Resources for JD Edwards EnterpriseOne Users

White Paper
Auditing JD Edwards EnterpriseOne Security
6 Common Mistakes to Avoid

White Paper
Top 10 Security Practices
You should know about these before they cost you your job!

White Paper
Best Practices for Role Design
Creating an Efficient, Sustainable Security Model
On Demand Webinar
Webinar: Best Practice in Role Design for JD Edwards EnterpriseOne
Practical advice to help you create an efficient, future-proof security model

On Demand Webinar
Bootcamp: JD Edwards EnterpriseOne 9.x Security
What you need to know when implementing security in JD Edwards EnterpriseOne 9.x

On Demand Webinar
Bootcamp: Row Security in JD Edwards EnterpriseOne
An expert’s view on Row Security and how to implement it

On Demand Webinar
Bootcamp: JD Edwards EnterpriseOne 9.x Security
What you need to know when implementing security in JD Edwards EnterpriseOne 9.x

On Demand Webinar
Bootcamp: User Defined Object Security in JD Edwards EnterpriseOne
What you need to know to implement User Defined Object Security successfully

On Demand Webinar
Monitor for Common Frauds on your JD Edwards EnterpriseOne System
Are you doing enough to protect your business from fraud?

On Demand Webinar
An Auditor’s View of Risk Management in JD Edwards EnterpriseOne
Understand the key security risks in your EnterpriseOne applications

On Demand Webinar
Simplify User Provisioning in JD Edwards EnterpriseOne 9.x
Lighten the load on your technical team with streamlined User and Role provisioning

On Demand Webinar
EU-US Privacy Shield: What Does it Mean for You?
The key facts and the implications for your organization

Customer Story
CTB, Inc.
Breaks the cycle of stressful security audits with better results for much less effort

Customer Story
Ogilvy Commonhealth Worldwide
Achieves a green rating on their SOX Audit with Q Software

Customer Story
InterGen
Generating an efficient, reliable and auditable Security Model

Customer Story
WernerCo
A smooth transition to a closed security model

Customer Story
Trek Bicycle Corporation
Security goes in cycles

Customer Story
Canadian Natural
Implementation of effective security was the natural choice

Customer Story
TETRA
Simplifying Security for more effective control

Customer Story
IDEX Corporation
Becoming more productive through improved control

Customer Story
CoreCivic
Keeping security on the right track

Customer Story
Yum!
Implementing efficient security set-up and management

Customer Story
Bibby Distribution
Delivering the goods securely

Customer Story
Nampak
Tightly packaged security

Customer Story
Tabreed National Cooling Company
Keeping cool about security

Customer Story
Scot Forge
Industrial strength security