ALLOut Blog


Mitigating controls are never as desirable as an effective segregation of duties, but in some situations, a breach of a security rule may just have to exist.

The standard security mechanism both for World and EnterpriseOne is very complex. End-users need to create security restrictions in the applications to authorize the right users for the right conte

Do you get alerts for security breaches? Will allocating roles to users in JDE create a security breach? You don’t have to wait until after a SOD breach occurs, to know a violation is going to happen.

Using E1 has never been easier than now with the new tools available with UDOs and UX1 - streamlining your interface with E1 information and applications.

Identify your internal business processes
Identify rules (or buy the ALLOut rule set)
Identify conflicts (run ALLOut’s SOD reports)
Remediate (fix) or Mitigate (excuse)

49% of organisations globally said they’ve been a victim of fraud and economic crime. But what about the other 51%? Perhaps they haven’t noticed yet! Which camp do you sit in?

For many organizations, preparing for the European Union’s (EU) General Data Protection Regulation (GDPR) has been a time-consuming endeavor. Unfortunately, the work is not over.

Unsure of your Licence Status? Being under-licensed can bring with it hefty costs as well as even heftier fines, while being over-licensed suggests precious IT budget has been wasted.

The question of moving to the cloud seems to be more when and what, than if. So, with the term being tossed around with seemingly so many different ideas, what does “cloud” mean?

What are the considerations and potential problems that can arise when using multiple roles in JDE EnterpriseOne solution? Automatically resolve them using the ‘Fix/Merge’ process and/or Super-Roles.

Row Security can be a necessity for many JDE implementations but, very detailed row security can result in excessive effort put into maintaining security records as well as system performance issues.

Really achieving compliance in system security includes managing access to confidential or critical information, ensuring only appropriate access is in place for all users, that changes are authorized.