Tag: Security
Access all 11 Quest Experience Week Database & Technology session recordings. Purchase now.
-
- Recordings & Presentations
- 11/22/19
Poorly designed Roles can make it very difficult to manage security, so technical staff spend too much time resolving access issues and support calls, and researching information in response to auditor queries. Good Role Design is the cornerstone of an efficient, sustainable and scalable security model. This webinar will provide easy to implement tips…
-
- Webinars
The University of Minnesota recently upgraded to PeopleTools 8.56. This upgrade included Fluid Navigation with dozens of custom navigation collections. All the navigation collections are represented by tiles on carefully designed functional homepages. Tile security was a major concern. We required tile security to reflect the navigation collection security. Our options were public access to…
-
- Webinars
Since the introduction of the EU's General Data Protection Regulation (GDPR), regulatory authorities in the United States are introducing their own data privacy mandates. Going into effect on January 1, 2020, the California Consumer Privacy Act (CCPA) is the latest in a growing list of regulations, and other states are beginning to follow. Because PII…
-
- Webinars
Oracle Database 19c has hundreds of powerful features that help secure your data, and new capabilities are added with every release. In this session join Oracle product managers to discover 10 security features you may not be aware of. These features can help you streamline user administration, reduce your attack surface, deploy more-secure applications,…
-
- Webinars
Caroline Wong, Chief Security Strategist at Cobalt.io, a cybersecurity company, wrote an article in Forbes about 10 cybersecurity blind spots that companies should keep an eye on. These are issues that security teams don’t always see or aren’t always accounting for, but they should be.
-
- Blogs
- 9/10/19
With more enterprises hosting mission-critical applications like Oracle-PeopleSoft in the cloud, application managers and DevOps teams need to be aware of the evolving threat landscape. They also need to architect the deployment to be resilient in the face of ever-evolving threats. In this talk, Laurent Gil will share the latest cybersecurity research findings based on…
-
- Webinars
105340 JD Edwards Keynote - Showcasing Customer Digital Success Presented at INFOCUS 19 The digital revolution is officially here. Digital technologies are creating connected, agile and real-time businesses. JD Edwards innovation creates exceptional customer experiences and improved operational efficiency through reimagined ERP process. EnterpriseOne 9.2 solutions are providing our customers practical options for meeting the…
-
- Whitepapers & presentations
- 8/30/19
103030 Finance UDOs - Using Oracle-delivered Enhancements and Features to Support Your Business Processes Presented at INFOCUS 19 Join us as we discuss and demonstrate practical uses of Oracle-delivered UDOs to enhance Finance programs. JD Edwards EnterpriseOne has a set of personalized objects for end users to create, share and view, depending on their security…
-
- Whitepapers & presentations
- 8/30/19
103900 Change Control for JDE Security Role Assignment Presented at INFOCUS 19 Role Assignment is one of the most significant ways of granting users access to environments and programs within JDE. Depending on your business, managing user access can be a constant challenge and includes both long term modifications and temporary assignments. Join us to…
-
- Whitepapers & presentations
- 8/29/19