How To Protect Your JD Edwards System from Cyber Attacks
-
Posted by Quest Customer Learning Team
- Last updated 11/11/21
- Share
Presented at INFOCUS Dive Deep 2021
During this session learn how to protect your JD Edwards system from cyber attacks.
Topics covered will include:
Protecting your perimeter
Locking down ports
Use of intrusion detection/prevention
End point protection tools
What to do if you determine you have been hit
If you do not have one, create an Incident response manual & template
Presented by Josh Smith,GSI
Watch the full-length video
Premium Content: access is limited to Quest Corporate and Professional members.
Membership has its perks. Get unlimited access to the latest Oracle updates, event session replays, strategic content centers and special members-only programming, plus big discounts on conference registration, with a Quest Corporate or Professional membership. Quest is where you learn.