Presented at INFOCUS Envision 21
Session ID: 101550
We all know that any chain is only as strong as the weakest link, and JDE Security is no exception! There are many “links” in the “chain” of a JDE security model; ignoring one (or more) of them could leave your system vulnerable to fraud, human error, audit issues and more. Whether you are planning a new implementation, going through an upgrade, reorganizing business processes, preparing for an audit or carrying on with business as usual, security must be considered. Join us to get a better understanding of the various pieces of JDE Security and the Best Practices for managing them.
Presented by Tanya Johnson, ALLOut Security