SlideShare a Scribd company logo
1 of 22
All trademarks and registered trademarks are the property of their respective owners.© HelpSystems LLC. All rights reserved.
Security and Audit Report Sign-Off—Made Easy
Go Paperless by Automating Your Key Document Processes
Security and Audit Report Sign-Off—Made Easy
Your Presenters
Richard Schoen
Director of Document Management Technologies
Greg Schmidt
Senior Technical Solutions Consultant
Security and Audit Report Sign-Off—Made Easy
• HelpSystems overview
• Common use cases for approval processing
• Solution overview
• Demo
• Q&A
Agenda
Security and Audit Report Sign-Off—Made Easy
HelpSystems Family of Brands
Security and Audit Report Sign-Off—Made Easy
Document Management Solution Overview
Security and Audit Report Sign-Off—Made Easy
Document Management Solution Overview
Security and Audit Report Sign-Off—Made Easy
Document Management Solution Overview
Security and Audit Report Sign-Off—Made Easy
Forms Management
Input Forms—Capturing Data (Webforms)
• Turn any paper-based form into an online form
• Validate data as it’s entered (no re-keying)
• Capture signatures on forms
• Merge data with fillable PDFs for pixel-perfect output
• Store in Webdocs (if form needs to be preserved)
Output Forms—Generating Business Output (iForms)
• Eliminate pre-printed forms
• Generate form document output as PDF, TIFF, Excel, and CSV
• Use spool files, text files, XML, and database for source data
• Create individual documents or document packets
• Print, email, and file automatically to network folder, SharePoint, or
Webdocs
Security and Audit Report Sign-Off—Made Easy
Document Management Solution Overview
Security and Audit Report Sign-Off—Made Easy
“I’m generating meaningful audit reports from Powertech already.”
“We don’t want to reprint reports for handwritten approvals.”
“We need to implement an electronic audit review process.”
“We need a demonstrable audit review and approval process.”
“Audit documents need to be kept for years.”
“Where should we keep our audit documents?”
“We don’t want to build an audit and review process from scratch.”
Key Security Audit Report Management Issues
Security and Audit Report Sign-Off—Made Easy
Problem: Our Security Documents Are Password-Protected
• Security software generates audit reports—Good
• Documents are in PDF format—Good
• Documents cannot be changed—Good
• Approvals cannot be added to files—Bad
• How do we implement a sign-off process?
Security and Audit Report Sign-Off—Made Easy
Problem: Approval Processes Are Not Easy to Articulate
• Audit documents written to network or IFS
• Audit documents emailed to recipients
• Manual processes
• Audit trails live in email messages
• Many copies of documents float around
• Where is the final approved document?
Security and Audit Report Sign-Off—Made Easy
Problem: Where is the approved document?
• Approval documents are printed
• Documents are signed
• Final paper version is filed
• Document is re-scanned
• Printed, signed, and re-filed again and again…
Security and Audit Report Sign-Off—Made Easy
Webdocs Approval Management
• Capture, archive, and manage security and audit reports
• Access documents securely from any browser
• Route documents for secure approvals
• Generate system audit reports from sign-offs
• Secure by department or user groups
• Track document changes with version control
• Use any PC file or document format:
TIFF, PDF, Word, Excel, Powerpoint, Outlook emails, audio and
video files
Security and Audit Report Sign-Off—Made Easy
Benefits of Managing Audit Reports and Documents
• Secure online document archive
• Any type of audit document—IBM i or PC based
• Secure approval routing processes
• Permanent audit trail of approvals
• Approval and notes stored with document
• Provides a demonstrable audit and approval process
Security and Audit Report Sign-Off—Made Easy
Document Approval Process
• Documents enter workflow review process at capture
• Approvers view document approval routing inbox
• Perform approvals and add comments
• Document moves to the next step of approval process
• Audit approval comments stay with document forever
• Auditors are happy
Security and Audit Report Sign-Off—Made Easy
Capture, Review, and Approve Audit Reports
Source Audit Reports and Documents
• Spool file reports from IBM i
• PDF documents from IFS on IBM i
• PDF documents from network folders
WebDocs
Security and Audit Report Sign-Off—Made Easy
Integration
Easily capture audit reports from HelpSystems and other products
UP NEXT...
Demo Time
UP NEXT...
Questions and Answers
Please enter your questions in the chat log
© HelpSystems. Company Confidential.6/29/2016 21
Security and Audit Report Sign-Off—Made Easy
Thank You for Attending
For More Information:
Website:
http://www.helpsystems.com/rjs
Telephone:
Sales: 800-328-1000
Support: +1 952-933-0609
Technical Experts:
richard.schoen@helpsystems.com
greg.schmidt@helpsystems.com

