Search Results:
Q Solutions Video

On-Demand Webinar: How FCL achieved efficient, auditable User Provisioning

When Federated Co-operatives Limited were looking for ways to streamline key processes, they decided to implement User Admin Manager (UAM) to automate User Provisioning in JD Edwards EnterpriseOne. Hear FCL’s Senior Applications Manager, Mark Laxdal, talk about how UAM helped the organization to cut the turnaround time for provisioning requests, eliminate paperwork and satisfy their auditors.
Resource Category


Product

Subject area / topic
Q Educational Video

On-Demand Webinar: Combating Common Application Risks in JD Edwards EnterpriseOne – Configuration

In this webinar, the first in a series highlighting risks in specific areas of JDE, security and audit consultants Carrie Curry and Preston Leftwich discuss common risks resulting from Configuration items not being properly and appropriately secured. This session will cover configuration information related to: • Order Activity Rules • Automated Cash Receipts • Company and Business Units • Automated Accounting Instructions • Fiscal Periods • Post Security Constants • User Defined Codes • Payee Control.


Product

Subject area / topic
Q Educational Video

Video: Best Practice Tips for Security Assessments on ERP Systems

Security assessments are essential to keeping critical corporate data secure. In this video, security and audit guru, Carrie Curry, discusses the value of Security Assessments on your ERP system. Firstly, she reviews what Security Assessments are and their benefits. Next, Carrie discusses how often they should be performed and what they should contain.
Resource Category


Product

Subject area / topic
Q Educational Video

On-Demand Webinar: JD Edwards E1 Licensing – Understanding and Auditing for On Premises and in the Cloud

Staying within the license limits of your contract is one of the regular health checks you should implement to ensure license compliance. Customers must also be aware of the licensing requirements of the operating systems, middleware, database, and other 3rd party products required to run EnterpriseOne.
Resource Category


Product

Subject area / topic
Q Educational Video

On-Demand Webinar: Introduction to Auditing Security – Part 3

Do you sometimes feel that the Security/SoD controls part of your SOX audit is a bit of a mystery, and you don’t really understand what the auditors are looking for? In the series, designed for IT staff who need to prepare for and participate in audits on their JD Edwards EnterpriseOne system, especially those responsible for access-related controls, executing those controls, or providing audit evidence, Carrie shares insights into how your items will be reviewed and tested.
Resource Category


Product

Subject area / topic
Q Educational Video

On-Demand Webinar: Introduction to Auditing Security – Part 2

Do you sometimes feel that the Security/SoD controls part of your SOX audit is a bit of a mystery, and you don’t really understand what the auditors are looking for? In the series, designed for IT staff who need to prepare for and participate in audits on their JD Edwards EnterpriseOne system, especially those responsible for access-related controls, executing those controls, or providing audit evidence, Carrie shares insights into how your items will be reviewed and tested.
Resource Category


Product

Subject area / topic
Q Educational Video

On-Demand Webinar: Introduction to Auditing Security – Part 1

Do you sometimes feel that the Security/SoD controls part of your SOX audit is a bit of a mystery, and you don’t really understand what the auditors are looking for? In the series, designed for IT staff who need to prepare for and participate in audits on their JD Edwards EnterpriseOne system, especially those responsible for access-related controls, executing those controls, or providing audit evidence, Carrie shares insights into how your items will be reviewed and tested.
Resource Category


Product

Subject area / topic
Q Educational Video

Video: Best Practice Tips for Role Design on ERP Systems

Poorly designed roles make security difficult to manage. Learn how to create a good role structure for an efficient, sustainable security model. In this video, security and audit guru, Carrie Curry, discusses Best Practices for Role Design on your ERP system. Firstly, she reviews why role design is an important issue when setting up security for your ERP System. Next, Carrie discusses three important points when it comes to design. Finally, she provides tips to avoid common pitfalls.
Resource Category


Product

Subject area / topic
Search again:
Resources Search (General Public)