You may download a range of case studies of how ALLOut has benefitted an organisation. These success stories are in PDF format and can be accessed by completing the form below. The following downloads are available:
Catering Company – UK – Overcoming complex roles, versions, security and task views
200 units with 25 program versions, 1000 tasks and 5000 task relationships – how ALL Out put together an effective menu structure saving huge amounts of time and money.
Service Provider – US – World 9.1
Overcame their ‘security nightmare’ using *StarGroups for JD Edwards World
Pet Food Manufacturer – Canada – Xe
Cured their security headaches and SoD violations using Risk Reporting, CombiRoles and SuperGrids
Manufacturer of Mining Equipment – South Africa – E1 8.12
Had a significant clean up of their security during an upgrade. Defined their roles and menu filtering using SuperGrids.
Leading Agrochemical Company – Australia – E1 8.11
They had no controls, were unable to report and maintenance was unmanageable. All cured using the ALL Out toolset.
Major Pharmaceutical Manufacturer – US – E1
ALLOut closed their security using Project+ to enable them to comply with regulatory requirements. They also resolved all their multiple roles conflicts using CombiRoles.
Wines and Spirits Manufacturer – France – E1 9.0
Used ALLOut’s extensive reporting capability to set up SOD rules and reports and Project+ to close security in country offices where systems remained ‘Open’.
State Government - US - Upgrade E1 to the 9's
“Without implementing ALLOut as part of the upgrade, our security would still be chaos. Specifically our menu management was a mess – the process based roles we instigated through ALL Out really did save our lives!”
Air Transport Services – US – E1 9.0 on IBM iSeries
Implemented ALLOut’s Trace for IBMi tool to highlight inappropriate system activity by users on their iSeries.
Dairy Farmers Co-op – Argentina – Upgrade to E1 9.1
Upgrading to JDE 9.1, with an major restriction on time. Implemented ALL Out for the main benefit of the timing: security setup and implementation reduced considerably when using the tools.