Tag: PeopleSoft Enterprise

Compromised credentials, data leakage, and privilege abuse have caused some of the most severe data breaches this past year. And unfortunately, many of the PeopleSoft development plans we’ve seen for 2019 will amplify these risks if left unchecked.

As organizations offer newfound flexibility to their users with enterprise mobility and application modernization, threats are increasingly becoming user-centric, originating at the application level.

To kick off 2019, Appsian would like to educate PeopleSoft users on how to better combat the top threats your organization will face this new year. In this insightful session, PeopleSoft security expert JD Bell will demonstrate how to:
Protect your publicly-facing PeopleSoft applications from cybercriminals gaining access through phished credentials or brute force attacks
Embed two-factor authentication within PeopleSoft to restrict access to sensitive systems and information
Dynamically control access to systems handling sensitive information based on the context of request (corporate/remote network, known/unknown device, etc.)
Monitor suspicious activity that occurs outside normal business hours.
Leverage data visualization to execute on-going risk management strategies
Presented by JD Bell, Appsian

  • Quest Customer Learning Team
  • Whitepapers & presentations
  • 2/01/19

Compromised credentials, data leakage, and privilege abuse have caused some of the most severe data breaches this past year. And unfortunately, many of the PeopleSoft development plans we’ve seen for 2019 will amplify these risks if left unchecked.

As organizations offer newfound flexibility to their users with enterprise mobility and application modernization, threats are increasingly becoming user-centric, originating at the application level.

To kick off 2019, Appsian would like to educate PeopleSoft users on how to better combat the top threats your organization will face this new year. In this insightful session, PeopleSoft security expert JD Bell will demonstrate how to:
Protect your publicly-facing PeopleSoft applications from cybercriminals gaining access through phished credentials or brute force attacks
Embed two-factor authentication within PeopleSoft to restrict access to sensitive systems and information
Dynamically control access to systems handling sensitive information based on the context of request (corporate/remote network, known/unknown device, etc.)
Monitor suspicious activity that occurs outside normal business hours.
Leverage data visualization to execute on-going risk management strategies
Presented by JD Bell, Appsian

  • Quest Customer Learning Team
  • Recordings & Presentations
  • 2/01/19

This will be a hands-on, technical demonstration of a fully automated DPK based server deployment. This demonstration will provide insight as to how the DPK build process can be leveraged in the enterprise to simplify server deployment, improve system scalability, and reduce administration overhead. The presentation/demonstration will start with a blank server and end with a fully deployed PeopleSoft stack.

Objectives:

-An overview of DPK installation process, what’s involved and how it works

-Introduction to DPK customization and YAML files

-Insight in to a fully automated server deployment strategy –why, what, and how.

Presented by Aaron Engelsrud, Strategic Education, Inc.

Part of COLLABORATE Preview Day 2019

  • Quest Customer Learning Team
  • Recordings & Presentations
  • 1/31/19

Running PeopleSoft today is different than it was just five years ago. It is fundamentally different than running traditional on-premise software. Characterizing PeopleSoft as on-premise software is no longer accurate. You can run PeopleSoft anywhere—in a data center or in the Cloud—and today, you’ll get the most value when you run PeopleSoft in the Oracle Cloud.

As part of Quest Experience Week Cloud Day, Mark Hoernemann, Oracle’s PeopleSoft Platform Strategy Manager, spoke about the ongoing investment in PeopleSoft deployment to Oracle Cloud. He covered the three main initiatives of PeopleSoft direction and the benefits of utilizing each of them within your PeopleSoft system.

PeopleSoft FSCM 9.2 increases productivity through PeopleTools Pivoting Technology; which is native PeopleTools functionality that transforms the PS Query results set into an Excel-like pivot table, chart, or grid. Pivot Grids provide you with a visualization tool to interpret data through pivoting and filtering—improving the application experience. You’ll get the data you want to see…

Piyanka Jain, the founder of Aryng—a management consulting firm focused on analytics, wrote an article for Forbes about her three-step solution for your biggest business challenge of 2019. This approach can help organizations deal with business growth challenges or opportunities that can be solved using data and analytics in the new year.

The PeopleSoft Update Manager dashboard contains four additional analytics to help you understand and select the updates for your target database. For multilingual customers, the “Bugs by Language” pivot grid shows the multilingual fixes available for the language installed on the target.

In this episode of PeopleSoft Talk, Willie Suh talks to Marc about the enhancements made in PeopleTools 8.57. Of the many enhancements made, most are centered around analytics, developers, and end-users.

  • Quest Customer Learning Team
  • Blogs
  • 1/18/19

Peter Bendor-Samuel, CEO of Everest Group—a management consulting and research firm, wrote a Forbes article titled “How to Avoid Frustrating, Mistaken Approach to Digital Transformation.” He covered why digital transformation takes so much time, how to get value out of your digital journey sooner rather than later, and what mistake to avoid when developing your approach for digital transformation.