More Related Content

What's hot

Cobit 2019 framework by ISACA
Cobit 2019 framework by ISACACobit 2019 framework by ISACA
Cobit 2019 framework by ISACAMDFazlaRabbiAbir
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsAlain Huet
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.pptHasnolAhmad2
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologiesgenetics
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit processDivya Tiwari
 
The information security audit
The information security auditThe information security audit
The information security auditDhani Ahmad
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyKarthikeyan Dhayalan
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Aujas
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkTuan Phan
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture DesignPriyanka Aash
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirementshumanus2
 

What's hot (20)

Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
Cobit 2019 framework by ISACA
Cobit 2019 framework by ISACACobit 2019 framework by ISACA
Cobit 2019 framework by ISACA
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
Multi cloud security architecture
Multi cloud security architecture Multi cloud security architecture
Multi cloud security architecture
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
CISSP Chapter 1 Risk Management
CISSP Chapter 1  Risk ManagementCISSP Chapter 1  Risk Management
CISSP Chapter 1 Risk Management
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture Design
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirements
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 

Viewers also liked

Entity Level Controls And
Entity Level Controls AndEntity Level Controls And
Entity Level Controls Andmkosinsk
 
Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2Yasir Khan
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Sagar Rahurkar
 
Tech Audit overview
Tech Audit overviewTech Audit overview
Tech Audit overviewedtech111
 
International Auditing Standards (ISA)
International Auditing Standards (ISA)International Auditing Standards (ISA)
International Auditing Standards (ISA)Manon Cuylits
 
SAP Audit Issues - SAP FI/CO Training
SAP Audit Issues - SAP FI/CO TrainingSAP Audit Issues - SAP FI/CO Training
SAP Audit Issues - SAP FI/CO TrainingSapFico Training
 
Metodology Risk Assessment ISMS
Metodology Risk Assessment ISMSMetodology Risk Assessment ISMS
Metodology Risk Assessment ISMSblodotaji
 
Iso27001 Audit Services
Iso27001   Audit ServicesIso27001   Audit Services
Iso27001 Audit Servicestschraider
 
Why ISO-27001 is a better choice?
Why ISO-27001 is a better choice? Why ISO-27001 is a better choice?
Why ISO-27001 is a better choice? Patten John
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1Cheng Olayvar
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke PatchlinkBen Rothke
 
Iso27001 Approach
Iso27001   ApproachIso27001   Approach
Iso27001 Approachtschraider
 
IS Audit and Internal Controls
IS Audit and Internal ControlsIS Audit and Internal Controls
IS Audit and Internal ControlsBharath Rao
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsEd Tobias
 

Viewers also liked (20)

5.4 it security audit (mauritius)
5.4  it security audit (mauritius)5.4  it security audit (mauritius)
5.4 it security audit (mauritius)
 
Audit rizkie hafizzah
Audit rizkie hafizzahAudit rizkie hafizzah
Audit rizkie hafizzah
 
Entity Level Controls And
Entity Level Controls AndEntity Level Controls And
Entity Level Controls And
 
Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000
 
Tech Audit overview
Tech Audit overviewTech Audit overview
Tech Audit overview
 
International Auditing Standards (ISA)
International Auditing Standards (ISA)International Auditing Standards (ISA)
International Auditing Standards (ISA)
 
CISSPills #3.02
CISSPills #3.02CISSPills #3.02
CISSPills #3.02
 
AIS Lecture 1
AIS Lecture 1AIS Lecture 1
AIS Lecture 1
 
SAP Audit Issues - SAP FI/CO Training
SAP Audit Issues - SAP FI/CO TrainingSAP Audit Issues - SAP FI/CO Training
SAP Audit Issues - SAP FI/CO Training
 
Metodology Risk Assessment ISMS
Metodology Risk Assessment ISMSMetodology Risk Assessment ISMS
Metodology Risk Assessment ISMS
 
