www.quest.com Open in urlscan Pro
2600:9000:250b:4200:14:56cf:b500:93a1  Public Scan

Submitted URL: https://questone.de/
Effective URL: https://www.quest.com/
Submission: On November 29 via api from US — Scanned from US

Form analysis 0 forms found in the DOM

Text Content

For the best web experience, please use IE11+, Chrome, Firefox, or Safari
 * Resources
    * All Resources
    * Learning Hub
   
   
 * Blogs
    * IT Industry Insights
    * Quest Solution Blogs
      * Data Protection
      * Data Management
      * Microsoft Platform Management
      * Performance Monitoring
      * Unified Endpoint Management
      * IT Ninja
      * Toad World Blog
   
   
 * Forums
 * 
   
 *  * United States (English)
    * Brazil (Português)
    * China (中文)
    * France (Français)
    * Germany (Deutsch)
    * Japan (日本語)
    * Mexico (Español)
   
   
   
 * 
   
 *  * Account Settings
    * Sign Out
    * Sign In
    * Create Account
   
   

 * United States (English)
 * Brazil (Português)
 * China (中文)
 * France (Français)
 * Germany (Deutsch)
 * Japan (日本語)
 * Mexico (Español)


Products
Main Menu Products


PRODUCTS

BY PRODUCT CATEGORY

AD SECURITY & RECOVERY

Featured Products
 * Recovery Manager
 * BloodHound Enterprise
 * Change Auditor
 * GPOADmin
 * Enterprise Reporter

View All

DATA GOVERNANCE

Featured Products
 * erwin Data Modeler
 * erwin Data Intelligence
 * erwin Evolve
 * Toad Data Point

View All

DATA OPERATIONS

Featured Products
 * Foglight
 * Foglight for Databases
 * Foglight Evolve
 * Toad for Oracle
 * ApexSQL
 * SharePlex

View All

DATA PROTECTION

Featured Products
 * QoreStor
 * NetVault Plus
 * Rapid Recovery
 * Recovery Manager
 * vRanger

View All

MIGRATION & CONSOLIDATION

Featured Products
 * On Demand Migration
 * Migration Manager
 * Migrator Pro
 * Metalogix Content Matrix
 * PST Flight Deck
 * Archive Shuttle

View All

UNIFIED ENDPOINT MANAGEMENT

Featured Products
 * KACE Unified Endpoint Manager
 * KACE Systems Management
 * KACE Systems Deployment
 * KACE Cloud
 * KACE Desktop Authority
 * KACE Service Desk

View All

UNIFIED IDENTITY SECURITY

Featured Products
 * Identity Manager
 * One Identity Safeguard
 * Active Roles
 * Authentication Services
 * Password Manager

View All
View All Products

Solutions
Main Menu


SOLUTIONS

 * AUTOMATE BACKUP & DISASTER RECOVERY
   
   Restore business operations, data integrity and customer trust in minutes or
   hours instead of weeks or months

 * BECOME DATA DRIVEN
   
   Empower enterprise stakeholders to use data assets strategically for data
   operations, data protection and data governance

 * GAIN COMPREHENSIVE DATA PROTECTION
   
   Protect and recover all your systems, applications and data while reducing
   backup storage costs

 * IMPROVE YOUR CYBERSECURITY POSTURE
   
   Achieve identity-centric cybersecurity to protect the people, applications
   and data that are essential to business

 * MIGRATE & CONSOLIDATE MICROSOFT WORKLOADS
   
   Conquer your next migration (now and in the future) by making it a non-event
   for end users

 * PROTECT AND SECURE YOUR ENDPOINTS
   
   Discover, manage and secure evolving hybrid workforce environments

 * SECURE ACTIVE DIRECTORY AND MICROSOFT 365
   
   Mitigate risk with attack path management, threat detection and disaster
   recovery

View All Solutions Browse by Platform Browse by Industry
Solutions


BROWSE BY PLATFORM

 * Active Directory
 * Oracle
 * CISCO
 * SAP / SYBASE
 * PostgreSQL
 * SharePoint
 * Exchange
 * SQL Server
 * Teams
 * Hyper-V
 * Unix / Linux
 * Lotus Notes
 * VMware
 * OneDrive for Business
   
