Resources for JD Edwards EnterpriseOne Users

White Paper
Top 10 Security Practices
You should know about these before they cost you your job!
On Demand Webinar
Bootcamp: JD Edwards EnterpriseOne 9.x Security
What you need to know when implementing security in JD Edwards EnterpriseOne 9.x

On Demand Webinar
Bootcamp: User Defined Object Security in JD Edwards EnterpriseOne
What you need to know to implement User Defined Object Security successfully

On Demand Webinar
Monitor for Common Frauds on your JD Edwards EnterpriseOne System
Are you doing enough to protect your business from fraud?

On Demand Webinar
An Auditor’s View of Risk Management in JD Edwards EnterpriseOne
Understand the key security risks in your EnterpriseOne applications

On Demand Webinar
Simplify User Provisioning in JD Edwards EnterpriseOne 9.x
Lighten the load on your technical team with streamlined User and Role provisioning

On Demand Webinar
EU-US Privacy Shield: What Does it Mean for You?
The key facts and the implications for your organization

Customer Story
Scot Forge
Implementing industrial strength security

Customer Story
Trek Bicycle Corporation
Security goes in cycles

Customer Story
Canadian Natural
Implementation of effective security was the natural choice

Customer Story
TETRA
Simplifying Security for more effective control

Customer Story
IDEX Corporation
Becoming more productive through improved control

Customer Story
CoreCivic
Keeping security on the right track

Customer Story
Yum!
Implementing efficient security set-up and management

Customer Story
Bibby Distribution
Delivering the goods securely

Customer Story
Nampak
Tightly packaged security

Customer Story
Tabreed National Cooling Company
Keeping cool about security