Categories:

GreyHeller Security & Mobile Webinar Series

4/22 Protecting PeopleSoft for Self Service
Time: 11am PST / 2pm EST
Description: Your employees are demanding better access to their pay, benefits, time and labor. Oracle is delivering Fluid UI self service transactions to extend the usability on mobile devices. How do you provide access while mitigating security risks — without compromising usability? This demo-intensive session will describe techniques for providing and controlling access to PeopleSoft from untrusted locations, techniques for mitigating the impacts of phishing attacks and compromised credentials; and for analyzing system access.

Register Now


4/29 Protecting PeopleSoft for High Privilege Access

Time: 11am PST / 2pm EST

Description: According to a Kroll Advisory report, 70% of all cyber cases involving theft were perpetrated by company insiders.  How do you ensure that your high privilege users can perform the tasks needed while mitigating security risks – without compromising productivity?

This demo-intensive session will describe techniques for reducing or eliminating data leakage, controlling administrative access based on differentiated levels of trust, controlling access to information for high profile employees, and analyzing administrative use.

Register Now

5/6 GreyHeller + Modo Labs: Mobilizing and Modernizing PeopleSoft HCM and Financials

Time:11am PST / 2pm EST

Description: Learn how leading commercial entities are using PeopleMobile® to breathe new life into their current PeopleSoft application by providing a modern, easy to use experience to their employees and managers.  

In this demo-intensive session, we will show how you can deploy any PeopleSoft page in a

modern-responsive manner that will plug-and-play into native applications and portals with minimal effort. We will demonstrate key use cases in recruiting, absence management, benefits, payroll, time and labor, performance management, manager self service, and workflow.  We will also demonstrate how the Kurogo™ Server allows PeopleSoft content to be embedded into a native application to deploy rich native applications that can combine maps, geo-location attributes, push notifications, and micro-applications without writing code.

Register Now


5/13 GreyHeller + Modo Labs: Mobilization for Higher Education

Time: 11am PST / 2pm EST

Description: Learn how leading higher education institutions are using PeopleMobile® and the Kurogo™ Server to provide a modern, easy to use mobile/responsive experience to their students, faculty and employees.

In this demo-intensive session, we will show you how you can deploy any PeopleSoft page into a native application to provide rich native applications that can combine maps, geo-location attributes, push notifications, and micro-applications without writing code. We will cover a wide variety Student/Faculty and HCM use cases as well as the following:

  • Creating a new module – new student orientation
  • Leveraging data from LMS, maps, bus tracking, computer lab usage (and more) into apps
  • Student Self-Service
  • Employee Self-Service
  • Andrew and Larry will deep dive on the Kurogo™ Mobile Campus and PeopleMobile® integration and answer questions from the audience.

Register Now

 
Categories:

GreyHeller Presents a FREE Webinar Series

 Join us for a series of informative webinars hosted by Larry Grey, President, Chris Heller, Chief Technology Officer and Greg Wendt, Executive Director, Security Solutions & Services.

MOBILIZE PEOPLESOFT

Mobilizing PeopleSoft — Campus Solutions Sept. 10, 2014   11am-Noon (PDT) Learn how to mobilize your entire PeopleSoft application in 90 days or less, including customizations.
Mobilizing PeopleSoft — HCM  Sept. 17, 2014   11am-Noon (PDT) Learn how to mobilize your entire PeopleSoft application in 90 days or less, including customizations.
Mobilizing PeopleSoft — Financialsand Supply Chain Sept. 24, 2014   11am-Noon (PDT) Learn how to mobilize your entire PeopleSoft application in 90 days or less, including customizations.

SECURE PEOPLESOFT

How to Implement Two-Factor Authentication Oct. 1, 2014   11am-Noon (PDT) Learn how to use 2FA to protect your data, determine which functions are right for you and how 2FA will benefit your constituents
Logging and Analysis & Incident Response Oct. 8, 2014   11am-Noon (PDT) Learn how to implement a full circle logging practice, use logs for performance tuning, incident response and more!
We hope to see you there!We encourage you to forward this e-mail message to colleagues who may also be interested in attending.Can’t make the webinar?Register for more information and to be added to our webinar invite list.
Security, UX/Mobile/Responsive
August 18, 2014
2 mins read
Hendrix Bodden By Hendrix Bodden