Webinars

Webinar: When Company or Business Unit Row Security Isn’t Enough

Thursday, July 12, 2018

ow security is often used to secure access to detailed records in the database. It is commonly very effective in managing risk by restricting access within your environment for individuals that should only access limited data. It is, however, the largest cause of unbalanced journal entries! Row security can result in inventory and order inaccuracies especially when Inter-Company or Inter-Branch transactions are processed. Join us as we learn more about how row security works, how to best take advantage of it and how to avoid the pitfalls as we walk through the struggles experienced by a recent international customer. Row Security, in the final analysis, is simply an additional security type that can be used to reduce business risk. Understanding the business processes and the risks requires input from the business. As this case illustrates, it takes a team effort to understand and implement security in a way that meets the needs of both. 
Objective 1: Navigate what is row security and how and when to use it to reduce risk and meet business needs. 
Objective 2: Learn the most common issues and how to avoid them when possible or manage them if not. 
Objective 3: How to tackle a Row Security Restructuring Project.

Webinar: Overcoming Issues with Multiple Roles in JDE

Tuesday, July 24, 2018

Untold hours can be spent working to resolve issues with multiple roles particularly with limitations of multiple roles (e.g. multiple roles do not work for Row security; action code generates conflicts, no multiple groups in Xe and ERP8 etc) as well as security hierarchy conflicts. Let’s talk about the issues that can arise from security conflicts, what steps to take to resolve them.  We will also introduce some of the features in the ALLOut Security family of tools that can identify conflicts before they become a problem and address these specific issues.

Webinar: What to do when just knowing you have a Segregation of Duties Issue Isn’t Enough

Thursday, August 2, 2018

Sometimes just knowing that you have an issue isn’t enough. Let’s face it, most organizations have to accept some segregation of duties conflicts in order to get the job done. Let us show you the tools available to manage the risk that this implies.

Webinar: Security Audit Best Practices for JD Edwards - 9am EDT, 2pm GMTBST

Wednesday, August 15, 2018

Do you have new audit requirements this year that you didn't have in the past? Are there Segregation of Duties problems? Who really has Production access for Critical Processes? Can you prove your security model is effective and that your change management processes are in place? 

Join us as we walk through what it might take to answer these questions, and more, regarding best practices in auditing your system security to stay ahead of the game in identifying where your vulnerabilities are.

Webinar: Security Audit Best Practices for JD Edwards - 2pm EDT, 7pm GMTBST

Wednesday, August 15, 2018

Do you have new audit requirements this year that you didn't have in the past? Are there Segregation of Duties problems? Who really has Production access for Critical Processes? Can you prove your security model is effective and that your change management processes are in place? 

Join us as we walk through what it might take to answer these questions, and more, regarding best practices in auditing your system security to stay ahead of the game in identifying where your vulnerabilities are.

Webinar: Little Known Security Features and Functions – Tips & Tricks in JDE

Thursday, September 13, 2018

This is a “Did you Know?” session where we will discuss some of the security features in standard EnterpriseOne and in the ALLOut toolset that may not be as commonly known, although utilizing them can be incredibly beneficial. We will highlight how using these features can decrease risk and time spent on compliance and security. Walk away with new ideas, reports and methods that you can apply to your daily processes in areas such as: 
•Managing Data Security 
•Compliance Reporting & Risk Management 
•User Defined Object Access 
• Menu Restructuring 
• Open to Closed 
• Managing Control Information within E1

Webinar: Working with User Defined Web Objects (UDOs) in EnterpriseOne

Tuesday, October 9, 2018

Using EnterpriseOne has never been easier than now with the new tools available with User Defined Web Objects (UDOs) and even UX1. UDOs are web objects that streamline your interface with E1 information and applications. What do you need to know in working with them? How do you go about granting permissions quickly and easily to put these tools in the hands of the right users? Let us walk you through options of what you will need to know to implement them successfully.