Loading Events

Upcoming Events

Find Events

Event Views Navigation

July 2020

15
Jul
July 15

Implementing Segregation of Duties (SoD) controls can be one of the most daunting parts of managing security and audit To many, SoD reporting is simply a way of keeping Audit off their back. But you should always remember that SoD is the most effective way of stopping fraud. Either way, you need to find a way to do it reliably and efficiently. Our Director of IT Security & Audit, Carrie Curry, was responsible for security and audit controls at a large…

Find out more »
15
Jul
July 15

Implementing Segregation of Duties (SoD) controls can be one of the most daunting parts of managing security and audit To many, SoD reporting is simply a way of keeping Audit off their back. But you should always remember that SoD is the most effective way of stopping fraud. Either way, you need to find a way to do it reliably and efficiently. Our Director of IT Security & Audit, Carrie Curry, was responsible for security and audit controls at a large…

Find out more »
22
Jul
July 22

Change your JDE Security Game for the better Join us at this webinar, hosted by our partner Fusion5, to learn how to gain unique insights into your existing security model. Discover how to provide your business owners an understanding of who has access to critical master and transactional data, produce tangible reporting/dashboards to enable the business to take ownership of security, gain insights into what security your users actually need, and at the same time look at what technical debt…

Find out more »
29
Jul
July 29

Implementing or fixing your JD Edwards EnterpriseOne security can be daunting – but help is on hand! Efficient, sustainable and scalable security needs a Role-based Security Model, but designing Roles from scratch can take a lot of time and effort. It’s crucial to collaborate with the Business – after all, they need to decide which tasks their users should be able to access. To help you with that, we’re delighted to introduce AutoSecure, which gives you a pragmatic yet futureproof solution…

Find out more »
29
Jul
July 29

Implementing or fixing your JD Edwards EnterpriseOne security can be daunting – but help is on hand! Efficient, sustainable and scalable security needs a Role-based Security Model, but designing Roles from scratch can take a lot of time and effort. It’s crucial to collaborate with the Business – after all, they need to decide which tasks their users should be able to access. To help you with that, we’re delighted to introduce AutoSecure, which gives you a pragmatic yet futureproof solution…

Find out more »

August 2020

12
Aug
August 12

Achieve efficient, auditable User Provisioning! When Federated Co-operatives Limited were looking for ways to streamline key processes, they decided to implement User Admin Manager (UAM) to automate User Provisioning in JD Edwards EnterpriseOne. Attend this webinar to hear FCL’s Senior Applications Manager, Mark Laxdal, talk about how UAM enabled them to: Cut the turnaround time for provisioning requests to 30-40 minutes Eliminate paperwork Reduce the workload and pressure on the IT team Empower the Business and build their trust in…

Find out more »
12
Aug
August 12

Achieve efficient, auditable User Provisioning! When Federated Co-operatives Limited were looking for ways to streamline key processes, they decided to implement User Admin Manager (UAM) to automate User Provisioning in JD Edwards EnterpriseOne. Attend this webinar to hear FCL’s Senior Applications Manager, Mark Laxdal, talk about how UAM enabled them to: Cut the turnaround time for provisioning requests to 30-40 minutes Eliminate paperwork Reduce the workload and pressure on the IT team Empower the Business and build their trust in…

Find out more »
13
Aug
August 13

How to expose the hidden risks in your ERP security Can you be sure that nobody in your organization could use your ERP system to commit fraud? How much effort does it take to answer your auditors’ questions about who can access sensitive applications or data? ERP security is very complex, so it can be extremely difficult to get definitive answers on risky access. Join us at this short webinar to see a quick, easy and reliable way to uncover…

Find out more »
13
Aug
August 13

How to expose the hidden risks in your ERP security Can you be sure that nobody in your organisation could use your ERP system to commit fraud? How much effort does it take to answer your auditors’ questions about who can access sensitive applications or data? ERP security is very complex, so it can be extremely difficult to get definitive answers on risky access. Join us at this short webinar to see a quick, easy and reliable way to uncover…

Find out more »

September 2020

3
Sep
September 3

Need to get a handle on your Oracle ERP License position? It can be challenging to keep tabs on your ERP module usage. After roll outs and upgrades, you can end up with a complex picture of usage, with no easy way to determine the actual number of active users. You need accurate usage information to support your licence negotiations with Oracle. A lack of evidence could lead to your organisation paying too much. QCloud enables you to carry out…

Find out more »