Search Results:
Q Solutions Video

On-Demand Webinar: Cut Costs and Prevent SoD Violations: Automated, Compliant User Provisioning for JD Edwards EnterpriseOne

Does fulfilling access requests – or user provisioning in general – take up too much of your helpdesk or CNCs'/system administrators’ time? Do you spend time cleaning up SoD violations, only to find that new ones keep being introduced as users gain new access rights? Attend this webinar to find out how automation can help you stay compliant while cutting provisioning costs: • Self-service access requests are automatically routed to appropriate approver(s) – including requests submitted via external ticketing systems. • Approvers see the results of automated SoD checks before they approve/decline access requests. • If approved, the access is automatically assigned – with no need for any system administrator intervention. • All activity is logged to provide a complete audit trail for your auditors. Our User Admin Manager solution also provides powerful tools and utilities to help you perform many User/Role admin tasks much more efficiently, including terminations and bulk set-up/expiry.


Product

Subject area / topic
Q Educational Video

On-Demand Webinar: All Doors Closed in JDE World – Why and How?

We strongly recommend All Doors Closed (ADC) as the best way to secure your JD Edwards system. But many JD Edwards World users either don’t see the need for it, or have struggled to achieve it. Join Leith Marar, an expert in JD Edwards World security, to find out why it’s important and discover the options you have for implementing it. He will outline the difficulties you may face in different versions of World, and show you how to overcome them. He will cover: • What do we mean by All Doors Open and All Doors Closed? • Why is ADC the best way to secure your system? • Implementing ADC in World: the main challenges • How to overcome the challenges.
Resource Category


Product

Subject area / topic
Q Educational Video

On-Demand Webinar: User Management in JD Edwards E1 – How to Achieve Compliance and Avoid Audit Findings

Security and audit expert Carrie Curry and Senior JDE Security, Risk & Compliance Specialist Eric Henderson, formerly an auditor with a Big 4 firm, highlight key compliance considerations, share Best Practices and explore how to increase the efficiency, visibility and integrity of user provisioning within your organization. They will also demonstrate User Admin Manager and explain how it can save you time and enhance compliance.
Resource Category


Product

Subject area / topic
Q Solutions Video

On-Demand Webinar: How FCL achieved efficient, auditable User Provisioning

When Federated Co-operatives Limited were looking for ways to streamline key processes, they decided to implement User Admin Manager (UAM) to automate User Provisioning in JD Edwards EnterpriseOne. Hear FCL’s Senior Applications Manager, Mark Laxdal, talk about how UAM helped the organization to cut the turnaround time for provisioning requests, eliminate paperwork and satisfy their auditors.
Resource Category


Product

Subject area / topic
Q Educational Video

On-Demand Webinar: Combating Common Application Risks in JD Edwards EnterpriseOne – Configuration

In this webinar, the first in a series highlighting risks in specific areas of JDE, security and audit consultants Carrie Curry and Preston Leftwich discuss common risks resulting from Configuration items not being properly and appropriately secured. This session will cover configuration information related to: • Order Activity Rules • Automated Cash Receipts • Company and Business Units • Automated Accounting Instructions • Fiscal Periods • Post Security Constants • User Defined Codes • Payee Control.


Product

Subject area / topic
Q Educational Video

Video: Best Practice Tips for Security Assessments on ERP Systems

Security assessments are essential to keeping critical corporate data secure. In this video, security and audit guru, Carrie Curry, discusses the value of Security Assessments on your ERP system. Firstly, she reviews what Security Assessments are and their benefits. Next, Carrie discusses how often they should be performed and what they should contain.
Resource Category


Product

Subject area / topic
Q Educational Video

On-Demand Webinar: JD Edwards E1 Licensing – Understanding and Auditing for On Premises and in the Cloud

Staying within the license limits of your contract is one of the regular health checks you should implement to ensure license compliance. Customers must also be aware of the licensing requirements of the operating systems, middleware, database, and other 3rd party products required to run EnterpriseOne.
Resource Category


Product

Subject area / topic
Search again:
Resources Search (General Public)