 * Windows Server


BROWSE BY INDUSTRY

 * Education
 * Healthcare
 * Energy
 * Manufacturing
 * Federal Government
 * State & Local Government
 * Financial Services


Support & Services
Main Menu
 * Support Portal
 * Contact Support
 * Communities
 * Services


Partners
Main Menu
 * Partner Program
 * MSP Program
 * Partner Portal Login
 * Partner Locator
 * Technology Partners
 * Deal Alert


About
Main Menu
 * Why Quest
 * Leadership
 * Customer Stories
 * News
 * Careers
 * Contact Us


Resources
Main Menu
 * All Resources
 * Learning Hub

Blogs
Main Menu
 * IT Industry Insights
 * Quest Solution Blogs
   * Data Protection
   * Data Management
   * Microsoft Platform Management
   * Performance Monitoring
   * Unified Endpoint Management
   * IT Ninja
   * Toad World Blog

Communities
United States (EN)
Main Menu
 * United States (English)
 * Brazil (Português)
 * China (中文)
 * France (Français)
 * Germany (Deutsch)
 * Japan (日本語)
 * Mexico (Español)

Free Trials Request Pricing



WHERE NEXT MEETS NOW

At Quest, we create and manage the software that makes the benefits of new
technology real while empowering users and data, streamlining IT operations and
hardening cybersecurity from the inside out. Companies turn to us to manage,
modernize and secure their business, from on-prem to in-cloud, from the heart of
the network to the vulnerable endpoints.

We help you conquer your next challenge with confidence and achieve true IT
resilience — because next is here now.

Contact Us


Empower

Manage, Protect and Govern Data for the Next Decision


Modernize

End to End Support for the Next Microsoft Challenge


Secure

Stronger Cyber Resilience for the Next Threat

Previous
 * 
 * 
 * 

Next


WHY QUEST?

For over 30 years, we have been turning hype into help for enterprise
organizations just like yours. Our enterprise software solutions deliver true IT
resilience with software that empowers identities, users and data, streamlines
IT operations and hardens cybersecurity from the inside out. Database and
systems management, end-to-end Microsoft solutions, and cybersecurity resilience
solutions from Quest help you achieve better productivity and security. You can
be absolutely assured that you will achieve your next IT goal now, and in the
future.

95%

of the Fortune 500 trust Quest Software

200+

Patents

95%

Customer satisfaction

4M+

Community members


SOME OF THE WORLD’S LEADING BRANDS DEPEND ON QUEST.

previous
 * 
 * 
 * 
 * 
 * 

next
 
See All Customer Stories


PRODUCTS FOR EVERY IT ENVIRONMENT

At Quest we help you tackle whatever IT challenge comes next so you can move to
productivity quickly and achieve your next IT goal now, and in the future. Take
control of your enterprise with comprehensive hardware and software inventory
and asset management across a range of operating systems and devices. Migrate
and modernize your environment without disruption whether on-premises, in the
cloud or hybrid. Strengthen your cybersecurity resilience with identity
management, enterprise vulnerability detection, and auditing and compliance.

Learn More


SOLUTIONS FOR EVERY PLATFORM

We have the solutions you need to deploy your next SharePoint or Office 365
migration, replicate Oracle databases, strengthen your cybersecurity resilience
for Active Directory, and secure your enterprise endpoints. We offer software
solutions for what’s next. No matter the platform, no matter the challenge —
data explosion, cloud expansion, security threats or compliance, Quest has a
solution that fits your needs.

Learn More


FEATURED RESOURCES

View All

White Paper


WHY IT IS TIME TO REDEFINE ENDPOINT MANAGEMENT

IT environments are becoming more complicated, with remote employees accessing
company data outside the safety of the traditional network and pers...

E-book


ULTIMATE CYBER-RESILIENCY: A GUIDE TO COMBATTING AD SECURITY VILLAINS

Defend your hybrid Active Directory from risks, threats and disaster.

Technical Brief


UPGRADING QUEST TOAD FOR GREATER SECURITY

IT administrators are right to draw a line in the sand when it comes to the
software they install – and allow their users to install – on their de...

