Loading Events
Find Events

Event Views Navigation

Past Events › JD Edwards

Events List Navigation

March 2018
8
Mar
March 8

Most companies set up security in an evolutionary manner, and end up with a messy solution which is very hard to manage. The effort required to design security from scratch puts companies off, and with many important projects competing for attention, security design work often ends up at the back of the queue. But these days auditors are becoming more aggressive, and fraud is rising. You have a one in three chance of a fraud on your system this year,…

Find out more »
8
Mar
March 8
Atlanta, Georgia,

The SERUG Spring 2018 meeting will be held on March 8th at Hilton Garden Inn Atlanta Midtown. The agenda will include a new “Dual-Track”, which includes presentations on the latest JDE topics, as well as a Cloud topics. To say that the cloud is a fundamental strategy is a serious understatement. So come on out and understand what you are getting in a cloud strategy. Be sure to attend Mike Hoskin's 9:00AM presentation about how Q Software's QCloud can simplify…

Find out more »
20
Mar
March 20
LIVE WEBINAR,

This popular online education session presented by Owen Pay and will give you great insight into what you need to know about User Defined Objects (UDO) and managing security for them. Owen will cover: • User Defined Object Overview • UDO Life cycle • Security Overview • Implementing UDO security Join us on Tuesday, March 20 at 10:30am ET to enhance your UDO knowledge. Register here

Find out more »
22
Mar
March 22
LIVE WEBINAR,

This complimentary educational webinar aims to give you the knowledge to deploy Row Security to address your organization's specific needs, without fear of impacting system performance or losing control of your data. It covers everything from the basics through to detailed technical considerations. Webinar: JD Edwards EnterpriseOne Row Security Bootcamp Register Here

Find out more »
28
Mar
March 28
LIVE WEBINAR,

Do you understand the key security risks in your ERP system? Join us for an inside look at an auditor’s view. No-one understands Risk Analysis like an auditor. In his time at a ‘Big 4’ firm, our guest presenter, Eric Henderson, helped many companies to understand the key issues. At this webinar he will describe common problems that he’s found at ERP client sites and give advice as to what you need to do to mitigate the risks. Join us…

Find out more »
29
Mar
March 29
LIVE WEBINAR,

Do you understand the key security risks in your ERP system? Join us for an inside look at an auditor's view. No-one understands Risk Analysis like an auditor. In his time at a 'Big 4' firm, our guest presenter, Eric Henderson, helped many companies to understand the key issues. At this webinar he will describe common problems that he’s found at ERP client sites and give advice as to what you need to do to mitigate the risks. Join us…

Find out more »
April 2018
3
Apr
April 3
LIVE WEBINAR,

Bootcamp: JD Edwards EnterpriseOne 9.x Security What you need to know when implementing security in JD Edwards EnterpriseOne 9.x This intensive educational session encapsulates the first hand implementation experience of our experts, as Owen Pay shares his in-depth understanding of all versions of JD Edwards EnterpriseOne security to help you shortcut the learning curve. He covers: Sequence Manager The JD Edwards EnterpriseOne Security Hierarchy and the Core Security Types UDO Security Join us for this bootcamp to learn from the…

Find out more »
11
Apr
April 11
LIVE WEBINAR,

Conducting Periodic Access Reviews can be an extremely arduous and painful process. It can swallow up a lot of technical effort to produce complex (and often inaccurate) access reports, and then Business Managers have to wade through reams of unintelligible data while trying to work out what it means and whether they ought to sign off on it. Our Periodic Review model automates and simplifies the process; it works on your live security tables, so however you manage your security,…

Find out more »
12
Apr
April 12
LIVE WEBINAR,

Conducting Periodic Access Reviews can be an extremely arduous and painful process. It can swallow up a lot of technical effort to produce complex (and often inaccurate) access reports, and then Business Managers have to wade through reams of unintelligible data while trying to work out what it means and whether they ought to sign off on it. Our Periodic Review model automates and simplifies the process; it works on your live security tables, so however you manage your security,…

Find out more »