Webinars

Using ALLOut to Ensure Role Changes are Authorized (and Appropriate)

Wednesday, December 11, 2019

Easy visibility to security access for program, data or UDO security in JDE

Tuesday, January 14, 2020

Working with Security Roles in JD Edwards

Tuesday, February 4, 2020

The ability to use security roles as a building block of your security efforts is an incredibly useful tool. So how do you make the most of it in your implementation or daily processes? This begins from the original design of steps, through user provisioning and flows forward into ongoing review and long-term cleanup. We will walk through best practices in these steps and wrap up with how the ALLOut toolset can help save you time and effort.

Segregation of Duties Management in JD Edwards

Tuesday, March 17, 2020

ALLOut Security provides a suite of programs that run within your E1 environment using the native JD Edwards security files to produce all the reports required for Sarbanes Oxley compliance and/or internal review of segregation of duties. These reports are ready to go and do not need an intensive project to be able to implement. We will take a look at what this offers as well as the Best Practice rule set available.

JDE Security Best Practices. 9am EST

Thursday, April 16, 2020

Security can be a huge initiative that is often handled as users are standing over you waiting for results! During project initiatives, it normally comes together at the end of the project and there never seems to be enough time.

Join this session to learn about ideal best practices to follow to ensure your JDE system is using a security model that reduces risk while maximizing the efficiency for those responsible for it.

• Discuss the basics of security in JDE: Users, roles, role assignments, environments
• How to achieve a best practice security model
• ‘Deny All’ or ‘All Doors Closed’ security model
• Best practice for defining security roles
• Some monitoring you should do with or without a tool
We will wrap up with a brief look at how the ALLOut toolset can assist with some of these processes.

JDE Security Best Practices. 10am PT

Thursday, April 16, 2020

Security can be a huge initiative that is often handled as users are standing over you waiting for results! During project initiatives, it normally comes together at the end of the project and there never seems to be enough time.

Join this session to learn about ideal best practices to follow to ensure your JDE system is using a security model that reduces risk while maximizing the efficiency for those responsible for it.

• Discuss the basics of security in JDE: Users, roles, role assignments, environments
• How to achieve a best practice security model
• ‘Deny All’ or ‘All Doors Closed’ security model
• Best practice for defining security roles
• Some monitoring you should do with or without a tool
We will wrap up with a brief look at how the ALLOut toolset can assist with some of these processes.