White Paper


DCIG PAPER: DATA DEDUPLICATION THAT EMBRACES CLOUD STORAGE

Learn how software-defined data deduplication is the best approach and how it
helps achieve your cloud strategy while minimizing cloud storage req...

White Paper


FUTURE-PROOFING ENDPOINT MANAGEMENT

New devices, platforms, applications, and technologies connecting to the network
are overwhelming IT’s ability to manage endpoints across the ente...

Infographic


SEVEN STEPS TO SURVIVING THE ACTIVE DIRECTORY RETIREMENT CRISIS

The impending mass retirement of employees with Microsoft MCSE and MCSA
certifications will almost certainly lead to a knowledge gap in Active Dir...

On Demand Webcast


TAKE TWO STEPS TO OBTAIN ENDPOINT COMPLIANCE AND DATA PROTECTION

Join industry experts, Tim Warner, and Jillian Salamon of Quest Software, as
they walk you through practical steps to achieve endpoint compliance.

Technical Brief


DCIG NAMES QUEST NETVAULT PLUS A TOP 5 SME ANTI-RANSOMWARE BACKUP SOLUTION

This report from IT analyst firm DCIG reviews one of its Top 5 SME
Anti-Ransomware Backup Solution recommendations: Quest NetVault Plus.

On Demand Webcast


TOAD DATA POINT WORKBOOK 101: THE INS AND OUTS

If you haven’t tried Workbook yet, give us 30 minutes and we’ll demonstrate how
it can help you with data preparation.

On Demand Webcast


ASK THE EXPERTS: DATABASE PERFORMANCE ROUNDTABLE

Tune in for this one-of-a-kind opportunity to get advice and real-world insight
from industry-leading experts, Brent Ozar, Microsoft Certified Mas...

E-book


THE TECHSLAYER CHRONICLES

The Techslayer Chronicles: In the grip of Microsoft 365 migration mayhem

White Paper


GET TOTAL ENDPOINT SECURITY WITH KACE

As an IT professional, you’re likely under pressure to manage an increasingly
complex environment, while also protecting your network and devices ...

On Demand Webcast


RECOVERING ACTIVE DIRECTORY IN A HYBRID WORLD

AD Mistakes Happen – How do you quickly recover without missing a beat?

On Demand Webcast


MODERNIZE YOUR ENDPOINT MANAGEMENT

Too many companies are hanging on to outdated endpoint management systems,
unsure how to modernize. Endpoint updates are becoming more complex and...

White Paper


TOP 10 ACTIVE DIRECTORY SECURITY REPORTS AND ALERTS YOU NEED

Discover the top 10 reports and alerts you need to ensure the stability and
security of your on-prem or hybrid Active Directory, and see how easil...

On Demand Webcast


DISMANTLING RANSOMWARE WITH UNIFIED ENDPOINT MANAGEMENT

Don’t be a statistic. An average ransomware attack occurred every 11 seconds in
2022 (CyberSecurity Ventures). Securing and protecting your endpoi...
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 


CONTACT US

Ready to tackle your next IT challenge? We’re here to help.

Contact Us


ABOUT

 * Why Quest
 * Leadership
 * Customer Stories
 * News
 * Careers
 * Contact Us

SUPPORT

 * Support Portal
 * Contact Support
 * Forums

CONTACT

 * Contact Quest
 * Contact Sales
 * Request Pricing
 * Licensing Assistance
 * Accounting

RESOURCES

 * Industry Insights Blog
 * Communities
 * Documents
 * Events
 * Video

© 2023 Quest Software Inc. All Rights Reserved. Legal| Terms of Use| Privacy
Policy Your Privacy Choices| Cookie Use Policy
 * 
 * 
 * 
 * 

United States of America (EN)
 * United States (English)
 * Brazil (Português)
 * China (中文)
 * France (Français)
 * Germany (Deutsch)
 * Japan (日本語)
 * Mexico (Español)

Please wait...


This is the end


COOKIE PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
Cookie Use Policy
Allow All


MANAGE COOKIE PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

MARKETING COOKIES

Marketing Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


BACK



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
Switch Label label
Switch Label label
Switch Label label

Confirm My Choices











word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word

mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1