Tag: Security

Presented at RECONNECT Dive Deep 2021

Session ID: 101250

Organizations have invested heavily in features like MFA and user education but are still subjected to ransomware and other threats. We will be looking at other features which can be put in place as evolving technology provides more granular protection.

Presented at RECONNECT Dive Deep 2021

Session ID: 101150

Data security requirements state that account numbers used in the initiation of transactions need to be rendered unreadable when stored.  Come to this session to learn what capabilities are available in PeopleSoft Payroll for North America and Global Payroll to meet these data security requirements with bank account numbers which are stored in various modules across different product areas in PeopleSoft.

This month ALLOut Security announced their new brand look alongside the launch of a new website and their new on-demand e-learning hub - the ALLOut Academy. With a whole host of educational content online, there's so much for JD Edwards customers and the community to benefit from. Check out what's new at ALLOut now!

  • Quest Customer Learning Team
  • Blogs
  • 10/18/21

Join us on this webinar to discover how Archive Automation works, how to set it up in your system with Purge-it! and to hear the tangible benefits it can bring to your business. We will reference a Customer Case Study during this session. Whether you’re new to JD Edwards archiving or an existing Purge-it! customer, Archive Automation is suitable for you.

Presented by Terry Clarke, Klik IT

Sep 29 @  2:00pm

Join us on this webinar to discover how Archive Automation works, how to set it up in your system with Purge-it! and to hear the tangible benefits it can bring to your business. We will reference a Customer Case Study during this session. Whether you’re new to JD Edwards archiving or an existing Purge-it! customer,…

Presented at Database & Technology Week 2021

Oracle Database accepts several different authentication methods – each with its own advantages and disadvantages. Join us to review database authentication, appropriate use cases, and how you can use authentication methods to reduce risk and improve security.

Presented at Database & Technology Week 2021

Oracle Database accepts several different authentication methods – each with its own advantages and disadvantages. Join us to review database authentication, appropriate use cases, and how you can use authentication methods to reduce risk and improve security.

Presented at Database & Technology Week 2021

While the Oracle Database has a robust set of security features and capabilities, often the easy quick-wins are overlooked. This session focuses on a handful of security adjustments that DBAs and Developers can start leveraging almost immediately and with minimal complexity/risk to help increase their overall security posture. Covering in detail (and including some live demonstrations) a handful of security-increasing adjustments that are applicable to almost any version and edition of Oracle Database.

Jul 26 @  11:00am

Part of Oracle Cloud HCM: Coaches Corner Assignment-Level Security introduced in 20D provides the ability to restrict a user's access to a person's assignment based on the user's span of control. This multi-phased delivery feature has enhanced security in the differed HCM product areas including Person, Employment, Compensation, Absence Mgmt, Talent, and Payroll. Customers have…

Cybersecurity is a major concern for most organizations, and hearing stories of companies falling victim to ransomware attacks only makes it more concerning. At INFOCUS Envision, Syntax’s Matthew Rogers, Michael Guerra, and Chris Garner presented on how to recover from and prevent ransomware attacks for JD Edwards.