ERP Software Logo

Microsoft Dynamics vendors provide comparisons and opinions to professionals in the ERP/Accounting software selection process

 
 

Posts Tagged ‘ERP Security’

Dynamics 365 for Operations Online Admin Workshop

A Microsoft Dynamics 365 for Operations Online Admin Workshop will help you learn how to best manage your environment, understand best practices for installation, configuration, managing and troubleshooting your Dynamics 365 deployment. This four-day online workshop will be held from 11:00 a.m. to 4:00 p.m., Monday, July 31 to Thursday, Aug. 3. Course Outline: Lifecycle […]

continue reading...

5 ERP Security Risks to Be Aware Of

One of the interesting things about the term ERP is that it is a name that as much describes what the software aspires to as what it actually does. What do I mean by that?  Take the example of a manufacturing business and a consulting firm.  Beyond standard financial management modules, the functionality delivered by […]

continue reading...

iOS 7 Prepares Apple for the Enterprise

Apple’s newly released iOS 7 has several features that Enterprise IT has been craving! These new features are centered-around remote device management and security and authentication down the application level.  Both are significant for Enterprise IT support because it allows the proper policies to be put in place.  According to Erik Frieberg, VMware “in iOS […]

continue reading...

How to Prevent Fraud and Embezzlement with Dynamics GP and Mekorma MICR

Another headline hit the local news last week regarding a well-known company controller allegedly embezzled a lot of money over the last 8 years.   This is shocking to me since there are so many controls that should be in place to prevent employees from stealing.  I have a work history in retail and now in […]

continue reading...

If Security is an Issue for Your ERP System, Consider Using a Role-Based Security Model in Microsoft Dynamics GP

The next time you find yourself challenged with applying the right GP security role to the appropriate user in relation to your specific business process, utilizing our GP segmented security model will assist you with meeting those challenges head on.

continue reading...