Webinars

Webinar: Automate your Task Views, Security and E1 Pages UDO content in JDE - European Timezone

Thursday, December 14, 2017

Process Based Menus, Roles and Security. 

Automatic implementation using structured spreadsheets and the ALLOut family of import grids. 

And you can create the E1 Pages UDO content as a by-product! 

Join us for this session and learn how ALLOut can automate your menu, role and security set-up process in a fraction of the time than it takes using the standard processes. 

Bring your projects in on-time and under budget. 

In standard E1, it can take weeks of work to create a comprehensive menus structure and then build the role and security configurations that support your business processes. 

With ALLOut you focus on your business processes and create all of this core information in one (or more) structured spreadsheets - once complete, the set-up process is automatic. 

The finished product is a complete implementation with best practice small process based roles, a "Deny ALL" security set-up, no Segregation of Duties conflicts and compliance reporting. 

Webinar is free of charge. 

Webinar: Automate your Task Views, Security and E1 Pages UDO content in JDE - US Timezone

Thursday, December 14, 2017

Process Based Menus, Roles and Security. 

Automatic implementation using structured spreadsheets and the ALLOut family of import grids. 

And you can create the E1 Pages UDO content as a by-product! 

Join us for this session and learn how ALLOut can automate your menu, role and security set-up process in a fraction of the time than it takes using the standard processes. 

Bring your projects in on-time and under budget. 

In standard E1, it can take weeks of work to create a comprehensive menus structure and then build the role and security configurations that support your business processes. 

With ALLOut you focus on your business processes and create all of this core information in one (or more) structured spreadsheets - once complete, the set-up process is automatic. 

The finished product is a complete implementation with best practice small process based roles, a "Deny ALL" security set-up, no Segregation of Duties conflicts and compliance reporting. 

Webinar is free of charge. 

Webinar: Catch the Issues Before an Auditor - 9:00am EST/2:00pm GMT

Wednesday, January 17, 2018

Spend a few minutes with us to identify what to look for and how to look in order to be prepared for a security audit of your ERP environment. While this endeavor starts with segregation of duties, there are several steps that can be taken in addition to that to make sure you catch potential issue before your auditor. 
Objective 1: Step through the segregation of duties process. 
Objective 2: Define options available when you identify a segregation of duties conflict. 
Objective 3: Review a check list of what else to look for and how. 

Webinar is free of charge. 

Webinar: Catch the Issues Before an Auditor - 2:00pm EST

Wednesday, January 17, 2018

Spend a few minutes with us to identify what to look for and how to look in order to be prepared for a security audit of your ERP environment. While this endeavor starts with segregation of duties, there are several steps that can be taken in addition to that to make sure you catch potential issue before your auditor. 
Objective 1: Step through the segregation of duties process. 
Objective 2: Define options available when you identify a segregation of duties conflict. 
Objective 3: Review a check list of what else to look for and how. 

Webinar is free of charge. 

Webinar: AOS Hidden Security and Compliance Gems - 9:00am EST/2:00pm GMT

Thursday, February 22, 2018

Compliance and security initiatives tend to be time consuming and full of pportunity for error. In this session, we will walk through some of the lessor known and new features in the ALLOut family of tools and what they have to offer. We will highlight how utilizing these features can decrease risk and time spent on compliance and security. Walk away with new ideas, reports and methods that you can apply to your daily processes.in areas such as:. 
• Compliance Reporting & Risk Management 
• User Access Reporting 
• Menu Restructuring 
• Open to Closed 
• Formalized Tracking of Mitigating Controls 

Webinar is free of charge. 

