Webinars

Webinar: E1 Security Projects – Breaking down your security problems into projects you can take on

Wednesday, August 9, 2017

Security projects in E1 can feel overwhelming and hard to specify for inclusion in your budgeted initiatives. We will walk through several common security needs, what the business impact of those security problems can be and a set of high level project steps that could be taken to reach completion.
Where might your low hanging fruit be? Completing the registration questionnaire may help us focus the presentation on projects that you may be interested in.

Webinar is free of charge.

Webinar: E1 Security Meets Business Process - European Timezone

Tuesday, September 12, 2017

Enterprise One security meets your business processes. Let’s walk through some ideas on how these two seemingly mutually exclusive ideas can work hand in hand.

We will walk through a very high level of security best practice to lay a ground work, discuss how to break down security roles to a process level and then move on to how to roll these security roles back together in ways that make sense in your business. The goals we will help you learn how to deliver is to take the mystery out of security requests and reducing the effort required by those that respond to these requests.

Finally, we will take a brief look at tools in the ALLOut Security family that could be used to support the process if you choose to used them.

Webinar is free of charge.

Webinar: E1 Security Meets Business Process - US Timezone

Tuesday, September 12, 2017

EnterpriseOne security meets your business processes. Let’s walk through some ideas on how these two seemingly mutually exclusive ideas can work hand in hand.

We will walk through a very high level of security best practice to lay a ground work, discuss how to break down security roles to a process level and then move on to how to roll these security roles back together in ways that make sense in your business. The goals we will help you learn how to deliver is to take the mystery out of security requests and reducing the effort required by those that respond to these requests.

Finally, we will take a brief look at tools in the ALLOut Security family that could be used to support the process if you choose to used them.

Webinar is free of charge.

Webinar: How to Prove the Regulatory Compliance of Your JDE Security - Out of the Box and Beyond - European Timezone

Tuesday, October 17, 2017

Walk through the relevant JDE security data showing how to decipher it and recognize its significance. This will focus on the data from the perspective of access reporting, access auditing, segregation of duties and any potential regulatory requirements.

Demonstrate built-in JDE processes and reporting to prove compliance to management and auditors using repeatable methodologies. Explain how this will also reduce security troubleshooting and reporting overheads and therefore save time and money. We will walk through:
1: Define what you should be looking at
2: Demonstrate how to establish review processes
3: Provide examples of reporting to regularly review

Webinar is free of charge.

Webinar: How to Prove the Regulatory Compliance of Your JDE Security - Out of the Box and Beyond - US Timezone

Tuesday, October 17, 2017

Walk through the relevant JDE security data showing how to decipher it and recognize its significance. This will focus on the data from the perspective of access reporting, access auditing, segregation of duties and any potential regulatory requirements.

Demonstrate built-in JDE processes and reporting to prove compliance to management and auditors using repeatable methodologies. Explain how this will also reduce security troubleshooting and reporting overheads and therefore save time and money. We will walk through:
1: Define what you should be looking at
2: Demonstrate how to establish review processes
3: Provide examples of reporting to regularly review

Webinar is free of charge.