View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
December 22, 2011

Quest Software buys BiTKOO

BiTKOO Keystone technology will be included in Quest One Identity Solutions

By CBR Staff Writer

IT management, systems management offerings provider Quest Software has acquired authorisation and entitlement management offerings provider in enterprise IT environments, BiTKOO.

By providing easier accountability and greater transparency for enterprise, cloud, and SaaS- based scenarios through externalised authorisation, the acquisition further extends the strength of Quest One Identity Solutions in access governance .

Under the acquisition, BiTKOO Keystone technology will be included in Quest One Identity Solutions.

The integration BiTKOO’s Keystone technology to Quest One Identity Solutions offers fine-grained authorisation using the XACML standard for applications built in-house, enabling consistent management of access to diverse applications, web services and data regardless of operating system or application framework.

In addition, the integration also offers fine-grained access control for consistent, dynamic authorisation across SharePoint and an exclusive row and column level security for SQL Server without the need to write custom code.

Quest Software Identity & Access Management vice-president and general manager Nick Nikols said BiTKOO’s products are fit for Quest One as Quest Software continue striving to simplify IAM for its customers.

"This investment will make Quest the first large IAM vendor to offer organizations the capability to define granular access controls for users based on user attributes, the resource and the context of the access request. It’s a perfect complement to our current Quest One offerings that leverage existing investments and address current concerns, while laying the groundwork to address future needs," said Nikols.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU