Posted On: January 26, 2017

Securing Your Data, Securing Your ERP: New White Paper

Security is a grave issue in today’s increasingly networked world. The best defense against an attack is to protect both your ERP and your data. In this brand new white paper, prepared by David Lagacé, security expert and Syntax’s Senior Network Analyst, we’ve outlined the top 16 Security Pain Points and our exclusive 360 degree protection […]

Posted On: November 16, 2016

ERP In the Cloud vs. On-Premise

Enterprise resource planning (ERP) software runs businesses large and small and consists of integrated applications tasked with storing, managing and interpreting data. ERPs can be used to provide an integrated view of your core business processes that generate data regardless of the type of activity involved with each process. Enterprise resource planning software is usually deployed using two major options—through cloud […]

Posted On: June 2, 2016

4 Proven Reasons to Implement ERP

Companies at the forefront of innovation have to continually look for new ways to reduce internal costs, improve processes and increase efficiency across the organization.

Posted On: June 2, 2016

What is JDE? An Intro Guide to JD Edwards EnterpriseOne Software

If you are in the market for enterprise resource planning software (ERP) and you are looking to get more details on exactly what the JD Edwards EnterpriseOne Software solution can provide, you have come to the right place.   A Brief History of JD Edwards JD Edwards was the very first ERP solution company and they […]

Posted On: May 25, 2016

Moving from JD Edwards World to EnterpriseOne: Essential Planning and Execution

1. Moving from World to EnterpriseOne JD Edwards EnterpriseOne was originally called JD Edwards OneWorld and was originally designed to be the successor product to JD Edwards World. However, both product lines are part of Oracle’s Applications Unlimited strategy and receive ongoing investment and have roadmaps into the future. History of JD Edwards World and […]

Posted On: May 9, 2016

Enhanced Auditing for JD Edwards EnterpriseOne

Every company is accountable for the data it stores. Any modification that is done to the data impacting the company financially or legally should be traceable to its source. The standard EnterpriseOne Audit Trail records the user, program, workstation, date, and time for only the last event that occurred.Enhanced Auditing provides for detailed table and […]

Posted On: April 27, 2016

Vulnerability Assessment

Finding Security Holes Before Hackers Do Security is no longer something that businesses can consider as an ‘option’. What was once regarded as a low-priority part of IT, Information Security, is now a high priority. When security is put aside, it can be devastating to a company – ask Ashley Madison, the IRS, Target, Sony, […]

Posted On: March 10, 2016

Realizing the Value of EnterpriseOne Pages

EnterpriseOne Pages (E1 Pages) within JD Edwards provide a framework to display and arrange content and information in such a way that end users can transform their EnterpriseOne user interface and end user experience. End users have the ability to personalize their own experience to meet their individual preferences without customizations. This innovative framework currently […]

Posted On: January 4, 2016

5 Quick-Win Tactics for Migrating your ERP to the JD Edwards Cloud

Migrating ERP solutions to the JD Edwards Cloud allows for reduced costs, increased productivity, and mitigation of risk. In today’s marketplace, the number of companies turning to cloud services is growing rapidly. If your company is currently considering a cloud hosted solution and you are reluctant to make the move, the good news is that […]

Posted On: October 26, 2015

Business Vulnerability and the Need for the Best Possible IT Security

Security holes can be deadly. Identifying and correcting security holes in IT infrastructure is critical. Even then most businesses fail to understand the importance of proactive vulnerability assessment. What’s more shocking is that some businesses avoid proper IT system checks and audits until disaster strikes, and they are forced to take desperate action. As an […]

Share via