Quest

Aliso Viejo, CA, USA
1987
  |  By Darren Mallette
With the release of Foglight version 6, alarm management has been simplified with the use of alarm templates. You can access Alarm Templates directly from the left-hand panel in the new UI. However, if you've upgraded from a previous version, it helps to start using the familiar alarm configuration workflow. There is a new tab for "Alarm Template Settings." This allows you to do 2 tasks.
  |  By Jason Hall
Far too often, organizations look at monitoring solutions as "nice to have", or better put, as luxury items that make the lives of IT administrators easier, but come at a cost. This series will look at ways that organizations have saved money off of their IT budgets, by bringing Foglight into their environment. The first post in this multi-part series will focus on consolidating an organizations cross platform database monitoring under a single solution: Foglight for Databases.
  |  By Pini Dibask
We are very excited to announce the general availability of Quest® Foglight® version 6.0. Foglight is the world’s broadest and deepest monitoring and optimization solution for the hybrid enterprise. Foglight brings unique top-to-bottom infrastructure monitoring and optimization capabilities for your hybrid IT stack including databases, cloud infrastructure, operating systems, hypervisors, containers and more.
  |  By Tim.Fritz
Digital transformation is creating many challenges for businesses including data platform diversity, IT skills gaps, cost control (especially cloud) and a more complex technical environment that can have performance issues with many possible causes. Speed, always-on, outstanding customer experience, and cost control are the business requirements driving digital transformations and resulting in performance and risk challenges facing database operations teams. What are those challenges?
  |  By Tim.Fritz
Organizations are changing fast to keep up with business demands. Digital transformation is being driven by the business, but IT (central and business-run) is making it happen. As they take on new database platforms, analytics tools and other digital transformation initiatives, an organization’s ability to empower their people and processes with data can be a game-changer.
  |  By Tim.Fritz
As hybrid cloud becomes more prevalent, the challenges of cloud adoption and using multiple cloud platforms are compounded as complexity increases. In this blog, we’ll examine some of the major risks an organization and its leaders face when hybrid cloud – a mixture of one or more cloud providers, one or more cloud configurations and on-premises systems – becomes reality.
  |  By Pini Dibask
Quest Software is excited to announce our extended Spotlight® Cloud offering which will deliver deep performance diagnostics to both on-premises and cloud SQL Server environments from a single, innovative SaaS platform.
  |  By Amit Parikh
In the world of Performance Monitoring, you are certainly going to hear about use-cases that require integration with third-party solutions such as those used for IT Service Management (ITSM). For our customers using Foglight for Cross Platform Databases this means being able to automatically have an Alert create an incident in the ITSM solution used for Incident Management.
  |  By Gita Sharifi
SQL Server provides us with a number of high availability and disaster recovery solutions. Two of them are Always On Availability Groups and Always On Failover Cluster offerings. In order to leverage these options, they themselves need to be constantly evaluated. Therefore, monitoring the health and status of these Always On instances is critical, but how do we optimally configure them in Spotlight? My aim is to provide insight to the configuration steps based on the type of Always On instance.
  |  By David Orlandi
IT Administrators need to keep an eye on Availability, Performance, and Storage of mission-critical environments. There are many things to consider as you develop a Monitoring and Diagnostics strategy.
  |  By Quest
Learn how to secure your Active Directory with Quest & SpecterOps.
  |  By Quest
You don't get built-in backup and recovery with Microsoft 365. NetVault provides that.
  |  By Quest
Cloud migration is the process of moving digital assets, including data and applications, to a remote server or “cloud.” Organizations use erwin Cloud Catalyst to simplify and accelerate cloud migration. One common example of a cloud migration is the transfer of data from an on-premise data center to a public, cloud-computing environment. As organizations become increasingly digital and data-driven, cloud migrations are becoming more common.
  |  By Quest
Discover how the Quest KACE solutions provide everything you need to effectively address some or all your endpoint management needs — using either individual tools for specific tasks or all of them together as an integrated solution.
  |  By Quest
