quest solutions, you become more secure and compliant, with less administration, and can stay ahead of vulnerabilities to prevent breaches or data loss.
Deliver real-time assessments into who has access to what resources across your Microsoft environment, both on premises and in the cloud
Avoid group sprawl in your Office 365 environment with visibility into what Microsoft Teams are being created and how they're being used.
Improve security and compliance by increasing visibility into the configuration of critical IT assets while maintaining proper separation of duties
Is scalable, secure and customizable to support large and complex Windows environments with multiple groups of report consumers
Optimize Office 365 license allocation and service plan decisions with visibility into your tenants, subscriptions and licensing service plans, and Azure resource optimization with visibility into virtual machines and disk utilization
Windows network administrators must increasingly manage critical Microsoft Active Directory environments more quickly and with fewer staff. Doing more with less increases the likelihood of accidental changes to Active Directory (AD) objects, configurations and Group Policy data that can raise your risk of hardware and software failure. The need to enforce internal policies and address compliance regulations only adds to the challenge. You need an all-inclusive, cost-efficient solution that can help you secure, manage, maintain, audit and prevent problems in AD and Group Policy environments.
Active Administrator is an extensive Active Directory management solution that allows you to control auditing, security, recovery and health for Active Directory from a single integrated console. By centralizing the management of the most important capabilities of AD and Group Policy, Active Administrator saves you time and delivers maximum control over your environment.
Improves regulatory compliance enforcement of internal policies with comprehensive audit trails, access controls and reporting
Tightens security through simplified, standardized security management, elimination of overprivileged users and consistent delegation of AD administration
Increases IT efficiency by simplifying routine AD management tasks to give you more time for business-critical tasks
Ensures AD health by monitoring replication and domain controller status and performance, and by automating database maintenance
Maintains business continuity by delivering alerts on AD and GPO changes to reduce network and user downtime, and by ensuring rapid recovery from accidental changes, deletions and administrative errors
As one of the most robust configuration tools in your Windows infrastructure, Group Policy plays a key role in establishing a secure and compliant networking environment for your users. Because Group Policy regulates everything – from critical business processes and security settings to individual workstations and printers – managing and administering Group Policy objects (GPOs) is an expensive, time-consuming task.
With GPO Admin, you can automate critical GPO management tasks and reduce your costs while eliminating time-intensive manual processes. Quickly and effectively administer changes toGPOs to support change management best practices, enable effective approval processes and secure your critical data. You can also easily verify, compare, update and roll back GPO versions over time to confirm the consistency of various GPO settings.
Quickly verifies setting consistency and improves GPO auditing with side-by-side GPO version comparisons
Delivers a configurable GPO review and approval workflow with comments and email notifications
Protects GPOs from accidental modification
Deploys changes as they’re approved or on your schedule
Automates administrative tasks with prepackaged PowerShell scripts
Helps ensure compliance with ITIL, MOF, SOX, Basel II, HIPAA and C-198
Supports change management best practices through workflow and automation
Human error, data breaches and hardware failures can easily corrupt your critical systems such as Active Directory (AD), Azure AD, Office 365 or Exchange. Cybercriminals are getting more sophisticated and launching more and more attacks every day. They put millions of users and organizational finances and reputations in jeopardy. Waiting for the next ransomware attack or hardware failure is not a solution. Having a proper backup and recovery solution in place is.
Whether you’re running AD, Azure AD, Office 365 or Exchange, Quest has a backup and recovery solution to protect your critical data. Quickly recover an individual mailbox, AD object and attribute, permission, email or file all the way to a complete AD forest failure or domain controller operating system loss. Avoid data loss due to security breaches or hardware failure and maintain business continuity with Quest disaster recovery solutions.
Greatly reduces downtime and loss of productivity resulting from the corruption of AD data
Simplifies and speeds recovery of Active Directory without taking AD offline
Saves time by comparing backup data to current values to quickly pinpoint changes
Restores individual attributes even when the object itself has not been deleted
Streamlines searches by using a single console to find and retrieve data from multiple sources, including Exchange on-premises and Online (Office 365)
Leverages investments in existing backup technology with support for the most common backup media and software — while eliminating the need for a dedicated recovery server
Preserves company knowledge that might be needed for investigations
Improves SLAs by providing granular, message-level data recovery
Improves productivity by automating Exchange discovery and recovery tasks
Improves security with reporting that shows all searches performed and messages retrieved
Metalogix ControlPoint enables permissions, auditing, reporting and governance policies for SharePoint. Confidently manage permissions, audit user and admin actions, automate and delegate SharePoint governance, clean up SharePoint content, monitor user adoption and protect against data breaches and suspicious user behavior.
Comprehensive permission policy compliance
Audited user and admin actions
Automated and delegated SharePoint governance
SharePoint Content management
Consistent User experience
Monitored user adoption
Ensure a comprehensive backup and restore solution for your entire SharePoint environment. Protect your SharePoint environment, create backup sets that are highly compact and secure, enable granular restores of individual or departmental content and streamline recoveries with self-service features that empowers admins and users and saves time.
Comprehensive SharePoint backups
Accelerated SharePoint data recovery
Granular SharePoint content restore
User self-service recovery
Replace your manual processes, non-integrated point solutions, or overly complex software suite with the industry’s most comprehensive endpoint systems management solution, giving your IT team more time to innovate.
KACE fast-to-implement, easy-to-use systems management and deployment solutions provision, manage, secure, and service your growing organization’s network-connected devices, including Windows PCs, Macs, Chromebooks, tablets, Linux, UNIX, and Windows Servers, printers, storage and the internet of things (IoT),while delivering a rapid return on investment.
Comprehensive systems management for PC, tablet, server, mobile devices and connected non-computing devices
Preconfigured appliances, robust features, simple integrations with other software, fast deployment and rapid time to value
Enterprise-class capabilities with a midmarket price point and an efficient implementation model
Toad Software is a database management toolset from Quest that database developers, database administrators and data analysts use to manage both relational and non-relational databases using SQL. Take a proactive approach to database management. Re-focus your teams on more strategic initiatives and move your business forward in today’s data-driven economy.
Work smarter and meet the demands of today’s database environments. Toad simplifies workflows, automates frequent or repetitive processes, and minimizes risks associated with changes– whether you’re a database developer, administrator or analyst.
The premier tool for database professionals with nearly 20 years of development
Elevates the expertise of data professionals through extensive automation and collaboration capabilities
Offers unmatched functionality to reduce the time to learn, implement and manage new and existing database platforms
Works across the most widely used databases (includingRDBMS and NoSQL) to provide a future-ready solution