Search Results:
Q Educational Video

On-Demand Webinar: All Doors Closed in JDE World – Why and How?

We strongly recommend All Doors Closed (ADC) as the best way to secure your JD Edwards system. But many JD Edwards World users either don’t see the need for it, or have struggled to achieve it. Join Leith Marar, an expert in JD Edwards World security, to find out why it’s important and discover the options you have for implementing it. He will outline the difficulties you may face in different versions of World, and show you how to overcome them. He will cover: • What do we mean by All Doors Open and All Doors Closed? • Why is ADC the best way to secure your system? • Implementing ADC in World: the main challenges • How to overcome the challenges.
Resource Category


Product

Subject area / topic
Q Educational Video

On-Demand Webinar: User Management in JD Edwards E1 – How to Achieve Compliance and Avoid Audit Findings

Security and audit expert Carrie Curry and Senior JDE Security, Risk & Compliance Specialist Eric Henderson, formerly an auditor with a Big 4 firm, highlight key compliance considerations, share Best Practices and explore how to increase the efficiency, visibility and integrity of user provisioning within your organization. They will also demonstrate User Admin Manager and explain how it can save you time and enhance compliance.
Resource Category


Product

Subject area / topic
Q Solutions Video

On-Demand Webinar: How FCL achieved efficient, auditable User Provisioning

When Federated Co-operatives Limited were looking for ways to streamline key processes, they decided to implement User Admin Manager (UAM) to automate User Provisioning in JD Edwards EnterpriseOne. Hear FCL’s Senior Applications Manager, Mark Laxdal, talk about how UAM helped the organization to cut the turnaround time for provisioning requests, eliminate paperwork and satisfy their auditors.
Resource Category


Product

Subject area / topic
Q Educational Video

On-Demand Webinar: Combating Common Application Risks in JD Edwards EnterpriseOne – Configuration

In this webinar, the first in a series highlighting risks in specific areas of JDE, security and audit consultants Carrie Curry and Preston Leftwich discuss common risks resulting from Configuration items not being properly and appropriately secured. This session will cover configuration information related to: • Order Activity Rules • Automated Cash Receipts • Company and Business Units • Automated Accounting Instructions • Fiscal Periods • Post Security Constants • User Defined Codes • Payee Control.


Product

Subject area / topic
Q Educational Video

Video: Best Practice Tips for Security Assessments on ERP Systems

Security assessments are essential to keeping critical corporate data secure. In this video, security and audit guru, Carrie Curry, discusses the value of Security Assessments on your ERP system. Firstly, she reviews what Security Assessments are and their benefits. Next, Carrie discusses how often they should be performed and what they should contain.
Resource Category


Product

Subject area / topic
Q Educational Video

On-Demand Webinar: JD Edwards E1 Licensing – Understanding and Auditing for On Premises and in the Cloud

Staying within the license limits of your contract is one of the regular health checks you should implement to ensure license compliance. Customers must also be aware of the licensing requirements of the operating systems, middleware, database, and other 3rd party products required to run EnterpriseOne.
Resource Category


Product

Subject area / topic
Q Educational Video

On-Demand Webinar: Introduction to Auditing Security – Part 3

Do you sometimes feel that the Security/SoD controls part of your SOX audit is a bit of a mystery, and you don’t really understand what the auditors are looking for? In the series, designed for IT staff who need to prepare for and participate in audits on their JD Edwards EnterpriseOne system, especially those responsible for access-related controls, executing those controls, or providing audit evidence, Carrie shares insights into how your items will be reviewed and tested.
Resource Category


Product

Subject area / topic
Q Educational Video

On-Demand Webinar: Introduction to Auditing Security – Part 2

Do you sometimes feel that the Security/SoD controls part of your SOX audit is a bit of a mystery, and you don’t really understand what the auditors are looking for? In the series, designed for IT staff who need to prepare for and participate in audits on their JD Edwards EnterpriseOne system, especially those responsible for access-related controls, executing those controls, or providing audit evidence, Carrie shares insights into how your items will be reviewed and tested.
Resource Category


Product

Subject area / topic
Q Educational Video

On-Demand Webinar: Introduction to Auditing Security – Part 1

Do you sometimes feel that the Security/SoD controls part of your SOX audit is a bit of a mystery, and you don’t really understand what the auditors are looking for? In the series, designed for IT staff who need to prepare for and participate in audits on their JD Edwards EnterpriseOne system, especially those responsible for access-related controls, executing those controls, or providing audit evidence, Carrie shares insights into how your items will be reviewed and tested.
Resource Category


Product

Subject area / topic
Search again:
Resources Search (General Public)