Webinars

Webinar: Back to the Basics – Security Fundamentals in JD Edwards

Tuesday, May 8, 2018

Let’s keep it simple and start with basic EnterpriseOne security concepts. What are the security decisions that will become the foundation of a good security model? This session will include security design steps as well as a look at most types of E1 security records, specifically how and when to use them.

WEBINAR: ALLOut Security – Database Auditing for your IBMi

Thursday, May 24, 2018

Trace is a Control Solution for the IBM System I that enables secure, targeted, encrypted logging of database changes for compliance, SOD Mitigation, training and audit support. Let us show you how this near real time solution can target your areas of risk with queries, reporting and alerts.

WEBINAR: The ALLOut Family of Tools for JDE World

Thursday, June 7, 2018

SOXLock, StarGroups and Profile plus delivers critical process lists and SOD reporting, enables multiple groups and role based security and facilitates user provisioning “in one click” for your World environment. Let us show you how you can not only have all of this at your finger tips but do it with very little implementation effort.

Webinar: Security Compliance: More Than Just Segregation of Duties - 2pm EDT, 7pm GMTBST

Monday, June 11, 2018

Webinar: Security Compliance: More Than Just Segregation of Duties - 9am EDT, 2pm GMTBST

Monday, June 11, 2018

Webinar: Lost in the Wilderness: Proper Security Ensures JDE Environment Success and Avoids Upgrade Traps

Tuesday, June 19, 2018

Security, in both JD Edwards and any other environment, is an exercise in juggling user requirements, risk management and mitigation, and system functionality especially with limited security staff. In this session, we'll discuss how well-designed security controls can ensure the continuing success of an ERP system, from the perspective of a business currently working towards a 9.2 upgrade. We will cover JDE security concerns from the perspective of malicious activity, curious users, and accidental actions, as well as how those concerns can be mitigated without sacrificing user functionality. 
Objective 1: Discuss why proper security is important, and how it can contribute to both a successful upgrade and a continually successful ERP system. 
Objective 2: Cover best practices for row security, role security, and access even beyond E1 security. 
Objective 3: Review what kinds of red flags can be encountered, how to address them, and how to find them to start.

Webinar: When Company or Business Unit Row Security Isn’t Enough

Thursday, July 12, 2018

ow security is often used to secure access to detailed records in the database. It is commonly very effective in managing risk by restricting access within your environment for individuals that should only access limited data. It is, however, the largest cause of unbalanced journal entries! Row security can result in inventory and order inaccuracies especially when Inter-Company or Inter-Branch transactions are processed. Join us as we learn more about how row security works, how to best take advantage of it and how to avoid the pitfalls as we walk through the struggles experienced by a recent international customer. Row Security, in the final analysis, is simply an additional security type that can be used to reduce business risk. Understanding the business processes and the risks requires input from the business. As this case illustrates, it takes a team effort to understand and implement security in a way that meets the needs of both. 
Objective 1: Navigate what is row security and how and when to use it to reduce risk and meet business needs. 
Objective 2: Learn the most common issues and how to avoid them when possible or manage them if not. 
Objective 3: How to tackle a Row Security Restructuring Project.

Webinar: Working with User Defined web Objects (UDOs) in EnterpriseOne

Tuesday, July 24, 2018

Using EnterpriseOne has never been easier than now with the new tools available with User Defined Objects (UDOs) and even UX1. UDOs are web objects that streamline your interface with E1 information and applications. What do you need to know in working with them? How do you go about granting permissions quickly and easily to put these tools in the hands of the right users? Let us walk you through options of what you will need to know to implement them successfully.

Webinar: What to do when just knowing you have a Segregation of Duties Issue Isn’t Enough

Thursday, August 2, 2018

Sometimes just knowing that you have an issue isn’t enough. Let’s face it, most organizations have to accept some segregation of duties conflicts in order to get the job done. Let us show you the tools available to manage the risk that this implies.

Webinar: Security Audit Best Practices for JD Edwards - 9am EDT, 2pm GMTBST

Wednesday, August 15, 2018

Do you have new audit requirements this year that you didn't have in the past? Are there Segregation of Duties problems? Who really has Production access for Critical Processes? Can you prove your security model is effective and that your change management processes are in place? 

Join us as we walk through what it might take to answer these questions, and more, regarding best practices in auditing your system security to stay ahead of the game in identifying where your vulnerabilities are.

Webinar: Security Audit Best Practices for JD Edwards - 2pm EDT, 7pm GMTBST

Wednesday, August 15, 2018

Do you have new audit requirements this year that you didn't have in the past? Are there Segregation of Duties problems? Who really has Production access for Critical Processes? Can you prove your security model is effective and that your change management processes are in place? 

Join us as we walk through what it might take to answer these questions, and more, regarding best practices in auditing your system security to stay ahead of the game in identifying where your vulnerabilities are.

Webinar: Little Known Security Features and Functions – Tips & Tricks in JDE

Thursday, September 13, 2018

This is a “Did you Know?” session where we will discuss some of the security features in standard EnterpriseOne and in the ALLOut toolset that may not be as commonly known, although utilizing them can be incredibly beneficial. We will highlight how using these features can decrease risk and time spent on compliance and security. Walk away with new ideas, reports and methods that you can apply to your daily processes in areas such as: 
•Managing Data Security 
•Compliance Reporting & Risk Management 
•User Defined Object Access 
• Menu Restructuring 
• Open to Closed 
• Managing Control Information within E1