Tag: COVID-19

101660 Case Study - Managing Non-Employees within PeopleSoft - Midwest Healthcare System Presented at RECONNECT 19 In this session we share how a large Midwest Healthcare system is utilizing PeopleSoft’s HCM to manage and track non-employees.  Non-employees such as volunteers, contract doctors, nursing students or contingent workers, have been managed through multiple systems and their…

  • Quest Customer Learning Team
  • Whitepapers & presentations
  • 7/26/19

Business process are constantly evolving and it can be a challenge for legacy ERP systems to keep up. From a security and compliance standpoint, an organizations’ risk has increased exponentially as years of accumulating ERP data has created a significant liability with the introduction of data privacy mandates like GDPR (with more to come.) In…

Barb Darrow, Senior Director of Communications at Oracle, wrote about today’s “unprecedented challenge” of cybersecurity. Technological and legal complexities are continuing to grow in this age of heightened cybersecurity threats—including a rise in state-sponsored hacking. This “unprecedented challenge” was a topic of conversation between Dorian Daley, Oracle Executive Vice President and General Counsel, and Edward Screven, Oracle’s Chief Corporate Architect during Oracle’s recent Media Days.

John Soat, a freelance writer for Oracle, wrote an article in Forbes about four emerging technologies that could drastically transform supply chain operations. Internet of Things (IoT), machine learning and predictive analytics, augmented reality, and blockchain have the power to change the way supply chains operate moving forward.

As organizations look to enable their employees to be more productive and take advantage of Oracle mobile solutions like Fluid UI; expanding users' access to PeopleSoft Employee Self-Service to the open internet has rapidly become a critical business objective. The issue remains - how do you maintain strict data security policies when access to ESS is available outside your firewall? Balancing the desire for additional productivity, along with the increased threat exposure can be daunting, as organizations look to fully leverage their investment in PeopleSoft.

In this insightful session, PeopleSoft security expert, Greg Wendt will demonstrate how to:

Protect your publicly-facing PeopleSoft applications from cybercriminals gaining access through phished credentials or brute force attacks
Natively integrate SAML technology for central identification control via your current IdP (Active Directory, ADFS, Azure, Shibboleth, OKTA, etc.)
Embed multi-factor authentication challenges inside PeopleSoft transactions (pages, fields, etc.) to further control access to sensitive information
Dynamically control privilege and access to systems based on context (corporate/remote network, known/unknown device, etc.)
Maintain strict governance, risk, and compliance policies with expanded access
Presented by Greg Wendt, Executive Director, Security Solutions, Appsian

Call centers that rely on human service operators talking to customers over the phone are becoming a thing of the past. Their demise brings up the question, how will customer service change in the future?

102490 E1 Mobile Security Presented by Darrell Kieswetter, ERP-One Consulting, Inc. at INFOCUS 2018 When getting ready for a remote workforce, there are many things to think consider. What JDE servers do I need? What about application security? How should I configure my network? Do I need to develop custom remote applications? Portal or Mobile…

Shelby Klingerman, Content Curator | Hacking is becoming an increasingly more prevalent problem. Email servers, IoT, phones, tablets and more are all susceptible to security breaches. It’s best to be proactive against these kinds of attacks and know how to protect your organization. Learn some tips and tricks on how you can best protect PeopleSoft.

Intermountain Healthcare recently shared its Fluid implementation success story at RECONNECT 18. The company implemented PeopleSoft 9.2 with Fluid UI in June 2017 with PUM 19. In March 2018, they moved to PeopleTools 8.56 and PeopleSoft PUM 25 with Selective Adoption.

Sony CEO: “They came in the house, stole everything, then burned down the house. They destroyed servers, computers, wiped them clean of all the data and took all the data. We were so taken by surprise by the events…that we didn’t have a playbook or a plan at that moment to go forward.” Remember the Sony…