Iso27001 Audit Services
Iso27001   Audit ServicesIso27001   Audit Services
Iso27001 Audit Services
 
Why ISO-27001 is a better choice?
Why ISO-27001 is a better choice? Why ISO-27001 is a better choice?
Why ISO-27001 is a better choice?
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
 
Iso27001 Approach
Iso27001   ApproachIso27001   Approach
Iso27001 Approach
 
IS Audit and Internal Controls
IS Audit and Internal ControlsIS Audit and Internal Controls
IS Audit and Internal Controls
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 

Similar to Security and Audit Report Sign-Off—Made Easy

Document Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesDocument Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesTeamBreota
 
Speed Up Your Manufacturing and Distribution with Paperless Processes
Speed Up Your Manufacturing and Distribution with Paperless ProcessesSpeed Up Your Manufacturing and Distribution with Paperless Processes
Speed Up Your Manufacturing and Distribution with Paperless ProcessesHelpSystems
 
Company profile
Company profileCompany profile
Company profileCDS
 
Automate Data Scraping and Extraction for Web
Automate Data Scraping and Extraction for WebAutomate Data Scraping and Extraction for Web
Automate Data Scraping and Extraction for WebHelpSystems
 
Document Management for your Entire Organization
Document Management for your Entire OrganizationDocument Management for your Entire Organization
Document Management for your Entire OrganizationNet at Work
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskPrecisely
 
Company Profile CDS Services
Company Profile CDS ServicesCompany Profile CDS Services
Company Profile CDS ServicesVikas Sachdeva
 
Dev secops security and compliance at the speed of continuous delivery - owasp
Dev secops  security and compliance at the speed of continuous delivery - owaspDev secops  security and compliance at the speed of continuous delivery - owasp
Dev secops security and compliance at the speed of continuous delivery - owaspDag Rowe
 
Are processes masquerading as projects hurting your business
Are processes masquerading as projects hurting your businessAre processes masquerading as projects hurting your business
Are processes masquerading as projects hurting your businessBen Bradley
 
The Future of Business Process With Nintex
The Future of Business Process With NintexThe Future of Business Process With Nintex
The Future of Business Process With NintexDavid J Rosenthal
 
DEMO_Redfaire AP Automation SHORT
DEMO_Redfaire AP Automation SHORTDEMO_Redfaire AP Automation SHORT
DEMO_Redfaire AP Automation SHORTStuart McDonnell
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
Enterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze IncEnterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze Incrobinwilliams8624
 
Sage 500 Document Management by Altec
Sage 500 Document Management by AltecSage 500 Document Management by Altec
Sage 500 Document Management by AltecNet at Work
 
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Microsoft Décideurs IT
 
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Microsoft Technet France
 
Restore brochure optimising document management through technology
Restore brochure optimising document management through technologyRestore brochure optimising document management through technology
Restore brochure optimising document management through technologyNicola (Grice) Tatters
 

Similar to Security and Audit Report Sign-Off—Made Easy (20)

Document Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesDocument Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized Enterprises
 
3g 1 Audit Administration Software Webmars
3g   1   Audit Administration Software Webmars3g   1   Audit Administration Software Webmars
3g 1 Audit Administration Software Webmars
 
Webmars Presentation Ver1
Webmars Presentation Ver1Webmars Presentation Ver1
Webmars Presentation Ver1
 
Speed Up Your Manufacturing and Distribution with Paperless Processes
Speed Up Your Manufacturing and Distribution with Paperless ProcessesSpeed Up Your Manufacturing and Distribution with Paperless Processes
Speed Up Your Manufacturing and Distribution with Paperless Processes
 
I doc on cloud
I doc on cloudI doc on cloud
I doc on cloud
 
Company profile
Company profileCompany profile
Company profile
 
Automate Data Scraping and Extraction for Web
Automate Data Scraping and Extraction for WebAutomate Data Scraping and Extraction for Web
Automate Data Scraping and Extraction for Web
 
Document Management for your Entire Organization
Document Management for your Entire OrganizationDocument Management for your Entire Organization
Document Management for your Entire Organization
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
 
Company Profile CDS Services
Company Profile CDS ServicesCompany Profile CDS Services
Company Profile CDS Services
 
