Webinars

Segregation of Duties Management in JD Edwards
Tuesday, March 17, 2020

ALLOut Security provides a suite of programs that run within your E1 environment using the native JD Edwards security files to produce all the reports required for Sarbanes Oxley compliance and/or internal review of segregation of duties. These reports are ready to go and do not need an intensive project to be able to implement. We will take a look at what this offers as well as the Best Practice rule set available.

JDE Security Best Practices. 9am EST
Thursday, April 16, 2020

Security can be a huge initiative that is often handled as users are standing over you waiting for results! During project initiatives, it normally comes together at the end of the project and there never seems to be enough time.

Join this session to learn about ideal best practices to follow to ensure your JDE system is using a security model that reduces risk while maximizing the efficiency for those responsible for it.

• Discuss the basics of security in JDE: Users, roles, role assignments, environments
• How to achieve a best practice security model
• ‘Deny All’ or ‘All Doors Closed’ security model
• Best practice for defining security roles
• Some monitoring you should do with or without a tool
We will wrap up with a brief look at how the ALLOut toolset can assist with some of these processes.

JDE Security Best Practices. 10am PT
Thursday, April 16, 2020

Security can be a huge initiative that is often handled as users are standing over you waiting for results! During project initiatives, it normally comes together at the end of the project and there never seems to be enough time.

Join this session to learn about ideal best practices to follow to ensure your JDE system is using a security model that reduces risk while maximizing the efficiency for those responsible for it.

• Discuss the basics of security in JDE: Users, roles, role assignments, environments
• How to achieve a best practice security model
• ‘Deny All’ or ‘All Doors Closed’ security model
• Best practice for defining security roles
• Some monitoring you should do with or without a tool
We will wrap up with a brief look at how the ALLOut toolset can assist with some of these processes.

Webinar: Security Compliance: More Than Just Segregation of Duties
Thursday, May 14, 2020

Compliance efforts as they relate to security are often thought to end once Segregation of Duties has been achieved. In reality, that is just the beginning. Join us as we take a look at those next steps to take. Really achieving compliance in system security includes managing access to confidential or critical information, ensuring only appropriate access is in place for all users, that changes are authorized and so much more. Join us as we take a look at what some of the next steps to take are as well as options for how to get your arms around all of the supporting information needed for SOX, JSOX and GDPR Compliance. 

Webinar: Easy JDE Security Audit – Without Leaving Home
Tuesday, June 9, 2020

JDE Security is an ever-changing environment and IT security audits have always been dreaded. People come and go and being able to know if there are problems in your actual security, can be a huge benefit in reducing overall risk and avoiding questions from auditors. Let us show you simple steps you can take to know where you stand. We will include:

What to look at before your Auditor does. Segregations of Duties and so much more.

The benefits of not having to reconcile reporting information to actual security for your auditors.

What steps to take when you do identify opportunities.

Webinar: Managing JDE Security in the Cloud or Or Prem Doesn’t Need to be Painful!
Wednesday, July 15, 2020

Save time and reduce risk with streamlined processes for security and user defined objects. Whether you are looking for simple delivery of process based roles, simple methods to modify, approve and manage security between environments or alternatives to address security conflicts before they become an issue to name a few, ALLOut can help. Join us as we review some of the more problematic security time consumers, what it may mean to your business and how we can help.

Webinar: Little Known Security Features and Functions – Tips & Tricks in JDE
Tuesday, August 18, 2020

This is a “Did you Know?” session where we will discuss some of the security features in standard EnterpriseOne and in the ALLOut toolset that may not be as commonly known, although utilizing them can be incredibly beneficial. We will highlight how using these features can decrease risk and time spent on compliance and security. Walk away with new ideas, reports and methods that you can apply to your daily processes in areas such as:

•Managing Data Security

•Compliance Reporting & Risk Management

• Menu Restructuring

• Open to Closed

• Managing Control Information within E1 

Webinar: Working with User Defined Web Objects (UDOs) in EnterpriseOne
Thursday, September 10, 2020

Using EnterpriseOne has never been easier than now with the new tools available with User Defined Web Objects (UDOs) and even UX1. UDOs are web objects that streamline your interface with E1 information and applications. What do you need to know in working with them? How do you go about granting permissions quickly and easily to put these tools in the hands of the right users? Let us walk you through options of what you will need to know to implement them successfully.

Webinar: JDE User Reviews - Do they have the right access?
Thursday, October 15, 2020

No matter if you are looking at user level access to support good security processes, to prepare for an internal or external audit or to ensure compliance with various regulations such as HIPAA or GDPR, ensuring that the right individuals have access to the correct processes and information is an integral part of your JD Edwards implementation. Eliminating those users that aren’t using the system and therefore managing your licensing fees is another critical step. We will identify key areas to be included in your user access reviews and what reports are available to support that in the ALLOut toolset.

Webinar: Solving your Security Problems
Tuesday, November 17, 2020

A vast majority of time spent on security in JDEdwards is not spent on processing day to day transactions. The significant effort required to solve security problems can often be a drain on those key resources that know your security and applications the best. We will discuss some of the security features in standard EnterpriseOne and in the ALLOut toolset that can quickly and easily solve key problems in areas such as those listed below. If you have a specific question you would like us to address in the webinar, email hazel@alloutsecurity.com and we will include it as a topic. As always, feel free to ask additional questions in this interactive session to find where key features and functions can help save you time daily!

i.Conflicting Security Roles Impairing User Access

ii.Moving from Open to Closed Security

iii.Understanding “What Changed” to support an Audit or to Trouble Shoot User Access

iv.Aligning UDO Security with Your Existing Security Roles

v.Managing Data Security Access