Quest Software Opens New Centre for Advanced AI Architecture in Ireland

Quest Software, a global leader in data management, cybersecurity, and platform modernization, today announced the opening of its new Centre for Advanced AI Architecture. The opening is supported by the Irish Government through IDA Ireland. To learn more, visit quest.com.

AI adoption is increasing across every sector, and organizations need stronger foundations in data, security, and modern platforms. The new centre will play a central role in meeting these needs through applied research and development, and engineering work, to deliver market-leading and first-of-a-kind innovations that will help drive customer success and Quest growth.

The centre expands Quest’s global AI initiative and strengthens the company’s focus on helping customers succeed in the AI era. This includes a $350 million capital infusion announced earlier this year along with new executive leadership to support Quest’s growth. The planned investment in the Cork Centre for Advanced AI Architecture is a key part of that initiative and supports the company’s strategy across three key areas: trusted AI-ready data, AI-powered cybersecurity, and platform modernization to scale with AI demands. The centre will serve as a hub for applied research and development. Teams in Cork will work across AI engineering, data science, cybersecurity, and software development to advance these priorities and strengthen Quest’s market-leading products in these areas.

Michael McGrath, European Commissioner for Democracy, Justice, the Rule of Law and Consumer Protection said: I am very pleased to join the team at Quest Software here in Cork to celebrate this significant investment in skills, talent, and jobs. The European Commission recognises the urgent need to expand Europe’s pool of AI expertise. That is why, a few months ago, we launched the AI Continent Action Plan — to train and attract more AI researchers and professionals, and to strengthen AI skills and literacy across our workforce.

The announcement aligns perfectly with that ambition. It strengthens Europe’s innovation capacity and is a strong endorsement of Cork and the wider Southwest region. It demonstrates the role Cork plays as a dynamic contributor to Europe’s digital future, and its importance for companies like Quest as they scale their European presence.”

Tim Page, CEO at Quest Software said: “This investment strengthens our growth and supports the work we are doing to advance our products for the AI era and help us deliver AI that customers can trust. By investing in technology and talent, and partnering with local universities and research institutions, we can help develop the next generation of AI and cybersecurity professionals.”

Peter Burke, TD, Minister for Enterprise Tourism and Employment said: “Quest Software’s decision to expand in Cork is a fantastic endorsement of Ireland’s reputation as a hub for innovation and talent. This investment will create high quality jobs and strengthen our technology ecosystem. The Government is committed to fostering an environment where companies like Quest can thrive, and to supporting long-term regional growth. The announcement is a clear signal of confidence in our workforce and enterprise strategy. I wish Quest Software every success in the future with the new Centre for Advanced AI Architecture.”

Dónal Travers, Executive Director, IDA Ireland said: “The opening by Quest Software of its Centre for Advanced AI Architecture, which is being announced, signifies the company’s vote of confidence in Ireland’s AI innovation environment. This project positions Quest at the forefront of Enterprise AI transformation, delivering technically differentiated solutions that offer global impact. I wish to congratulate the Quest team and assure them of IDA Ireland’s continued support and partnership.”

Quest’s investment and the creation of new roles will contribute to an economic impact in Cork and across Ireland. According to IDA Ireland, every 10 jobs created in IDA client companies support an additional eight jobs in the wider economy.

As part of its expansion plans with the new Centre for Advanced AI Architecture, Quest plans to collaborate with Irish universities to develop courses, training programs, and skills development opportunities focused on AI and cybersecurity for people interested in technology careers.

Ireland has become a leading location for AI research and skills. The country produces nearly 1,500 AI-related Masters graduates each year and has nearly doubled its PhD output in AI fields since 2019. Ireland was also the first country to develop an industry-driven nationwide Postgraduate Master of Science in Artificial Intelligence. This depth of talent and the active research environment were important factors in selecting Cork for the new centre.

Building a Zero Trust Architecture: Key Considerations

Cybersecurity has become a major concern for businesses of all sizes. With the rise of sophisticated attacks, you’ve probably heard the term “Zero Trust” being thrown around. It’s not just a trend in the industry. It’s a shift in how we think about protecting our systems and data. The traditional approach, which assumed everything inside the network was safe, is no longer effective. In today’s world, threats can come from anywhere. So, instead of blindly trusting what’s inside, Zero Trust operates on the principle of “never trust, always verify.”

