JDE Security Academy Part 1
Course 01 - Security Basics
We begin our JDE Security Academy with a tactical overview of security, looking at what security types are available, and what they can do for you. How does security work in JDE and what can you do to avoid some of the basic pitfalls?
Time remaining until our next JDE Security Academy Course
Countdown Expired!
JDE Security Academy Part 1 Course Topics and Schedule
All sessions are the second Tuesday of the month beginning at 11:00AM EST, 8:00AM PST
Date | Topic | Description |
Feb. 9 | Advanced Security Concepts | Advanced security issues |
Mar. 9 | Security Change Control I: Role Control | Role based controls for requesting and approving access, self service |
Apr. 13 | Security Change Control II: Promoting Security | How to manage security between dual security tables |
May 11 | Row Security | Deep dive on row security, what works and what doesn’t. Strategies for implementing |
Jun. 8 | Managing UDO Security | How to grant and easily manage access |
JDE Security Academy Part 2 Course Topics and Schedule
All sessions are the second Tuesday of the month beginning at 11:00AM EST, 8:00AM PST
Date | Topic | Description |
Jul. 13 | Implement security without Impacting the business | Implement Best Practices in a controlled manner |
Aug. 10 | Compliance and Security reporting | SOX controls reporting, audit reports, User access reporting |
Sep. 14 | Preventative SoD | Stop violations before they happen |
Oct. 12 | Security Strategy, Design and Planning | Creating a strategy and plan for now and the future |
Nov. 9 | Automating security maintenance | Automating Dos and Dont’s |
Dec. 14 | Putting it all together | Key points and business engagement |
Contact us today if you have more questions.
Contact Us
- Security Implementation and Management
- Segregation of Duties Management & Auditing
- Security & Compliance Reporting
- ALLOut Security Product Training – Onsite & Remote
- Security or Compliance project consulting
- Implement a Segregation of Duties compliance
- Implement mitigating controls for compliance reporting
- Create Business Process based security roles
- Implement security best practices to reduce or eliminate conflicts between roles
- Review, identify, and eliminate duplicate security settings between roles and *PUBLIC
- Review current roles and provide recommendations for improvements