Webinars

Webinar: IBM i: Odd Man Out in Information Security

Thursday, June 20, 2019

Security made Simple

Wednesday, July 17, 2019

Save time and reduce risk with streamlined processes for security and user defined objects.  Whether you are looking for simple delivery of process based roles, simple methods to modify, approve and manage security between environments or alternatives to address security conflicts before they become an issue to name a few, ALLOut can help.  Join us as we review some of the more problematic security time consumers, what it may mean to you business and how we can help.

Working with User Defined Web Objects (UDOs) in EnterpriseOne

Tuesday, August 6, 2019

Using EnterpriseOne has never been easier than now with the new tools available with User Defined Web Objects (UDOs) and even UX1. UDOs are web objects that streamline your interface with E1 information and applications. What do you need to know in working with them? How do you go about granting permissions quickly and easily to put these tools in the hands of the right users? Let us walk you through options of what you will need to know to implement them successfully.

Using ALLOut to report on what access your users have (so you can review them pre-Audit)

Tuesday, September 10, 2019

Being surprised during an audit or a security review by the question “why does this user have that level of access?" is never fun.  Let us show you the type of access information you should be looking at to avoid those surprise questions in the future.

Using ALLOut to report on what access your users have (so you can review them pre-Audit)

Tuesday, September 10, 2019

Being surprised during an audit or a security review by the question “why does this user have that level of access?" is never fun.  Let us show you the type of access information you should be looking at to avoid those surprise questions in the future.

Managing User Access in JDE

Tuesday, October 1, 2019

Does managing user access take more time and effort than your team really has? From understanding what access users have to ensuring appropriate changes and then having a reportable audit trail, we can help simplify and give visibility to your process.

Managing User Access in JDE

Tuesday, October 1, 2019

Does managing user access take more time and effort than your team really has? From understanding what access users have to ensuring appropriate changes and then having a reportable audit trail, we can help simplify and give visibility to your process.

Easy visibility to security access for program, data or UDO security in JDE

Wednesday, October 23, 2019

Stop spending more time than you need to understand your security situation. Let ALLOut help with quick and easy delivered views of existing user or security role access. We can give easy visibility to security access for program, data or UDO security.

Easy visibility to security access for program, data or UDO security in JDE

Wednesday, October 23, 2019

Stop spending more time than you need to understand your security situation. Let ALLOut help with quick and easy delivered views of existing user or security role access. We can give easy visibility to security access for program, data or UDO security.

Solving your JDE Security Problems

Wednesday, November 20, 2019

Using ALLOut to Ensure Role Changes are Authorized (and Appropriate)

Wednesday, December 11, 2019