Tag: Security

Discover the latest Oracle JD Edwards security and performance improvements from INFOCUS 2025. Learn how CPUs, TLS, database tuning, and configuration best practices keep your JDE environment secure and efficient.

Learn how JD Edwards object tracking helps organizations audit usage, streamline upgrades, improve security, and reduce customizations for a cleaner, more efficient system.

Presented at BLUEPRINT 4D
Session ID: P-050015

You use it for Orchestrator, UDO, Program, and UBE updates, but do you use it for access control? Change management is key to avoiding untested or unknown configuration changes in your production environment. Join us to learn what options you have to implement change control for security and access controls. Explore solutions from basic change control to automated with workflow approvals for virtually every step including compliance validation, and everything in between.

Speaker: Brian Connor, ERP Suites

This session was presented at Oracle Fusion Cloud Days 2024.

  • Quest Customer Learning Team
  • Recordings & Presentations
  • 11/26/24

Database & Technology Week dives deep into current Database & Technology challenges, strategies for best practice, and real-life applications covering hot topics like Autonomous Database, Security, OCI Database Management, Infrastructure Technology, Unified Observability, Oracle APEX Application Development 22.2, and Machine Learning

Presented at INFOCUS Dive Deep 2021

Havi Global Solutions is a mid-market supply chain business operating worldwide, who have been on JDE for some years. 

Security of the system was not necessarily the key issue for the stakeholders, particularly since the company is privately owned.  But, over time, the encroaching threat of fraud and a need to implement effective, sustainable controls led the IT Management to initiate a JDE security project.  Other priorities kept getting in the way, but finally it had to happen.

Edgar Villarroya, Sr. Manager, Enterprise Applications shares their experience of consolidating roles to implement a leaner security model that enables his small team to support a large, global user base very efficiently.  Automated SoD analysis and reporting has enabled them to identify and remediate their SoD violations, including some surprising cross-branch conflicts that they would never have suspected!

Presented at Database & Technology Week 2021

Oracle Database accepts several different authentication methods – each with its own advantages and disadvantages. Join us to review database authentication, appropriate use cases, and how you can use authentication methods to reduce risk and improve security.

As part of Quest Experience Week 2019, Richard Evans, Database Security Product Management at Oracle, spoke about the top 10 database security features you might not be using.

During Quest Forum Digital Event: Cloud Week, two members of Oracle's Product Strategy Team for Risk Management Cloud - Dane Roberts and Aman Desouza - spoke about advanced options to protect HCM Cloud data and manage user security. The pair dove into:
-The latest analytical techniques and best practices for robust user security control
-Strategies for automating compliance tasks for data privacy, segregation of duties, SOX, GDPR, fraud prevention, and other obligations
-New HCM Cloud advanced control techniques to automate compliance and security administration

During Quest Forum Digital Event: Innovation Week, Oracle's own Dane Roberts and Barry Greenhut spoke about proven best practices for ERP Cloud security and audit. The pair discussed ways to design roles in ERP Cloud, certification of user access to sensitive personal data, and protection of data privacy. These three areas of thought fall under the category of replacing error-prone spreadsheet analyses with modern segregation of duties security analysis tools. Roberts and Greenhut also explained continuous monitoring for high-risk changes to both master data and cloud application configuration setups.