Quest Software Whitepapers


Sort by: Date | Company | Title


Understanding Privileged Identity Theft
By Quest Software | 23/10/2019

This white paper will explain why privileged identities pose such a risk to enterprises, how they are compromised by attackers, how current methods fail to stop these threats, and how your organization can protect itself.

Download this now


SIEM Integration Best Practices: Making the Most of Your Security Event Logs
By Quest Software | 23/10/2019

THE GREAT LOG COLLECTION DEBATE Many organizations put their SIEM at the center of their log collection, archiving and analysis model. But when combined with a couple of hard facts and an inconvenient truth, this model often leads organizations to make the potentially catastrophic choice not to collect all their log data.

Here’s how the reasoning frequently goes.

Download this now


Hybrid IAM offers Flexibility and Enhanced Security
By Quest Software | 23/10/2019

One of the fastest growing segments of the Identity and Access Management (IAM) market is the cloud segment. Increasingly, companies are choosing to move at least part of their security infrastructure to cloud-based solutions. Even if you still run critical IAM service on-prem, there’s a great chance you manage and integrate with cloud applications. Here are the benefits of deploying or migrating to cloud-based IAM solutions.

Download this now


Detect, defend against and recover from insider attacks
By Quest Software | 23/10/2019

Accept that sooner or later you’re going to have someone prowling around your network looking to cause damage or steal your critical data. Even the best perimeter defenses can do nothing to stop them, so it's essential to also have strong Active Directory security and governance in place.

Here is a how to on combating the insider threat effectively.

Download this now