Dev secops security and compliance at the speed of continuous delivery - owasp
Dev secops  security and compliance at the speed of continuous delivery - owaspDev secops  security and compliance at the speed of continuous delivery - owasp
Dev secops security and compliance at the speed of continuous delivery - owasp
 
Are processes masquerading as projects hurting your business
Are processes masquerading as projects hurting your businessAre processes masquerading as projects hurting your business
Are processes masquerading as projects hurting your business
 
The Future of Business Process With Nintex
The Future of Business Process With NintexThe Future of Business Process With Nintex
The Future of Business Process With Nintex
 
DEMO_Redfaire AP Automation SHORT
DEMO_Redfaire AP Automation SHORTDEMO_Redfaire AP Automation SHORT
DEMO_Redfaire AP Automation SHORT
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
Enterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze IncEnterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze Inc
 
Sage 500 Document Management by Altec
Sage 500 Document Management by AltecSage 500 Document Management by Altec
Sage 500 Document Management by Altec
 
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
 
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
 
Restore brochure optimising document management through technology
Restore brochure optimising document management through technologyRestore brochure optimising document management through technology
Restore brochure optimising document management through technology
 

More from HelpSystems

El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020HelpSystems
 
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...HelpSystems
 
Rbt jdbc odbc webinar
Rbt jdbc odbc webinar Rbt jdbc odbc webinar
Rbt jdbc odbc webinar HelpSystems
 
RPA en 45 minutos
RPA en 45 minutos RPA en 45 minutos
RPA en 45 minutos HelpSystems
 
Webinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsWebinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsHelpSystems
 
Automatización de Procesos de IT
Automatización de Procesos de ITAutomatización de Procesos de IT
Automatización de Procesos de ITHelpSystems
 
Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3HelpSystems
 
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPACaso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPAHelpSystems
 
Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3HelpSystems
 
Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2HelpSystems
 
Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1HelpSystems
 
Webinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringWebinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringHelpSystems
 
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
1 año de RGPD:  3 formas en las que HelpSystems puede ayudar1 año de RGPD:  3 formas en las que HelpSystems puede ayudar
1 año de RGPD: 3 formas en las que HelpSystems puede ayudarHelpSystems
 
Automate feature tour
Automate feature tourAutomate feature tour
Automate feature tourHelpSystems
 
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...HelpSystems
 
5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scriptsHelpSystems
 
CASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanCASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanHelpSystems
 
Webinar Security Scan
Webinar Security ScanWebinar Security Scan
Webinar Security ScanHelpSystems
 

More from HelpSystems (20)

El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020
 
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
 
Rbt jdbc odbc webinar
Rbt jdbc odbc webinar Rbt jdbc odbc webinar
Rbt jdbc odbc webinar
 
RPA en 45 minutos
RPA en 45 minutos RPA en 45 minutos
RPA en 45 minutos
 
Webinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsWebinar go anywhere_mft_scripts
Webinar go anywhere_mft_scripts
 
Automatización de Procesos de IT
Automatización de Procesos de ITAutomatización de Procesos de IT
Automatización de Procesos de IT
 
Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
 
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPACaso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
 
Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3
 
Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2
 
Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1
 
Webinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringWebinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business Monitoring
 
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
1 año de RGPD:  3 formas en las que HelpSystems puede ayudar1 año de RGPD:  3 formas en las que HelpSystems puede ayudar
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
 
Automate feature tour
Automate feature tourAutomate feature tour
Automate feature tour
 
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
 
5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts
 
CASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanCASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San Juan
 
Webinar Security Scan
Webinar Security ScanWebinar Security Scan
Webinar Security Scan
 

Recently uploaded

(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 

Recently uploaded (20)

