Discover our industry leading expertise
- How much risk do you want to take on an Oracle License Audit? Oracle identifies each customer’s pricing model by looking at any exist
- March 31, 2021Get resilient security & access control, enhanced risk visibility, and automated maintenance of Segregation of Duties breaches, directly in JD Edwards.
Upcoming live events
- 14 Sep 2023, 6:30 pm
No matter where you are on your cloud journey, building an optimal security environment and meeting compliance goals are primary obligations...
- 27 Sep 2023, 8:00 am
Join us for INFOCUS 23 on September 27 - September 29, 2023! Dive deep into practical learning, get new ideas from best practices, and MORE!
Join us for INFOCUS 2023 at the Denver Sheraton Downtown Hotel – September 27 – September 29, 2023
We’ll be attending INFOCUS – The conference bringing together IT leaders and business users with JD Edwards experts, industry innovators, technology leaders, and Oracle product teams for insights, education, and information.
At INFOCUS, JD Edwards customers of all levels can dig into new releases, dive deep into practical learning, get new ideas from best practices and hone their core JD Edwards skills during three jam-packed days of education and networking. Attendees can chat with experts, connect with and learn from other users and meet solutions providers. Book your place!
Upcoming ALLOut Sessions:
How the Global Manufacturing Company H&R is Redefining their E1 Security Model.
Presented by: Dr Frosoulla Kofterou, ALLOut Security
Clear accountability is vital, especially for enterprises that are tasked with satisfying global audit and compliance initiatives in standard JD Edwards. This session will give you actionable insights into how the global manufacturing company H&R are redesigning their security model in stages to achieve this goal. Starting from designing an optimal SoD framework, utilizing security history reporting and privileged user access monitoring, the organization has now embarked on stage two of their compliance initiates in just over 6 months. This is an excellent opportunity to learn best practice steps towards revamping roles, menus, and security from a company that is in the process of meeting its compliance goals via a global rollout.
4 Key Projects for Your JDE Security Strategy
Presented by: Linda Nelson, ALLOut Security
Yes you can! That is, be successful with quick deliverables that are imperative to your JDE security landscape. While the idea of security changes always seem quite overwhelming, there are 3 key projects that are not only possible but can be seen as low hanging fruit. We will introduce the What, Why, How, ROI and Tips for these projects. Join us to get key information you need to support your team’s JDE security strategy!
Process in Alignment – Printpack’s Road to Delivering Compliant System Access
Presented by: Christel Craig, Printpack, Inc.
This session will take a deep dive into how Printpack developed a robust and sustainable process to ensure that ongoing hiring, terminations, and job changes are captured and E1 access changes appropriately executed. Discuss how we moved from an annual “all-inclusive” user access review to a bi-annual exception-based review by provisioning user access based on standard role combinations based on job codes. We will walk through how they were able to utilize employee change triggers from their HR system (Workday) and a set of defined standards to simplify process and set themselves up for success. The session will:
– Review requirements for employee hires, terminations, and job changes
– Detail the process flow for each
– Discuss options to automate workflow involved.
Understanding the Practical Applications of Security in JD Edwards
Presented by: Mohammad Nour, Hoffman Corporation
Do you want to gain advanced knowledge on applying security beyond the basics? Security ensures that an organization continues to exist despite any attempts to steal its data or compromise its physical or logical elements and, as such, should be viewed as an essential element of business management. With what is happening in today’s world, it is more imperative than ever to be aware of the most critical risks that may be threatening your organization as well as what the impact could be. This session focuses on those risks and solutions outside the traditional JDE security tables and steps you could be taking, including utilizing some of the enhancements made available by Oracle. We will share Hoffman-specific processes being used to protect their system and share examples from other organizations. You will walk away with a checklist that you should be considering as we:
- Review today’s risk climate
- Detail the most significant areas to be aware of
- Discuss options to protect your organization
See you there!!