EnterpriseOne relies upon networks, host systems, and database products. In order to completely secure a JD Edwards E1 system, security must be addressed both internal and external to the EnterpriseOne product. An EnterpriseOne implementation will only be as secure as the weakest component. EnterpriseOne provides a flexible framework and many options to within the security model. Understanding the various components is key to maintaining a high level of security while still remaining efficient.
Together, Syntax and Q Software offer unrivaled experience of these issues. We have jointly implemented secure JD Edwards E1 environments for many years and can lead you through this wilderness to a controlled and efficient solution.
This on-demand webinar is aimed at managers responsible for JD Edwards E1 security and will cover the fundamental building blocks of ERP security and progress through to best practices, strategy and simplification as we cover the following topics:
- ERP Security Challenges and Considerations
- EnterpriseOne Security Components – Network, Operating System, Web, Database, Application
- Overview of EnterpriseOne Application Role Based Security Model
- EnterpriseOne Authentication Options – Native E1, LDAP, SSO, MFA, 2FA
- EnterpriseOne Application Security – Object Based Security Model and User Defined Object (UDO) Security Model
- Security Strategy – Implementation and Administration
- Security Best Practices
- Third Party Security Management Tools
- Security Managed Services – overcome skills gaps