Tag: Security

Discover the benefits Oracle Database customers can anticipate when moving to a Power10 based system as we uncover the design of IBM's latest generation of Power.

During this session, we will discuss advantages of the new Power10 based system which include:

Evaluating the migration of older Database versions to a current version
Managing your workload requirements when moving to the newer and faster architecture
Improving reliability
Enhancing Security

This session will leverage our practical hands on experience on how a Power10 based system can help you when moving from Database version 11gR2 to 19c to assure ongoing support from Oracle.

Presented by Wayne Martin, Technology Manager, IBM Systems

Presented at INFOCUS Dive Deep 2021

Havi Global Solutions is a mid-market supply chain business operating worldwide, who have been on JDE for some years. 

Security of the system was not necessarily the key issue for the stakeholders, particularly since the company is privately owned.  But, over time, the encroaching threat of fraud and a need to implement effective, sustainable controls led the IT Management to initiate a JDE security project.  Other priorities kept getting in the way, but finally it had to happen.

Edgar Villarroya, Sr. Manager, Enterprise Applications shares their experience of consolidating roles to implement a leaner security model that enables his small team to support a large, global user base very efficiently.  Automated SoD analysis and reporting has enabled them to identify and remediate their SoD violations, including some surprising cross-branch conflicts that they would never have suspected!

Presented at INFOCUS Dive Deep 2021

Havi Global Solutions is a mid-market supply chain business operating worldwide, who have been on JDE for some years. 

Security of the system was not necessarily the key issue for the stakeholders, particularly since the company is privately owned.  But, over time, the encroaching threat of fraud and a need to implement effective, sustainable controls led the IT Management to initiate a JDE security project.  Other priorities kept getting in the way, but finally it had to happen.

Edgar Villarroya, Sr. Manager, Enterprise Applications shares their experience of consolidating roles to implement a leaner security model that enables his small team to support a large, global user base very efficiently.  Automated SoD analysis and reporting has enabled them to identify and remediate their SoD violations, including some surprising cross-branch conflicts that they would never have suspected!

Presented at RECONNECT Dive Deep 2021

Session ID: 101780

Organizations are managing a daunting task to safeguard access to their PeopleSoft application and data from internal and remote users, which can include thousands of third-party service providers combined with a constant flow of requests for changes to existing levels of access from that massive user community. On top of that challenge, they must manage potential security breaches from hackers attempting to gain unauthorized access to systems and data. Additionally, they must maintain effective data privacy controls for various regulatory compliance obligations. Together this creates an atmosphere of constant battling to maintain effective data security and data privacy controls to mitigate the organization's risk exposure.

Presented at RECONNECT Dive Deep 2021

Session ID: 101150

Data security requirements state that account numbers used in the initiation of transactions need to be rendered unreadable when stored.  Come to this session to learn what capabilities are available in PeopleSoft Payroll for North America and Global Payroll to meet these data security requirements with bank account numbers which are stored in various modules across different product areas in PeopleSoft.

This month ALLOut Security announced their new brand look alongside the launch of a new website and their new on-demand e-learning hub - the ALLOut Academy. With a whole host of educational content online, there's so much for JD Edwards customers and the community to benefit from. Check out what's new at ALLOut now!

  • Quest Customer Learning Team
  • Blogs
  • 10/18/21
Sep 29 @  2:00pm

Join us on this webinar to discover how Archive Automation works, how to set it up in your system with Purge-it! and to hear the tangible benefits it can bring to your business. We will reference a Customer Case Study during this session. Whether you’re new to JD Edwards archiving or an existing Purge-it! customer,…

Presented at Database & Technology Week 2021

Oracle Database accepts several different authentication methods – each with its own advantages and disadvantages. Join us to review database authentication, appropriate use cases, and how you can use authentication methods to reduce risk and improve security.

Presented at Database & Technology Week 2021

Oracle Database accepts several different authentication methods – each with its own advantages and disadvantages. Join us to review database authentication, appropriate use cases, and how you can use authentication methods to reduce risk and improve security.

Presented at Database & Technology Week 2021

While the Oracle Database has a robust set of security features and capabilities, often the easy quick-wins are overlooked. This session focuses on a handful of security adjustments that DBAs and Developers can start leveraging almost immediately and with minimal complexity/risk to help increase their overall security posture. Covering in detail (and including some live demonstrations) a handful of security-increasing adjustments that are applicable to almost any version and edition of Oracle Database.