For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Unified Identity Security for Public Sector

Government bodies support large and diverse user populations that access all levels of digital resources. With citizens depending on them to keep the lights on, the water flowing and to protect, government bodies must ensure that their systems are secure and efficiently run.

See how One Identity solutions control identity sprawl and ultimately protect what is most essential to serving your constituents – your people, applications and data.

With a broad, global reach, One Identity helps federal, state and local entities (plus military and intelligence agencies) address identity security in a holistic fashion.
Federal/Central

Federal/Central

Control access of internal and external users to resources, manage privileged accounts and policies are followed and compliance is met. You can also accelerate economic progress and improve the health and safety of your citizens without sacrificing security.
State & Local

State & Local

With One Identity solutions, state and local agencies can protect information and resources, reduce costs and secure access to applications and online services – and ultimately better serve citizens.

Common Criteria Certifications

One Identity Safeguard for Privileged Passwords 6.7 is Common Criteria certified against the NIAP-approved Protection Profile for Network Devices, Version 2.2e , and One Identity Manager 8.1 is Common Criteria certified against the NIAP-approved Protection Profile for Enterprise Security Management – Identity and Credential Management v2.1.

One Identity ISO/IEC Certifications

One Identity SaaS solutions are developed, operated, and supported within the scope of the One Identity Information Security Management System, which has achieved ISO/IEC 27001:2013 certification, and is aligned to meet the additional control implementation guidance in ISO/IEC 27017:2015 and ISO/IEC 27018:2019. For our customers, meeting the requirements of these important industrial standards can provide confidence that our cloud infrastructure has been independently verified to effectively manage information security and privacy.

Solutions

No matter the challenge, Quest Public Sector has the right solution for your business

Featured products

Active Roles

Secure and automate the administration, access and provisioning of users and groups for AD/AzureAD

Learn More

Active Roles

Secure and automate the administration, access and provisioning of users and groups for AD/AzureAD

Learn More

Defender

Protect your network resources with enterprise two-factor authentication

Learn More

Defender

Protect your network resources with enterprise two-factor authentication

Learn More

Identity Manager

Govern and secure user access to data and enterprise apps to reduce risk and satisfy compliance

Learn More

Identity Manager

Govern and secure user access to data and enterprise apps to reduce risk and satisfy compliance

Learn More
Show more

Resources

Case Study

UK Parliament optimizes Active Directory (AD) management

UK Parliament optimizes Active Directory (AD) management
Case Study

Swiss Post: Kontrolle über IAM übernehmen

Swiss Post reduziert Verwaltungsaufwand und strafft Compliance-Verfahren unter Verwendung einer umfassenden IAM-Lösung
Case Study

Swiss Post: Taking back control of identity and access management

Switzerland’s national postal service was using a script-based IAM solution that was no longer a good fit, as it had become inc...
Case Study

The City of Coppell secures citizen and employee information with Active Roles

Active Roles removes cumbersome and error-prone manual processes from Active Directory user lifecycle management
Case Study

IT solutions and managed service provider trusts the Quest and One Identity products it sells

Phoenix Software strengthens its own security and cyber resilience with solutions from Quest and One Identity.
White Paper

Ensuring NIS2 compliance with privileged access management: A comprehensive blueprint

The NIS2 Directive is the European Union’s effort to raise the level of cyber resiliency across member states. This paper addre...
Technical Brief

Safeguard Enables Convenient Secrets Management for DevOps

Get actionable insights and real-world examples that equip you to navigate the intersection of DevOps and PAM successfully.
White Paper

Solving the 3 Most Impactful AD and Entra ID Group Management Challenges

Today’s cyberattacks rely heavily on an attacker’s ability to gain privileged access beyond that of a low-level user.

Contact an expert