This article explores key considerations when building a Zero Trust architecture and how it can help protect your business in an ever-evolving threat landscape.

1. Understanding the Need for Zero Trust

In today’s threat environment, cyberattacks have become more complex. Organizations can no longer rely on the old method of building a strong perimeter and assuming everything inside is safe. The rise of insider threats and more advanced attack methods demand a more thorough approach.

One reason Zero Trust has gained so much attention is that attackers are increasingly targeting key identity systems. Common attacks on Active Directory (AD), for example, are on the rise. AD holds essential identity information, making it a high-value target for cybercriminals. Attackers often exploit weaknesses in privileged access management to breach systems. Once inside, they move laterally across the network, often gaining full control of the environment. This makes securing Active Directory critical when considering Zero Trust.

By implementing a Zero Trust model, businesses can better protect their identity systems, such as AD, by ensuring that every action, whether it’s a login or access to a resource, is verified continuously.

2. Identity and Access Management (IAM) at the Core

At the heart of any Zero Trust architecture is Identity and Access Management (IAM). IAM ensures that only the right people, devices, and applications can access your systems, and it does so by verifying them continuously, not just once. In the past, a user would log in and, once inside, be trusted until they logged out. Zero Trust changes that by constantly checking if the user should still be granted access.

One critical element of IAM is multi-factor authentication (MFA). MFA requires users to verify their identity through more than one method, such as a password and a mobile app confirmation. Relying on passwords alone is risky, as passwords can be stolen, guessed, or reused across multiple accounts.

Zero Trust takes identity management a step further by ensuring that users only have access to what they need, nothing more. This limits the scope of potential damage in the event of a breach.

3. Microsegmentation: Controlling Access to Network Resources

Microsegmentation is another key principle in a Zero Trust environment. In simple terms, it means breaking your network into smaller, more secure segments. This way, even if an attacker gains access to one part of your network, they can’t easily move to another part. Each segment acts like a locked room that the attacker would need additional verification to enter.

This approach helps limit lateral movement, a common tactic used by cybercriminals once they’ve breached a network. By limiting what users and devices can access, you make it much harder for attackers to navigate and compromise other parts of your environment.

Microsegmentation also works hand-in-hand with the idea of least-privilege access. Users and systems should only be granted access to the resources they absolutely need to do their job and nothing more. By applying this concept, you reduce the chances of attackers gaining access to critical resources even if they breach a less important part of the network.

4. Monitoring and Logging Everything

In a Zero Trust architecture, monitoring and logging play a critical role. Continuous monitoring allows organizations to track every request, transaction, and action happening on the network. This ensures that nothing goes unnoticed, and any suspicious behavior can be caught and responded to quickly.

Logging is equally important. By keeping detailed logs of all network activity, security teams can trace the steps of an attacker and better understand how they gained access and what they did once inside. This information is invaluable for both preventing future attacks and improving your current security measures.

Advanced monitoring tools can also help by sending real-time alerts when something unusual happens. For example, if a user suddenly tries to access a part of the network they’ve never accessed before, a security team can be notified immediately and take action to verify whether it’s legitimate.

5. Enforcing Least Privilege Access

“Least privilege” is a core principle of Zero Trust. This means that users and systems should only have the access they need to perform their tasks and nothing more. If a user needs temporary access to a resource, they should be given it for the time required and then have that access revoked.

By limiting the scope of access, even if an attacker gains control of an account, they can’t use it to access critical systems or sensitive data. Regularly reviewing access permissions is important to ensure that users aren’t sitting on permissions they no longer need.

Admins are especially important to monitor. Admin accounts often have access to sensitive data and system controls, making them prime targets for attackers. Ensuring that admin privileges are tightly controlled helps minimize the risks of a breach.

6. Protecting the Network Edge

In today’s remote work world, the network edge has expanded beyond the physical office. Employees are accessing company resources from home, cafes, and various other locations. With this in mind, Zero Trust needs to protect not just the internal network but also the devices and users accessing the network from the outside.

This means verifying users and devices every time they connect, no matter where they are. Whether it’s a cloud service, a remote worker, or an external partner, Zero Trust ensures that access is always verified, regardless of the location or device being used.

