Search
JD Edwards Security Audit: 7 Questions To Ask Before Choosing An Audit Solution
Auditing an ERP system like JD Edwards (JDE) for security risks is a complex, time-consuming, and tedious process. Security teams have to go through volumes of data on roles, authorizations, data access privileges, and usage logs to determine Segregation of Duties (SoD) conflicts, master data changes, and security gaps. It’s impractical and inefficient to do…
3 Key Steps To Prevent Fraud In Your JD Edwards EnterpriseOne
When you have a few hundred or maybe thousands of users logging into your JD Edwards EnterpriseOne applications – many of them handling critical financial data and transactions – fraud prevention measures are necessary. Here are three key steps you can implement to identify and prevent fraud in your JD Edwards EnterpriseOne applications. Step 1:…
[Appsian Insights] Using Internal Controls to Ensure Data Security and Audit Readiness
Appsian’s Vice President of Product Strategy & Customer Experience, David Vincent, appears in the latest episode of the Business Class News podcast. The wide-ranging conversation between David and host Karl Woolfenden covered the threats of cyber-attacks on businesses, which is clearly a priority. They also discuss the ever-increasing pressures to protect data brought about by…
How To Simplify Your JD Edwards Access Reviews
What Is A Periodic Access Review? Access review or recertification is an IT General Control procedure that involves auditing all user access roles, privileges, and combinations of roles to determine if they are correct and adhere to the organization’s internal policies and compliance regulations. Most organizations only perform this audit of user access once a…
3 Major Benefits Of Implementing Automated User Provisioning For JD Edwards
Increased compliance regulations and the rising number of internal threats have forced organizations to tighten application access and adopt the principle of least privilege. However, when ERP applications like JD Edwards have thousands of users accessing them to perform their daily tasks, managing user access requests while adhering to compliance requirements can be challenging. The…
Eight Key Investments For An Effective Data Privacy Risk Program
As a Certified Data Privacy Solution Engineer, I have led hundreds of data privacy risk assessment and remediation services across many industries. Maintaining effective data privacy can be challenging for organizations. According to the 2021 Thomson Reuters Regulatory Intelligence Cost of Compliance annual report, two of the top compliance challenges that organizations face each year…
Achieving Digital Trust Across Your Business Applications
When consumers decide to use a company’s product or service, they are consciously or subconsciously confirming their digital trust in that organization to keep their data private and secure. Data security and data privacy are terms that the cybersecurity and infosec industries are familiar with, but perhaps you might not have heard much about digital…
6 Ways Automated User Provisioning Ensures Compliance In PeopleSoft
Staying current with regulatory changes in a complex business landscape can be challenging for PeopleSoft teams but not impossible. While organizations are trying to keep pace, they often view compliance as a burden. This often leads to cracks in user provisioning that is foundational to complying with new regulations and internal policies. The key concern…
MFA Is A “Critical Security Baseline” For Your Zero Trust Strategy
Following up on last year’s Executive Order to help improve the nation’s cybersecurity posture, the White House released a 30-page zero-trust strategy document outlining several measures federal agencies must enact to secure systems and limit the risk of security incidents. The White House noted that the growing threat of sophisticated cyberattacks (for example, SolarWinds, ransomware,…