Webinar: AOS Hidden Security and Compliance Gems - 2:00pm EST

Thursday, February 22, 2018

Compliance and security initiatives tend to be time consuming and full of pportunity for error. In this session, we will walk through some of the lessor known and new features in the ALLOut family of tools and what they have to offer. We will highlight how utilizing these features can decrease risk and time spent on compliance and security. Walk away with new ideas, reports and methods that you can apply to your daily processes.in areas such as:. 
• Compliance Reporting & Risk Management 
• User Access Reporting 
• Menu Restructuring 
• Open to Closed 
• Formalized Tracking of Mitigating Controls 

Webinar is free of charge. 

Webinar: Back to the Basics - Security and Roles Best Practices in JDE - 9:00am EDT/1:00pm GMT

Tuesday, March 13, 2018

Security can be an incredibly labor intensive initiative that is often handled as users are standing over you waiting for results! During project initiatives, it normally comes together at the end of the project and there never seems to be enough time. 

Join this session to learn about ideal best practices to follow to ensure your JDE system is using a security model that reduces risk while maximizing the efficiency for those responsible for it. 

• Discuss the basics of security in JDE: Users, roles, role assignments, environments 
• How to achieve a best practice security model 
• ‘Deny All’ or ‘All Doors Closed’ security model 
• Best practice for defining security roles 
• Some monitoring you should do with or without a tool 

We will wrap up with a brief look at how the ALLOut toolset can assist with some of these processes. 

Webinar is free of charge. 

Webinar: Back to the Basics - Security and Roles Best Practices in JDE - 2:00pm EDT

Tuesday, March 13, 2018

Security can be an incredibly labor intensive initiative that is often handled as users are standing over you waiting for results! During project initiatives, it normally comes together at the end of the project and there never seems to be enough time. 

Join this session to learn about ideal best practices to follow to ensure your JDE system is using a security model that reduces risk while maximizing the efficiency for those responsible for it. 

• Discuss the basics of security in JDE: Users, roles, role assignments, environments 
• How to achieve a best practice security model 
• ‘Deny All’ or ‘All Doors Closed’ security model 
• Best practice for defining security roles 
• Some monitoring you should do with or without a tool 

We will wrap up with a brief look at how the ALLOut toolset can assist with some of these processes. 

Webinar is free of charge. 

Webinar: Monitoring for Segregation of Duties – Who, What When and How? - 9:00am EDT/2:00pm BST

Thursday, April 12, 2018

The main elements required for fraud are motivation and opportunity. Accordingly, the best opportunity a company can offer a fraudster is weak or nonexistent Segregation of Duties (SOD). 

SOD is a critical internal control element aimed at limiting opportunities for abuse by a single person, such as requiring two signatures on a check or separating the creation and approval of sensitive transactions. Making more than one individual necessary to be involved in an end to end process significantly reduces organizational risk. 

Good business practice requires you to control, document, and secure critical processes. Your auditors need to see evidence of how you address access reporting, security and SOD. In today’s automated business processes, SOD and critical process access can be enforced through standard JD Edwards security. 

We will walk through the steps involved in SOD and critical access best practices and then wrap up with a quick look at how tools can streamline this process so that your impending audit need not haunt you anymore! 

Webinar is free of charge. 

Webinar: Monitoring for Segregation of Duties – Who, What When and How? - 2:00pm EDT

Thursday, April 12, 2018

The main elements required for fraud are motivation and opportunity. Accordingly, the best opportunity a company can offer a fraudster is weak or nonexistent Segregation of Duties (SOD). 

SOD is a critical internal control element aimed at limiting opportunities for abuse by a single person, such as requiring two signatures on a check or separating the creation and approval of sensitive transactions. Making more than one individual necessary to be involved in an end to end process significantly reduces organizational risk. 

Good business practice requires you to control, document, and secure critical processes. Your auditors need to see evidence of how you address access reporting, security and SOD. In today’s automated business processes, SOD and critical process access can be enforced through standard JD Edwards security. 

We will walk through the steps involved in SOD and critical access best practices and then wrap up with a quick look at how tools can streamline this process so that your impending audit need not haunt you anymore! 

Webinar is free of charge.