Managing QAD Access Security

Solid, tight data access security protects your organization’s data, reputation, and bottom line. Neglecting it can lead to hefty SOX non-compliance penalties. Managing access rights during onboarding, role changes, and offboarding; practicing Segregation of Duties (SoD); maintaining an access control matrix; performing periodic access audits; and automating reports all work to keep you compliant. In this webinar, Don Lindsey discusses:

  • SOX compliance
  • Segregation of Duties
  • Audit trails
  • Roles and responsibilities
  • QAD’s access security elements
  • 32 Soft’s QAD User Security Management System (QUS) and how it makes quick work of managing exceptional accurate access security and automatic audit reporting

Questions from the webinar

Can I use QUS for EAM as well?
Can QUS be configured to manage users in Red Hat as well as in QAD itself?