Mistakes, cyber attacks and disasters happen, and without a recovery plan, an Active Directory disaster can stop your business in its tracks. But see in just two minutes how you can prepare and recover from any AD disaster with Quest® Recovery Manager for Active Directory Disaster Recovery Edition.
  |  By Quest
Listen in as Quest product experts Ghazwan Khairi, Bryan Patton and Robert Tovar discuss how InTrust seamlessly integrates with your SIEM solutions for real-time security analytics and lower annual SIEM costs.
  |  By Quest
Using Foglight and SQL Optimizer you can identify poorly performing queries and rewrite them or generate a more efficient execution plan. First, use Performance Investigator to identify and select the query you wish to tune, i.e., by number of executions, IO, CPU time, etc. The video explains how to use SQL Optimizer for better query performance.
  |  By Quest
Learn about monitoring environments in Foglight Evolve from Quest.
  |  By Quest
Listen in as Quest product experts Ghazwan Khairi, Bryan Patton and Robert Tovar discuss how InTrust seamlessly integrates with your SIEM solutions for real-time security analytics and lower annual SIEM costs.
  |  By Quest
Keeping users happy and boosting IT productivity is easier than you think when you have an effective service desk tool. Read this white paper to discover the ten key features to look for in a service desk solution.
  |  By Quest
Most cyberattacks today begin on user workstations. Why? Well, in part it's because workstations, unlike servers, are typically the province of non-technical users, who are easier prey for attackers. It's easy to lay all the blame on users, but attacks are getting more sophisticated all the time. The other side of the coin is that users' workstations are also particularly vulnerable, for several reasons.
  |  By Quest
Complete, reliable user activity tracking is essential to both security and compliance. But using native tools means struggling with an avalanche of uncorrelated, cryptic event activity from individual DCs, servers and more, and most third-party tools are cumbersome to implement and don't provide the depth of auditing required.
  |  By Quest
Too many organizations today spend millions of dollars fortifying their perimeters to keep attackers out of their network, but fail to pay sufficient attention to the malicious users already inside. In fact, insider threats actually represent 60% of all cyber security attacks, so they can't just be ignored.
  |  By Quest
Endpoint management has become more complex. Besides deploying and maintaining a growing range of devices, IT administrators also need to continually meet compliance standards and protect their organization's network.
  |  By Quest
Organizations today are increasingly the targets of sophisticated threats developed by a shadowy and well-financed cybercrime industry that has demonstrated it can often outsmart even the most robust security defenses. Worse yet, cybercriminals are aided by the fact that security teams often lack the human and financial resources necessary to keep pace with evolving threats, so they often cannot defend against every attack coming their way.
  |  By Quest
The Internet of Things (IoT) has fueled a proliferation of connected devices that do amazing things. If your business wants to get on board, you've got to face the challenge of managing and securing these devices to protect your networks - and all of the critical data that resides there.
  |  By Quest
In this Analyst Connection, IDC research director Melinda Ballou answers questions about the state of DevOps, the value it provides for continuous application delivery and the idea of integrating database development into the DevOps workflow.
  |  By Quest
The key to a successful infrastructure migration to the cloud is planning. When migrating virtual machine workloads from an on-premises data center into Azure, the goal is to maintain business continuity by building a hybrid environment that leverages the benefits of running in Azure.
  |  By Quest
While costly data breaches continue at organizations of all sizes and across all industries, no one wants to be the next headline. Instead of focusing on external attackers, organizations must accept the fact that many intrusions come from inside their systems. In fact, according to the 2016 Cyber Security Intelligence Index, insider threats represent 60 percent of all attacks. Fortunately, there are tools and technologies that can help.

Simple IT management for a complex world. Technology keeps changing. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

We are more than just a name – we are on a quest to make your information technology work harder for you. Our solutions simplify the IT operations at more than 100,000 organizations worldwide. Rely on us to help you turn data into insights quicker, modernize your infrastructure faster for the cloud, optimize the application experience and get control of every device that touches your network.