Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

Quest Intrust

2.5
(2)

Only with Quest InTrust, you can monitor all user workstation and administrator activity from logons to logoffs and everything in between.

Work for Quest Intrust?

Learning about Quest Intrust?

We can help you find the solution that fits you best.

Find the Right Product

Quest Intrust Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • Industry
Ratings
Company Size
User Role
Industry
Showing 2 Quest Intrust reviews
LinkedIn Connections
Quest Intrust review by Vanessa T.
Vanessa T.
Validated Reviewer
Review Source
View Original
content
Business partner of the vendor or vendor's competitor, not included in G2 scores.

"Quest Intrust "

Sign in to G2 to see what your connections have to say about Quest Intrust
Quest Intrust review by Multibuilding S.
Multibuilding S.
Validated Reviewer
Review Source
content

"Quest Intrust "

What do you like best?

The Quest intrust it helps you to find out what's happening with your on your entire environment from end to end, in just a report on your email without to have to go into the application because it goes right to your e/mail address. you just have to configure it in the right way and have all the agents deploy and will be available.

What do you dislike?

What i dislike for intrust is that i'm no able to configure it without an expert, is kind of difficult to understand the deployment and the workflow. is not and online monitoring, is most like for audits.It's way to complicated to make the work flow and star jobs.

Recommendations to others considering the product

Test it before you buy it, because it may need to spend more money doing training.

What business problems are you solving with the product? What benefits have you realized?

The benefits is that after the personal from quest configure it we can receive the information easy and can audit it without going into the application

What Other IT Security solution do you use?

Thanks for letting us know!

There are not enough reviews of Quest Intrust for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Google Cloud Resource Manager Logo
Google Cloud Resource Manager
4.1
(27)
Google Cloud Platform provides resource containers such as organizations, folders, and projects, that allow users to group and hierarchically organize other Cloud Platform resources.
2
Open DNS Personal Internet Security Logo
Open DNS Personal Internet Security
4.5
(23)
The easiest way to make your Internet safer, faster and more reliable.
3
Darktrace Logo
Darktrace
4.1
(24)
The enterprise immune system
4
Esker on Demand Logo
Esker on Demand
4.6
(16)
Esker on Demand is a cloud-based document process and information exchange service that enables companies to automate the processing and exchange of crucial business documents it include rapid project go live, increased profitability, pay only for what you use, and low risk.
5
Palo Alto Networks GlobalProtect Logo
Palo Alto Networks GlobalProtect
4.5
(14)
GlobalProtect delivers the protection of next-generation security platform to the mobile workforce in order to stop targeted cyberattacks, evasive application traffic, phishing, malicious websites, command-and-control traffic, and known and unknown threats.
6
Apple Support Number Logo
Apple Support Number
4.4
(14)
Apple Support Number offers Apple customer service for MacBook, iPad, iPhone and iTunes.
7
Qihoo 360 Logo
Qihoo 360
4.2
(14)
360 Total Security offers your PC complete protection from Viruses, Trojans and other emerging threats. Whether you are shopping online, downloading files or chatting with your friends you can be sure that 360 Total Security is there to keep you safe and your computer optimized.
8
Outlook Password Recovery Logo
Outlook Password Recovery
3.7
(7)
Outlook Password Recovery software is a software that can to reset forgotten Outlook PST password, support to recover longer and multilingual password and unlock protected PST file within seconds and get data from protected PST file without any data defeat.
9
Prey Logo
Prey
4.6
(6)
Prey is an Anti-Theft and management application that helps you keep track and secure your laptop, phone and tablet.
10
Palo Alto Networks URL Filtering PAN-DB Logo
Palo Alto Networks URL Filtering PAN-DB
4.8
(6)
The majority of attacks and exposure to malicious content occurs during the normal course of web browsing activities, which requires the ability to allow safe, secure web access for all users. URL Filtering with PAN-DB automatically prevents attacks that leverage the web as an attack vector, including phishing links in emails, phishing sites, HTTP-based command and control, malicious sites and pages that carry exploit kits.
Show more
Kate from G2

Learning about Quest Intrust?

I can help.
* We monitor all Quest Intrust reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.