How to Implement A Cloud Security Approach in JDE
In the ever-evolving landscape of enterprise technology, businesses are constantly seeking innovative solutions to enhance security, streamline..
INFOCUS 2023 Conference
It’s time for another INFOCUS conference September 27-29. ERP Suites will be on prem (get it?) with several team members, including three who will be..
How the JSON Web Token is Winning the Single Sign-On Game
The login process for accessing JD Edwards (or any system, for that matter) feels like it should be cut and dry. But it’s deceptively simple – a..
How to Perform an Ongoing Security Assessment
The days of ten-character password limits are over, multi-factor authentication is all the rage, and whatever you do, never, ever use post-Its to..
Which is the Best Third-Party JD Edwards Security Tool?
When selecting JD Edwards as your go-to ERP system, you’ll find it comes equipped with standard, built-in security measures. However, many companies..
JD Edwards Security Best Practices
JD Edwards has powerful native security capabilities available to users, but it takes expertise and experience to optimally leverage these..