7. The Role of Automation in Zero Trust

Automation can play a significant role in enforcing a Zero Trust architecture by handling the heavy lifting of continuous verification. In a Zero Trust environment, every action, login attempt, and data access request requires validation. With hundreds or even thousands of users making requests every minute, managing these processes manually is not just inefficient—it’s practically impossible. This is where automation steps in to streamline the workload.

Automation tools can be programmed to enforce security policies consistently, ensuring that no exceptions or mistakes slip through the cracks. For instance, they can instantly revoke access for users exhibiting unusual behavior, preventing potential threats from escalating. Additionally, automated systems can monitor for known attack patterns, like credential stuffing or lateral movement, and block such actions before they cause damage.

Building a Zero Trust architecture may seem like a big task, but it’s one of the best ways to protect your organization in today’s threat landscape. By focusing on identity verification, limiting access, and constantly monitoring activity, you can secure your network without relying on outdated assumptions of trust.

As cyberattacks continue to evolve, so should your approach to security. Zero Trust offers a modern, proactive way to defend against attackers, making it an essential strategy for businesses looking to protect their data and systems effectively.

What is Cloud Architecture?

Cloud architecture describes combining technology components to build a cloud in which resources are bundled using virtualization technology and shared in a network. The components of a cloud architecture include the following:

  • A front-end platform (client or device used for cloud access)
  • A back-end platform (server and storage)
  • A cloud-based delivery model
  • A network

Together, these technologies form a cloud computing architecture for running applications. This allows users to take advantage of cloud resources.

Cloud architecture defines how individual technologies are integrated when creating clouds. Clouds are IT environments where scalable resources are abstracted, pooled, and distributed in a network. The cloud architecture also defines how all components and functions required to create a cloud are connected to form an online platform on which applications can run.

What advantages does cloud architecture offer?

With a cloud computing architecture, companies can reduce or eliminate their dependency on the on-premises-based server, storage, and networking infrastructures.

Organizations with a cloud architecture often move IT resources to the public cloud, eliminating the need for on-premises servers and storage. They’re also reducing their need for space, cooling, and power in IT data centers, instead bundling everything into monthly IT spending. This shift from capital to operational costs is one of the main reasons for the popularity of cloud computing.

The main secret is to find a reliable vendor of cloud architecture services.

There are three main cloud architecture models that organizations are using to migrate to the cloud. Each of these offers its own advantages and important functions.

  • Software as a Service (SaaS): SaaS architecture providers make applications and software available to companies over the Internet and are also responsible for maintenance. This means that users no longer have to provide their software locally. SaaS applications are typically consumed through a web interface available for various devices and operating systems.
  • Platform as a Service (PaaS): In this cloud model, service providers provide a computing platform and complete solution (often with middleware) as a service. Businesses can build on this platform to build applications or services. Cloud service providers provide networks, servers, and storage to host applications, while users deal with software deployment and configuration settings.
  • Infrastructure as a Service (IaaS): This model embodies the cloud in its simplest form. Third-party providers provide the necessary infrastructure, eliminating the need for companies to purchase servers, networks, or storage devices. They manage their software and applications and only pay for their needed capacity.

What are the best practices regarding cloud architectures?

Cloud architectures can vary greatly depending on the requirements and services being run. Basically, they consist of hardware resources, virtualization layers, software functions, applications, and network services. Organizationally, the cloud architecture can be divided into the delivery models public cloud, private cloud, hybrid cloud, and multi-cloud. In a cloud architecture, scalable resources and services are abstracted from the hardware layer, pooled and accessible over a public or private network.

The cloud architecture frees you from conventional dedicated and on-premises storage and server resources. It ensures high flexibility and shifts the focus from one-time investment costs to monthly operating expenses billed based on use. Large cloud architectures often include thousands of individual physical components and systems operated in many different cloud data centers. Cloud edge computing architectures shift the delivery of services and resources to the edge of a cloud.

A well-designed framework for the cloud is more than just a technical necessity—it’s the key to lower operational costs, powerful applications, and happy users. By following cloud architecture principles and best practices, organizations can derive real business value from their cloud investments and future-proof their IT environment.