Tag: Multi-Layered Security Planning
Barb Darrow, Senior Director of Communications at Oracle, wrote about today’s “unprecedented challenge” of cybersecurity. Technological and legal complexities are continuing to grow in this age of heightened cybersecurity threats—including a rise in state-sponsored hacking. This “unprecedented challenge” was a topic of conversation between Dorian Daley, Oracle Executive Vice President and General Counsel, and Edward Screven, Oracle’s Chief Corporate Architect during Oracle’s recent Media Days.
-
- Blogs
- 7/08/19
Dorian Daley, Executive Vice President and General Counsel at Oracle, and Edward Screven, Chief Corporate Architect at Oracle, spoke about the current threat landscape and Oracle’s strategy for addressing it. The pair spoke about how Oracle is enhancing the relationships with customers by adopting a service model that allows customers to shift the security burden and risk to Oracle. They also covered how Oracle has rebuilt Cloud and the Autonomous Database, so customers are fully equipped to truly protect their data and eliminate human error from the security equation.
-
- Blogs
- 5/27/19
110320 Presented at COLLABORATE 19 Join us for this session to learn how to make your JDE security refreshed, relevant and compliant! JDE SECURITY BEST PRACTICES: Discover how to overcome challenges, use best practices, and what design decisions might cause issues if you don’t approach your security with care! Learn about traditional JDE security, UDO,…
-
- Whitepapers & presentations
- 4/29/19
109680 Presented at COLLABORATE 19 Oracle Cloud HCM Security - From Moonless Night to Moonlit Night" is geared towards an audience interested in Human Capital Management (HCM) Security. I will review our journey starting with our Implementation and then transitioning to the maintenance of security. I will also discuss the improvements in Oracle Cloud Security…
-
- Whitepapers & presentations
- 4/29/19
Presented at COLLABORATE 19 Session ID: 106030 In 9.2, Oracle made a significant change in JDE security by introducing Data Source Security. Prior to 9.2, the CNC simply created a system user to match an identical user on the database. If you wanted to have more control over direct database access you had to implement Oracle…
-
- Recordings & Presentations
- 4/29/19
Using EnterpriseOne has never been easier than now with the new tools available with User Defined Web Objects (UDOs) and even UX1. UDOs are web objects that streamline your interface with E1 information and applications. What do you need to know in working with them? How do you go about granting permissions quickly and easily to put these tools in the hands of the right users? Let us walk you through options of what you will need to know to implement them successfully.
-
- Whitepapers & presentations
- 4/29/19
109010 Presented at COLLABORATE 19 JD Edwards environments can be exposed to risk by using outdated security standards and configurations regarding SSL 3.0/TLS 1.0/TLS1.1. This leaves passwords without encryption which open the door for malicious software to steal a password. Learn how to enable highly secure protocols and disable legacy protocols for both PY and…
-
- Whitepapers & presentations
- 4/29/19
Securing who can do what in JDE is a critical component of a compliance initiative, but it is not the only security you need to be looking at. Many enterprises have multiple operating companies and business units and for various reasons, need to keep the data for one company separated from the other companies. How…
-
- Whitepapers & presentations
- 4/29/19
Presented at COLLABORATE 19 Session ID: 105400 At Adventist Health System we have implemented Single Sign-On(SSO) for PeopleSoft Interaction HUB and other SAML enabled ancillary applications using SecureAuth Idp. This presentation includes step by step deployment process, need for SSO solution, required customizations in PeopleSoft for better user experience and seamless authentication with other third-party SAML…
-
- Whitepapers & presentations
- 4/29/19
105050 Presented at COLLABORATE 19 Enterprise systems provide a single system of record with endless business capabilities, but exposing the whole monolithic system through a single interface to all users comes with substantial security risks. When designing for security, system architects should begin by identifying different user groups that will interact with the system, separating…
-
- Whitepapers & presentations
- 4/29/19