Webinars

JDE Security Best Practices

Tuesday, February 12, 2019

Security can be a huge initiative that is often handled as users are standing over you waiting for results! During project initiatives, it normally comes together at the end of the project and there never seems to be enough time.

Join this session to learn about ideal best practices to follow to ensure your JDE system is using a security model that reduces risk while maximizing the efficiency for those responsible for it.

• Discuss the basics of security in JDE: Users, roles, role assignments, environments
• How to achieve a best practice security model
• ‘Deny All’ or ‘All Doors Closed’ security model
• Best practice for defining security roles
• Some monitoring you should do with or without a tool
We will wrap up with a brief look at how the ALLOut toolset can assist with some of these processes.

Compliance Efforts in JDE Seem Never Ending?

Thursday, March 7, 2019

Do the daunting tasks required to understand what is needed and then actually delivering on those requirements to ensure compliance seem to never end? Join us as we review what types of information you should be targeting and how that information can be at you fingertips whenever you need it.

JDE Security and Compliance no need to reinvent the wheel

Monday, March 25, 2019

While Security and Compliance efforts in JDEdwards can be a significant time consumer of some of your most critical resources, there are many ways that we can help.  No matter if you need pre-defined, best practice information,

Working with User Defined Web Objects (UDOs) in EnterpriseOne Doesn’t Have to be Rocket Science!

Tuesday, April 16, 2019

Using EnterpriseOne has never been easier than now with the new tools available with User Defined Web Objects (UDOs) and even UX1.  UDOs are web objects that streamline your interface with E1 information and applications.  What do you need to know in working with them?  How do you go about granting permissions quickly and easily to put these tools in the hands of the right users?  Let us walk you through options of what you will need to know to implement them successfully.

Working with User Defined Web Objects (UDOs) in EnterpriseOne Doesn’t Have to be Rocket Science!

Wednesday, April 17, 2019

Using EnterpriseOne has never been easier than now with the new tools available with User Defined Web Objects (UDOs) and even UX1.  UDOs are web objects that streamline your interface with E1 information and applications.  What do you need to know in working with them?  How do you go about granting permissions quickly and easily to put these tools in the hands of the right users?  Let us walk you through options of what you will need to know to implement them successfully.

Fearing Your Next Audit?

Thursday, May 9, 2019

Whether you are doing it yourself or preparing to be audited, there is an endless amount of preparation.  Let us show you how to decrease stress and save time in managing Segregation of Duties and other Compliance reporting as well as Managing Changes and Critical Access.

Fearing Your Next Audit?

Friday, May 10, 2019

Whether you are doing it yourself or preparing to be audited, there is an endless amount of preparation.  Let us show you how to decrease stress and save time in managing Segregation of Duties and other Compliance reporting as well as Managing Changes and Critical Access.

ALLOut Security Empowers YOU for Security and Compliance

Wednesday, June 5, 2019

While Security and Compliance can be quite technical within JDE, let us show you how we can help you with process simplification, easy to use implementation tools, change management and promotion.  Not sure where to start, get that information at your fingertips with our documented tutorials or schedule a live training with our training team to learn about best practices or how to meet your needs using the ALLOut toolset.

Security made Simple

Wednesday, July 17, 2019

Save time and reduce risk with streamlined processes for security and user defined objects.  Whether you are looking for simple delivery of process based roles, simple methods to modify, approve and manage security between environments or alternatives to address security conflicts before they become an issue to name a few, ALLOut can help.  Join us as we review some of the more problematic security time consumers, what it may mean to you business and how we can help.