(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 

Security and Audit Report Sign-Off—Made Easy

  • 1. All trademarks and registered trademarks are the property of their respective owners.© HelpSystems LLC. All rights reserved. Security and Audit Report Sign-Off—Made Easy Go Paperless by Automating Your Key Document Processes
  • 2. Security and Audit Report Sign-Off—Made Easy Your Presenters Richard Schoen Director of Document Management Technologies Greg Schmidt Senior Technical Solutions Consultant
  • 3. Security and Audit Report Sign-Off—Made Easy • HelpSystems overview • Common use cases for approval processing • Solution overview • Demo • Q&A Agenda
  • 4. Security and Audit Report Sign-Off—Made Easy HelpSystems Family of Brands
  • 5. Security and Audit Report Sign-Off—Made Easy Document Management Solution Overview
  • 6. Security and Audit Report Sign-Off—Made Easy Document Management Solution Overview
  • 7. Security and Audit Report Sign-Off—Made Easy Document Management Solution Overview
  • 8. Security and Audit Report Sign-Off—Made Easy Forms Management Input Forms—Capturing Data (Webforms) • Turn any paper-based form into an online form • Validate data as it’s entered (no re-keying) • Capture signatures on forms • Merge data with fillable PDFs for pixel-perfect output • Store in Webdocs (if form needs to be preserved) Output Forms—Generating Business Output (iForms) • Eliminate pre-printed forms • Generate form document output as PDF, TIFF, Excel, and CSV • Use spool files, text files, XML, and database for source data • Create individual documents or document packets • Print, email, and file automatically to network folder, SharePoint, or Webdocs
  • 9. Security and Audit Report Sign-Off—Made Easy Document Management Solution Overview
  • 10. Security and Audit Report Sign-Off—Made Easy “I’m generating meaningful audit reports from Powertech already.” “We don’t want to reprint reports for handwritten approvals.” “We need to implement an electronic audit review process.” “We need a demonstrable audit review and approval process.” “Audit documents need to be kept for years.” “Where should we keep our audit documents?” “We don’t want to build an audit and review process from scratch.” Key Security Audit Report Management Issues
  • 11. Security and Audit Report Sign-Off—Made Easy Problem: Our Security Documents Are Password-Protected • Security software generates audit reports—Good • Documents are in PDF format—Good • Documents cannot be changed—Good • Approvals cannot be added to files—Bad • How do we implement a sign-off process?
  • 12. Security and Audit Report Sign-Off—Made Easy Problem: Approval Processes Are Not Easy to Articulate • Audit documents written to network or IFS • Audit documents emailed to recipients • Manual processes • Audit trails live in email messages • Many copies of documents float around • Where is the final approved document?
  • 13. Security and Audit Report Sign-Off—Made Easy Problem: Where is the approved document? • Approval documents are printed • Documents are signed • Final paper version is filed • Document is re-scanned • Printed, signed, and re-filed again and again…
  • 14. Security and Audit Report Sign-Off—Made Easy Webdocs Approval Management • Capture, archive, and manage security and audit reports • Access documents securely from any browser • Route documents for secure approvals • Generate system audit reports from sign-offs • Secure by department or user groups • Track document changes with version control • Use any PC file or document format: TIFF, PDF, Word, Excel, Powerpoint, Outlook emails, audio and video files
  • 15. Security and Audit Report Sign-Off—Made Easy Benefits of Managing Audit Reports and Documents • Secure online document archive • Any type of audit document—IBM i or PC based • Secure approval routing processes • Permanent audit trail of approvals • Approval and notes stored with document • Provides a demonstrable audit and approval process
  • 16. Security and Audit Report Sign-Off—Made Easy Document Approval Process • Documents enter workflow review process at capture • Approvers view document approval routing inbox • Perform approvals and add comments • Document moves to the next step of approval process • Audit approval comments stay with document forever • Auditors are happy
  • 17. Security and Audit Report Sign-Off—Made Easy Capture, Review, and Approve Audit Reports Source Audit Reports and Documents • Spool file reports from IBM i • PDF documents from IFS on IBM i • PDF documents from network folders WebDocs
  • 18. Security and Audit Report Sign-Off—Made Easy Integration Easily capture audit reports from HelpSystems and other products
  • 20. UP NEXT... Questions and Answers Please enter your questions in the chat log
  • 21. © HelpSystems. Company Confidential.6/29/2016 21
  • 22. Security and Audit Report Sign-Off—Made Easy Thank You for Attending For More Information: Website: http://www.helpsystems.com/rjs Telephone: Sales: 800-328-1000 Support: +1 952-933-0609 Technical Experts: richard.schoen@helpsystems.com greg.schmidt@helpsystems.com

