Presentation is loading. Please wait.

Presentation is loading. Please wait.

Building a Better Way: The Weitz Company Security Model

Similar presentations


Presentation on theme: "Building a Better Way: The Weitz Company Security Model"— Presentation transcript:

1 Building a Better Way: The Weitz Company Security Model
Session ID#: 2017JDE Q Software – Case Study Success Through Security Prepared by: Dustin Tenney Business Analyst The Weitz Company Tess Scott Security Practice Manager ERP Suites & #JDEINFOCUS @TheWeitzCompany @QSoftwareGlobal

2 Agenda Introduction Background JDE Landscape Before QSoftware
Challenges Success and Future Goals Q&A

3 Personal Introduction
Dustin Tenney Iowa State University Graduate Accounting Property Management Accountant (6 years) Weitz Senior Accountant (1 Year) IT Specialist (2 Years) Business Analyst (1 Year) ERP Systems and Workflow Systems

4 Personal Introduction
Tess Scott JD Edwards Enterprise One and World Techno-Functional Professional of 28 years Security Management & Administration SOX Compliance Officer Application Development & Administration Industries Oil & Gas Technology Manufacturing Energy and Natural Resources Construction Telecom PMI, Project Management Professional, PMP

5 The Weitz Company Profile
Founded in 1855 ENR Top 400 construction company General contractor and Construction manager. Weitz offers expertise in four core market segments: Commercial, Industrial, Heavy Industrial, and Supply Chain Eight satellite offices in the U.S. Headquarters in Des Moines, IA Service Group of America, Headquarters – Phoenix, AZ Denver University, School of Management – Denver, CO Sonnenalp Resort Hotel – Vail, CO

6 The Weitz Company JDE Timeline
2002 – Began using JDE (Security Model created) 2010 – Upgraded to JDE 9.0 2015 – Upgraded to tools release 9.1.5 2016 – Upgraded to 9.2 while simultaneously began using Q Software Security Model TODAY - Over 800 users on JDE JDE Modules: GL, AP, AR, Job Cost, Finance, HR, Payroll, and Supply Chain Payroll processes over 800 Salaried Users every two weeks and over 1500 Hourly Users every single week in-house

7 Challenges No Security team lead
Modifying Security was a complicated process Took many hours of testing when changes were made Locating little used apps on complicated menus took extra time.

8 Why Q Software? JDE Security Wish list: Over-haul all JDE Roles
Remove all individual access Simply way to adjust security to groups Reduces time make adjustments on the fly Make future audits easier to get through Pull reports showing all Separation of Duties Easier ability to show who has access based on roles

9 Approach and Solution Confirm objective Discovery
Implement a software tool to maximize efficiency Model best practice security

10 Approach and Solution Confirm objective
Design and implement a comprehensive low maintenance global security model that will ensure efficient and effective SOD compliance management

11 Approach and Solution Confirm objective Discovery

12 Approach and Solution Confirm objective Discovery
Establish project timeline Establish project scope Legacy analysis

13 Approach and Solution Confirm objective Discovery
Implement a software tool to maximize efficiency

14 Approach and Solution Confirm objective Discovery
Implement a software tool to maximize efficiency Model best practice security

15 Approach and Solution Confirm objective Discovery
Implement a software tool to maximize efficiency Model best practice security Deny all grant back methodology Inquiry roles by module Global functional roles Data roles

16 Breakthroughs with Q Software
Ease of Menu Design and Menu Super Find Due to our complicated menu structure Role Super Find Component and Function breakdown Ability to see what roles are affected when changes are made Teach-ability

17 Breakthroughs with Q Software
Reusable Components and Functions Address Book Maintenance is a shared service across the organization. Advantage of sharing the component will maximize the efficiency when changes are required. One change is made and all roles using the component are updated when rebuilt.

18 Breakthroughs with Q Software
Reusable Components and Functions Supervisory and Management roles are built from the clerk or generalist functions. Define and maintain once will drive the changes throughout all the roles utilizing the function.

19 Future Plans with Q Software
Snapshot Audit help Able to give others security access but with approval QSoft Reporting UDO Assistance

20 *Questions & Answers* Contact Information Dustin Tenney Business Analyst – ERP Systems The Weitz Company Tess Scott Security Practice Manager ERP Suites

21 Please complete the session evaluation We appreciate your feedback and insight Session ID# 2017JDE

22


Download ppt "Building a Better Way: The Weitz Company Security Model"

Similar presentations


Ads by Google