Q Demo Video

Audit Manager for JD Edwards EnterpriseOne – Demo

How long does it take you to identify users who could violate your Segregation of Duties policies? And are you sure you're getting the right answers? In this video, we give you a short demo of Audit Manager, which provides accurate, easily repeatable Segregation of Duties reporting in JD Edwards EnterpriseOne. It makes it easy to: • Produce SoD and other audit reports, whenever you need them • Get started quickly with seeded SoD rules, or set up your own rules if you already have them • Report on users with access to Critical/Sensitive data • Eliminate false positives by applying Mitigations to known and accepted violations.

Research Report

GRC 20/20 Solution Perspective: Managing Risk & Controls in Multiple ERP Environments

Managing ERP risk effectively has always been a challenge, but as organizations face constant change, it’s ever more difficult to ensure that internal controls are doing what they are supposed to. This report discusses the problems and explains why companies need to be agile to manage and monitor controls effectively.

Q Demo Video

User Admin Manager for JD Edwards EnterpriseOne – Demo

Do your technical staff spend too much time on routine tasks such as fulfilling Role requests and User/Role administration and housekeeping? In this video, we give you a short demo of User Admin Manager for JD Edwards EnterpriseOne (UAM). This application gives you tools to streamline these tasks. It can prevent SoD violations by checking for conflicts before roles are assigned, and it also keeps a full audit trail as evidence for your auditors.

Q Demo Video

QCloud Security Audit for JD Edwards EnterpriseOne – Demo

In this video, we’re going to show you how easy it can be to audit your Segregation of Duties (SoD) and security in JD Edwards EnterpriseOne. First, we’ll look at the QCloud dashboard, where you can see a high level overview of your security status. Next, you’ll see how the seeded SoD rules are set up, and how you can customize them to suit your business. Then, we’ll give you a guided tour of the audit results, including your SoD violations, Critical Master Data access and other key security metrics. You’ll see how easy it is to drill to find out what’s causing the security problems.