Editor's Notes

  1. Good Morning Everyone and welcome to our live webinar. Today is Thursday June 9th I’m Richard Schoen coming to you from our offices in Eden Prairie MN I’ll be the moderator today for our webinar titled: Security and Audit Report Sign-Off Made Easy This webinar will introduce you to the concept of quickly building rock solid approval processes around your audit, compliance and other operational reports and documents that need to have real, measurable signoff processes in place. We have lots of information to cover today so let’s get started. TODO: Demo report sample report to show auditing signoffs for auditors.
  2. As I mentioned I am Richard Schoen, Director of Document Management Technologies at HelpSystems. I am part of the technical solutions group at HelpSystems bringing topics like this to our customers and prospective customers. I have over 27 years of background with IBMi, Windows and Linux platforms and managing and delivering forms and documents. My co-presenter today is Greg Schmidt. Good morning Greg……….why don’t you introduce your self and tell us a little about your role here at HelpSystems.
  3. Our agenda today will hopefully provide a good introduction to HelpSystems, RJS and our secure document approval processing solutions. We’ll provide a quick company overview of HelpSystems and its history. Then we’ll talk about the common problems companies encounter when the need arises to create approval processes Then we’ll provide an overview of our WebDocs document and approval processing software that can facilitate electronic signoffs. Then we will provide a short demo of the software in action. We will end with a few minutes of Q&A and a couple of polling questions. Feel free to enter your questions in the chat window as we go and I will address them towards the end of the webinar. Select “All Presenters” so the questions are directed to me. We’ll also plan to complete our session in 30-40 minutes so you have plenty of time to make your next important meeting. Also todays event will be recorded and you will receive a link after the webinar to share with anyone in your organization who couldn’t attend todays session.
  4. HelpSystems has been in business for over 32 years providing system management, business intelligence and security solutions for IBMi, Windows, Linux and AIX platforms. The RJS document management products joined the HelpSystems product brand portfolio in 2014. The RJS products focus on helping companies implement paperless process to capture, manage, deliver and secure their critical documents. Our WebDocs family of products help companies go paperless by providing several key document management components. ---------------------------------------------------- Our WebDocs family of products help companies go paperless by providing several key document management components such as: -Document scanning to capture paper documents such as AP invoices -Electronic Business Form Output generation software which can be used to generate documents such as invoices, purchase orders, statements, checks and more. -WebForms, our web based data capture software allows companies to capture data at the source of entry and eliminate re-keying of information. (Used often in AP, HR and other departments looking to turn paper forms into actionable data.) -SignHere Electronic Signature Capture – Capturing signatures on business documents such as invoices, receipts, proofs of delivery and bills of lading without printing. -DeliverNow Automated Report and Document Bursting and Delivery. If you’re planning to implement paperless process in any of your departments, chances are we have a solution.
  5. Our solution covers 3 core areas of a business Document Management Process Management Forms Management
  6. Document management – This focuses around capturing and managing scanned paper documents, electronic reports from IBMi and other systems, mfg drawings, email, inbound faxes and other electronic documents such as photos, videos and more. We can manage any document that can be created in a PC format.
  7. Forms management – Forms management covers two different but important areas. Input forms – We can take any paper based form and turn it into an online version where data can be captured. This is a great way to capture data right away without re-keying. Output forms – generating high quality business output documents such as invoices, purchase orders, statements, bills of lading, checks and more to reduce paper usage.
  8. Input forms – We can take any paper based form and turn it into an online version where data can be captured directly into a business system. This is a great way to capture form based data right away without re-keying. Output forms – generating high quality business output documents such as invoices, purchase orders, statements, bills of lading, checks and more to reduce paper usage. This is also the main topic of today’s webinar. If you’re interested in learning more about input forms and data capture, take a look at one of our recent webinars replays on capturing data without paper or feel free to reach out for a personalized presentation from me or one of our sales team members.
  9. Process management – Webdocs contains a built-in document routing system to provide the ability to electronically route documents to the right people for review and approval as well as electronic signature capture. Signatures can be captured via desktop software or web based forms that can be sent out via the web. Secure document signoffs and approvals will be the core area of focus for today’s webinar.
