Home / Educational Content / JD Edwards / JD Edwards EnterpriseOne / Can YOUR JDE Security Implementation Rely on Its Weakest Link?

Can YOUR JDE Security Implementation Rely on Its Weakest Link?

Presented at INFOCUS Envision 21 

Session ID: 101550 

We all know that any chain is only as strong as the weakest link, and JDE Security is no exception! There are many “links” in the “chain” of a JDE security model; ignoring one (or more) of them could leave your system vulnerable to fraud, human error, audit issues and more. Whether you are planning a new implementation, going through an upgrade, reorganizing business processes, preparing for an audit or carrying on with business as usual, security must be considered. Join us to get a better understanding of the various pieces of JDE Security and the Best Practices for managing them.

Presented by Tanya Johnson, ALLOut Security 

Watch the full-length video

Premium Content: access is limited to Quest Corporate and Professional members.

Membership has its perks. Get unlimited access to the latest Oracle updates, event session replays, strategic content centers and special members-only programming, plus big discounts on conference registration, with a Quest Corporate or Professional membership. Quest is where you learn.