Tag: Security

This month ALLOut Security announced their new brand look alongside the launch of a new website and their new on-demand e-learning hub - the ALLOut Academy. With a whole host of educational content online, there's so much for JD Edwards customers and the community to benefit from. Check out what's new at ALLOut now!

  • Quest Customer Learning Team
  • Blogs
  • 10/18/21

Join us on this webinar to discover how Archive Automation works, how to set it up in your system with Purge-it! and to hear the tangible benefits it can bring to your business. We will reference a Customer Case Study during this session. Whether you’re new to JD Edwards archiving or an existing Purge-it! customer, Archive Automation is suitable for you.

Presented by Terry Clarke, Klik IT

Sep 29 @  2:00pm

Join us on this webinar to discover how Archive Automation works, how to set it up in your system with Purge-it! and to hear the tangible benefits it can bring to your business. We will reference a Customer Case Study during this session. Whether you’re new to JD Edwards archiving or an existing Purge-it! customer,…

Presented at Database & Technology Week 2021

Oracle Database accepts several different authentication methods – each with its own advantages and disadvantages. Join us to review database authentication, appropriate use cases, and how you can use authentication methods to reduce risk and improve security.

Presented at Database & Technology Week 2021

Oracle Database accepts several different authentication methods – each with its own advantages and disadvantages. Join us to review database authentication, appropriate use cases, and how you can use authentication methods to reduce risk and improve security.

Presented at Database & Technology Week 2021

While the Oracle Database has a robust set of security features and capabilities, often the easy quick-wins are overlooked. This session focuses on a handful of security adjustments that DBAs and Developers can start leveraging almost immediately and with minimal complexity/risk to help increase their overall security posture. Covering in detail (and including some live demonstrations) a handful of security-increasing adjustments that are applicable to almost any version and edition of Oracle Database.

Jul 26 @  11:00am

Part of Oracle Cloud HCM: Coaches Corner Assignment-Level Security introduced in 20D provides the ability to restrict a user's access to a person's assignment based on the user's span of control. This multi-phased delivery feature has enhanced security in the differed HCM product areas including Person, Employment, Compensation, Absence Mgmt, Talent, and Payroll. Customers have…

Cybersecurity is a major concern for most organizations, and hearing stories of companies falling victim to ransomware attacks only makes it more concerning. At INFOCUS Envision, Syntax’s Matthew Rogers, Michael Guerra, and Chris Garner presented on how to recover from and prevent ransomware attacks for JD Edwards.

At RECONNECT Envision 21, Sentinel Software's Biv Ramlukan presented how Sentinel can help you stop taking risks with user security by providing total transparency into what your users have access to in PeopleSoft.

2020’s rapid shift to remote and hybrid access would simultaneously introduce new levels of complexity, along with an expanded threat surface. With most organizations having to manage these threats on the fly, solutions like Virtual Private Networks (VPN) and Multi-Factor Authentication became table stakes. However, most organizations quickly realized that enabling application security was not the same as enabling data security. In fact, they are completely different disciplines.

The fact of the matter is traditional information security strategies focus on networks and applications, leaving very little thought to how to protect the data inside the application – especially data at the UI/transaction level. Each day, unnecessary amounts of PII and business data can, and are, being accessed in ways that put your organization at risk. How can you manage those risks? What are they?

In this session, we will walk you through the Top Five Risks to PeopleSoft data that bypass traditional network and application layer controls. We will also provide you with insights and recommendations on how you can mitigate these risks before they become a massive liability.