Best Practices for Securing Your JDE System Architecture and Applications
System and application security continues to rank as one of the top concerns for IT leaders. The challenges are multifaceted – from diverse data sources and evolving threat landscapes to the complex compliance requirements and the human element of security.
Join Circular Edge and ALLOut Security for a deep dive into the best practices, tools and approaches to safeguard your JD Edwards environment. We’ll discuss how to protect your data, mitigate risks and maintain compliance with industry standards. You’ll also learn about critical aspects of application security, including secure system administration, the closed-door security model, and segregation of duties.
We’ll also cover important aspects of cybersecurity and system hardening, including practical tips to protect your system against emerging threads and vulnerabilities such as secure communication protocols, server firewalls, protecting data backups, data encryption, integrating Single Sign-On solutions, and regular patching and updates.
Don’t miss this valuable opportunity to gain practical insights and strategies to strengthen the security posture of your JD Edwards systems and applications.
Panel of Experts
Tonio Thomas, Director Cloud and Technology Services at Circular Edge
sAchin cHoudhari, Co-Founder and CEO at Circular Edge
Stefanos Loizou, Director of International Sales at ALLOut Security
Stefanos Stylianou, Partnerships and Alliances Director at ALLOut Security