  10. These are some of the key issues companies face today when attempting to comply to audit requirements. Maybe you’re not generating any audit reports today. Or maybe you have implemented software such as Powertech, Policy Minder or one of our other security products, but we haven’t created an electronic approval process. We don’t want to re-print reports for handwritten approvals. We need to implement an electronic audit review process. We need a demonstrable audit review and approval process for our auditors. Audit documents need to be kept for years for compliance. Where should we keep our audit documents ? Without a manageable document archive, how can you adequately keep track of your security documents. We don’t want to build an audit and review process from scratch. Trying to build a secure document archive and audit process from scratch could take years.
  11. So we’re already generating security and audit reports so that’s a good start. Our documents also get generated in PDF format so they can’t be changed which is good. However this doesn’t really allow us to create a document approval and signoff process because the documents themselves cannot be signed or annotated. How do we put together a signoff process is we can’t sign or signed and protected documents ? Fortunately we will be demonstrating a way to create a secure signoff process for your documents today.
  12. So you may have already implemented audit or security software. You may even use one of our products such as Powertech, Policy Minder, Robot or other product to manage your operations and security processes. Or you might be generating security and audit reports from other software or processes. Often those documents are simply written to network folders or emailed to the security officer for review. Then copies of the reports get forwarded to the appropriate management team members for signoff or approval. Then the documents are mailed back to the security officer and so the process goes. While the process is somewhat paperless and automated it’s hard to figure out what the actual process is. What happens if the auditors start asking you to demonstrate your approval processes ? Red flags start popping up everywhere.
  13. This is how not to create a secure document signoff process. Approval documents printed Documents are signed Paper gets filed or document gets re-scanned Document then printed, signed and re-filed again and again….. With this type of process there are several document copies floating around and it’s hard to determine which is the reviewed version. If the audit report could get captured into a single secure location, links to the document can be sent around so there is only one master copy of the audit document.
  14. In our case we use different terminology to describe document management depending on the department where it will be used: Sometimes we talk about WebDocs as being an imaging or document management system used to capture and stored scanned image documents. While WebDocs is often used to manage scanned documents, the software can be utilized in many different ways. Especially when a business may already have a corporate approved standard product already in place for scanning documents or capturing reports. This is where WebDocs shines as a departmental of point solution to solve various business problems in the organization. We have helped implement WebDocs in many businesses where they may have an older imaging system such as Legato, Application Extender and others where we live alongside those applications solving a specific departmental need. Or WebDocs can become your corporate standard for managing system reports, forms and other documents in a single, secure repository. Accounts payable departments may think of WebDocs as a Smart AP invoice processing system by utilizing our scanning, OCR technology and smart routing to route documents around to various departments for GL coding and approvals, WebDocs manages the entire AP approval process from purchasing to payments. Our web forms technology can be coupled into the process to provide a lightweight purchasing approval process around non-PO based ordering when a company find that more than 50% of their purchases are made without approvals. HR departments can think of WebDocs as a place to hold all employee records, including electronic online applications, scanned paperwork and automatic system generated documents such as I9 and W4 and more. WebDocs offers a way to utilize the thousands of available PDF templates on government and other sites and automatically fill and extract live data from these forms. And our online form technology can capture employee applications and signatures. The goal is to capture the data once and then send it to the appropriate HR and employee systems such as timecard processing with Kronos and other applications and HR systems such as Oracle HCM, Taleo and other Human Capital Management systems. Manufacturing, engineering and distribution areas may utilize WebDocs to capture key customer orders, signed and unsigned shipping paperwork, proof of delivery, job information, work instructions, CAD drawings and more. Businesses may also think of WebDocs as a Report Management system to capture and manage all of their electronic reporting and business documents generated by their IBMi, Windows, Linux and AIX business systems. When capturing and routing documents for approvals, WebDocs can be thought of as an approval management system that captures, manages and routes documents for signoffs and approvals much like we mentioned when talking about managing security reporting and audit documents. WebDocs can also be thought of as a Forms Management system used to manage forms that get filled out online rather than via paper as they may today. HR applications, inspection reports, service orders, and expense reports are all candidates to be transformed from paper based forms to online actionable form processes. One thing to clarify about the WebDocs name is that even though we use the name WebDocs, the software can reside securely in your own data center on your own servers or in a cloud hosted data center if you desire.
