Posts

JD Edwards EnterpriseOne CNC Administration via the Allari Platform

Image
    System administration , or CNC in JDE speak, is a high demand, low supply skill set. Sometimes it feels like a finite group of individuals with very few new additions. So traditionally when a business replaces or adds to their CNC Administration skill sets they really only have three choices: Hire a full-time CNC as an employee. Hire an independent contractor or consultant for a finite period. Outsource all or a subset of CNC need to a Managed Service Provider. All three are resource-based types of choices. There may be situations where any of the three are valid options. However, there will be situations where none are good options. Over the last five years, the term "as-a-service" has become more popular. Many companies are moving away from a resource-based or ownership model to a service-based model for infrastructure (IaaS), software(SaaS) and platforms (PaaS). All involve physical hardware or digital software. The next wave will be companies acquiring Lower co...

Know The Difference Between XSS vs CSRF

Image
Cross-site Scripting (XSS) and Cross-site request forgery (CSRF) are very common client-site attacks against web applications. While XSS execute scripts in the victim’s machine to gain users privileges the CSRF forge request on the victim’s behalf. It’s safe to say that XSS exploits the browser trust in a legit website while CSRF takes advantage of the website’s trust on the user’s browser. What is a cross-site request? Cross-site requests are meant to make websites dynamic such that websites can embed content from other pages. For example, online advertisements use cross-site requests to display images from Amazon, eBay, or other shopping sites. How does CSRF work? CSRF is a type of malicious exploit that forges and sends an HTTP request to a target website through the user machine. An open session on the target website is needed to perform this attack, such that the forget request is sent along with the session cookie. The HTTP request can be trigger using HTML tags or javasc...

Top Three ERP Security Problems And How To Avoid Them

Image
Protecting your ERP data whether it be from SAP, Oracle or Microsoft is not a topic that should be taken lightly. Securing your SAP ERP system is crucial for the success of your business. ERP data is valuable and can easily pose the risk of a security breach. Often, enterprises feel that cybersecurity detracts and disrupts their workflows, leading them to fail to protect their business. Let's take a look at some of the most common ERP system security issues so that if anything happens, you know how to keep your ERP and the data within it protected and well maintained. Lack of Employee Training and Upkeep Frequently the ERP system users are not well trained, which makes them the principal security risk. Having an ongoing training schedule should be of high priority. Employees should be briefed about the ERP updates regularly. Investing time and money in cybersecurity measures and technology won't be enough if your employees don't know how to use the system securely. Overl...

Five Strategies to Secure Your IoT Devices

Image
Over the past year, the Internet of Things (IoT) has expedited magnificently and is spanning for massive use of IoT devices around the world. The Internet of Things (IoT) is a term used to describe the continually growing network of internet-connected electronic devices that are in operation around the world today. Some of the few examples are Smart RFID tags, home appliances, Amazon’s Alexa, Google assistant and industrial sensors, and many more. IoT devices gather the data and send it through the internet for processing. Basically, the data is transmitted from a device to a gathering point where the data is analyzed in data centers or the cloud. Depending on instructions/ IoT applications certain actions are performed. It is believed that by the end of 2025, there is an estimation of revenue generation - $1.6 trillion by the internet of things (IoT). IoT touches the broader network and therefore, there are many security challenges. Hence, all those devices need to be configured, auth...

Six Ways to Protect Your Company from an Expensive and Embarrassing Cyberattack

Image
Cyber-attacks have moved to the front page of the news. The attack on Colonial Pipeline and JBS Foods went to the heart of the US energy and food supply systems. Hospitals and health organizations were hit in 2020 impacting over 18 million patient records and costing $ 21 Billion. No one is immune as 43% of attacks are against small businesses. So being big or small does not escape the attack. The criminals behind these attacks are building more sophisticated profit-oriented organizations, even investing in AI (Artificial Intelligence) and talent to keep a few steps ahead of the defense. We are all part of the defense and it’s challenging to keep up with the bad guys. Assuming some level of IPS, firewall and antivirus are in place within your company here are 6 steps to take that many companies either do not do at all or neglect doing consistently or correctly. Security Awareness Training Security Awareness doesn’t remove the element of human judgment, but it does help make human judgm...

JD Edwards Support – The Service Desk that Never Quits

Image
Is your company struggling to provide production support and complete strategic projects? So was a manufacturing customer of ours. Despite months of effort, tickets were piling up and they weren't making progress on their biggest, most important projects of 2021. They called Allari, and here's what happened... TECHNOLOGY:   JD Edwards EnterpriseOne 9.1 Ecosystem INDUSTRY:   Industrial and Automotive Manufacturing COMPONENTS:   Allari 24/7 Service desk, Allari’s Service Delivery Platform (SDP), JD Edwards Application Support, JDE CNC (Configurable Network Computing) Support, MS SQL Database Support, Multilingual User Support Business Problem — Our customer’s JDE support team, with users in the USA, Mexico, and Canada, was constrained in providing timely production support and executing strategic projects. Level 3 Business Analysts (BAs) were spending many hours triaging service tickets. Level 3 BAs were spending many hours providing level 1 and level 2...

Steps for Implementing JD Edwards Digital Transformation

Image
The digital transformation is making an impact on the technology world. This has begun to produce positive results among business-oriented organizations. At JD Edwards, we are invested in the success of our clients by providing them with excellent support, tools, and unmatched services customized for their business's needs.  What is Digital Transformation?  Digital transformation represents the modernization of business processes, customer experiences, and transaction systems by digitizing the core of business operations. It means not only the rapid adoption of digital technologies such as mobility and cloud computing but also altering underlying business models to adopt more agile and market-based ways of delivering products and services.  Steps for Implementing Digital Transformation  When you talk about digital transformation, you're usually talking about the same thing, but there are multiple things you can do. Maybe your company is just starting to explore the c...