Search Results:
Q Educational Video

On-Demand Webinar: All Doors Closed in JDE World – Why and How?

We strongly recommend All Doors Closed (ADC) as the best way to secure your JD Edwards system. But many JD Edwards World users either don’t see the need for it, or have struggled to achieve it. Join Leith Marar, an expert in JD Edwards World security, to find out why it’s important and discover the options you have for implementing it. He will outline the difficulties you may face in different versions of World, and show you how to overcome them. He will cover: • What do we mean by All Doors Open and All Doors Closed? • Why is ADC the best way to secure your system? • Implementing ADC in World: the main challenges • How to overcome the challenges.
Resource Category


Product

Subject area / topic
Q Educational Video

On-Demand Webinar: User Management in JD Edwards E1 – How to Achieve Compliance and Avoid Audit Findings

Security and audit expert Carrie Curry and Senior JDE Security, Risk & Compliance Specialist Eric Henderson, formerly an auditor with a Big 4 firm, highlight key compliance considerations, share Best Practices and explore how to increase the efficiency, visibility and integrity of user provisioning within your organization. They will also demonstrate User Admin Manager and explain how it can save you time and enhance compliance.
Resource Category


Product

Subject area / topic
Q Solutions Video

On-Demand Webinar: How FCL achieved efficient, auditable User Provisioning

When Federated Co-operatives Limited were looking for ways to streamline key processes, they decided to implement User Admin Manager (UAM) to automate User Provisioning in JD Edwards EnterpriseOne. Hear FCL’s Senior Applications Manager, Mark Laxdal, talk about how UAM helped the organization to cut the turnaround time for provisioning requests, eliminate paperwork and satisfy their auditors.
Resource Category


Product

Subject area / topic
Q Educational Video

On-Demand Webinar: Combating Common Application Risks in JD Edwards EnterpriseOne – Configuration

In this webinar, the first in a series highlighting risks in specific areas of JDE, security and audit consultants Carrie Curry and Preston Leftwich discuss common risks resulting from Configuration items not being properly and appropriately secured. This session will cover configuration information related to: • Order Activity Rules • Automated Cash Receipts • Company and Business Units • Automated Accounting Instructions • Fiscal Periods • Post Security Constants • User Defined Codes • Payee Control.


Product

Subject area / topic
Search again:
Resources Search (General Public)