  15. This is an example of what a secure signoff process might look like. New report documents are uploaded or captured automatically from output queues or directories. Documents automatically enter workflow review processes at capture time. Approvers view document approval routing inbox. Perform approvals and add comments. Document moved to next step of approval process. Audit approval comments stay with document forever.
  16. Reports get generated on IBMi or Windows based software. You could be using any security product, audit software or any application that can generate a PDF or other PC formatted document for signoffs. Any documents that can be generated or captured electronically is a candidate for secure signoff processes. As documents get generated they get routed into the WebDocs Secure Document Archive and then they are added to workflow routing processes so that all the appropriate approvers have a chance to sign off on the security reports. As approvals are applied, commentary can also be added to each documents history so that audit reports can then be generated to articulate which documents were sign off on and what commentary may have been added to signoff documents.
  17. We would be remiss is we didn’t mention that WebDocs can be integrated with most of the existing HelpSystems products to capture reports and documents for archival and approval processing. SEQUEL or Showcase are used to generate queries, reports and documents. PDF, Excel and other document types can be generated and routed to WebDocs for archival or online access and approvals. PowerTech or Skyview and other system audit reports and canbe routed for secure electronic signatures and approvals. Robot, Halcyon, Bytware, CCSS and system generated reports from any of our IBM i or non-i scheduling and automation software can be integrated into the WebDocs document archive. These could be job checklists, job reports and any of the output generated as reports or IFS documents. AutoMate, our Windows process automation software can generate, burst and stage documents for capturing to WebDocs or Sharepoint for filing or electronic signing processes. iForms can be used to generate business forms and documents such as invoices, bills of lading, proofs of delivery and more for electronic archiving and distribution via WebDocs. Your ERP and other audit, security and business applications generate output that can be archived for Hopefully hearing about the many ways in which WebDocs can be integrated to your internal processes for report archival, auditing and secure signoffs has stimulated your thoughts and you’re imagining how your company can create secure, auditable approval processes with WebDocs. We look forward to hearing your requirements and talking about your approval process needs.
  18. Now we’re going to take a quick look at a sample security signoff sequence. Greg will provide us with a short demo.
  19. OK, now we’re going to take time for a little Q&A. I will also show a poll with a couple of questions we can share with the group. When entering questions, please remember to Select “All Presenters” so your questions are directed to me. We have software that is not form HelpSystems. Can our documents be captured for approval process ? Absolutely. The WebDocs software is not limited to capturing documents fro many specific applications. It supports documents generated from any IBMi, Windows, Linux, AIX or MAC-OS based systems. You mentioned signing of secure PDF documents. If I want to physically sign non-secure PDF documents can I do it with with your software ? For non-secure PDF documents which means they are not password protected against changes, you can use Adobe Acrobat or our SignHere signature capture software to capture physical signatures and annotations on your PDF documents. SignHere is a great product to use for capturing physical signatures on documents, especially in areas such as highvolume manufacturing and distribution environments where paperwork needs to be signed. Can we initiate the creation of secure audit reports from our existing applications ? Most applications can print directly to PDF documents today. Simply print and capture to a PDF document in a monitored folder and the documents get captured and the audit process begins. With IBMi applications you can generate spool file documents or IFS documents and those documents can also get automatically captured and routed into an approval process with minimal effort.
  20. Make sure to mark the date for our 2016 user conference titled: ShiftIT which will take place here in Minneapolis from June 20th – 23rd. Go to helpsystems.com/shiftit to register. We look forward to connecting with you face to face and talking with you about your automation issues in 2016.
  21. Thanks for attending our webinar today. We hope you learned some helpful information to allow your company to start thinking about putting real and auditable processes around your security document signoffs so that you’re never caught by the auditors without a secure signoff process in place. Again make sure to mark the date for our 2016 user conference titled: ShiftIT which will take place here in Minneapolis from June 20th – 23rd. Go to helpsystems.com/shiftit or reach out to your sales rep and they can provide registration info. We look forward to connecting with you face to face in 2016. And of course if you have any additional questions on security signoffs, our forms or other document management technology, feel free to reach out to our sales team, Greg Schmidt or me and we will be happy to address your questions or provide a more in-depth technical demo. You will also receive a link to this recording so you can share this webinar with those in your company who could not attend today’s session. Again thanks for attending todays webinar. Have a great day and enjoy the rest of your week. Pause for a moment. Stop screen sharing Save polling answers.