SlideShare a Scribd company logo
All trademarks and registered trademarks are the property of their respective owners.© HelpSystems LLC. All rights reserved.
Security and Audit Report Sign-Off—Made Easy
Go Paperless by Automating Your Key Document Processes
Security and Audit Report Sign-Off—Made Easy
Your Presenters
Richard Schoen
Director of Document Management Technologies
Greg Schmidt
Senior Technical Solutions Consultant
Security and Audit Report Sign-Off—Made Easy
• HelpSystems overview
• Common use cases for approval processing
• Solution overview
• Demo
• Q&A
Agenda
Security and Audit Report Sign-Off—Made Easy
HelpSystems Family of Brands
Security and Audit Report Sign-Off—Made Easy
Document Management Solution Overview
Security and Audit Report Sign-Off—Made Easy
Document Management Solution Overview
Security and Audit Report Sign-Off—Made Easy
Document Management Solution Overview
Security and Audit Report Sign-Off—Made Easy
Forms Management
Input Forms—Capturing Data (Webforms)
• Turn any paper-based form into an online form
• Validate data as it’s entered (no re-keying)
• Capture signatures on forms
• Merge data with fillable PDFs for pixel-perfect output
• Store in Webdocs (if form needs to be preserved)
Output Forms—Generating Business Output (iForms)
• Eliminate pre-printed forms
• Generate form document output as PDF, TIFF, Excel, and CSV
• Use spool files, text files, XML, and database for source data
• Create individual documents or document packets
• Print, email, and file automatically to network folder, SharePoint, or
Webdocs
Security and Audit Report Sign-Off—Made Easy
Document Management Solution Overview
Security and Audit Report Sign-Off—Made Easy
“I’m generating meaningful audit reports from Powertech already.”
“We don’t want to reprint reports for handwritten approvals.”
“We need to implement an electronic audit review process.”
“We need a demonstrable audit review and approval process.”
“Audit documents need to be kept for years.”
“Where should we keep our audit documents?”
“We don’t want to build an audit and review process from scratch.”
Key Security Audit Report Management Issues
Security and Audit Report Sign-Off—Made Easy
Problem: Our Security Documents Are Password-Protected
• Security software generates audit reports—Good
• Documents are in PDF format—Good
• Documents cannot be changed—Good
• Approvals cannot be added to files—Bad
• How do we implement a sign-off process?
Security and Audit Report Sign-Off—Made Easy
Problem: Approval Processes Are Not Easy to Articulate
• Audit documents written to network or IFS
• Audit documents emailed to recipients
• Manual processes
• Audit trails live in email messages
• Many copies of documents float around
• Where is the final approved document?
Security and Audit Report Sign-Off—Made Easy
Problem: Where is the approved document?
• Approval documents are printed
• Documents are signed
• Final paper version is filed
• Document is re-scanned
• Printed, signed, and re-filed again and again…
Security and Audit Report Sign-Off—Made Easy
Webdocs Approval Management
• Capture, archive, and manage security and audit reports
• Access documents securely from any browser
• Route documents for secure approvals
• Generate system audit reports from sign-offs
• Secure by department or user groups
• Track document changes with version control
• Use any PC file or document format:
TIFF, PDF, Word, Excel, Powerpoint, Outlook emails, audio and
video files
Security and Audit Report Sign-Off—Made Easy
Benefits of Managing Audit Reports and Documents
• Secure online document archive
• Any type of audit document—IBM i or PC based
• Secure approval routing processes
• Permanent audit trail of approvals
• Approval and notes stored with document
• Provides a demonstrable audit and approval process
Security and Audit Report Sign-Off—Made Easy
Document Approval Process
• Documents enter workflow review process at capture
• Approvers view document approval routing inbox
• Perform approvals and add comments
• Document moves to the next step of approval process
• Audit approval comments stay with document forever
• Auditors are happy
Security and Audit Report Sign-Off—Made Easy
Capture, Review, and Approve Audit Reports
Source Audit Reports and Documents
• Spool file reports from IBM i
• PDF documents from IFS on IBM i
• PDF documents from network folders
WebDocs
Security and Audit Report Sign-Off—Made Easy
Integration
Easily capture audit reports from HelpSystems and other products
UP NEXT...
Demo Time
UP NEXT...
Questions and Answers
Please enter your questions in the chat log
© HelpSystems. Company Confidential.6/29/2016 21
Security and Audit Report Sign-Off—Made Easy
Thank You for Attending
For More Information:
Website:
http://www.helpsystems.com/rjs
Telephone:
Sales: 800-328-1000
Support: +1 952-933-0609
Technical Experts:
richard.schoen@helpsystems.com
greg.schmidt@helpsystems.com

More Related Content

What's hot

EA - Enterprise Integration Introduction
EA - Enterprise Integration IntroductionEA - Enterprise Integration Introduction
EA - Enterprise Integration Introduction
Praveen Pandey
 
ISO 27001
ISO 27001ISO 27001
IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5
Eryk Budi Pratama
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
PECB
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
Mufaddal Nullwala
 
CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016
Hafiz Sheikh Adnan Ahmed
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
Imran Ahmed
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
Ed Tobias
 
27001.pptx
27001.pptx27001.pptx
27001.pptx
AvniJain836319
 
SOC 2: Build Trust and Confidence
SOC 2: Build Trust and ConfidenceSOC 2: Build Trust and Confidence
SOC 2: Build Trust and Confidence
Schellman & Company
 
5.4 it security audit (mauritius)
5.4  it security audit (mauritius)5.4  it security audit (mauritius)
5.4 it security audit (mauritius)
Corporate Registers Forum
 
CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016
Hafiz Sheikh Adnan Ahmed
 
CMMI V2.0
CMMI V2.0CMMI V2.0
CMMI V2.0
Dark Night
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
PECB
 
Iso 27001 2013
Iso 27001 2013Iso 27001 2013
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
Jayesh Daga
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
Shankar Subramaniyan
 
ISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdfISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
Dinesh O Bareja
 
IT Governance Presentation
IT Governance PresentationIT Governance Presentation
IT Governance Presentation
jmcarden
 

What's hot (20)

EA - Enterprise Integration Introduction
EA - Enterprise Integration IntroductionEA - Enterprise Integration Introduction
EA - Enterprise Integration Introduction
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
27001.pptx
27001.pptx27001.pptx
27001.pptx
 
SOC 2: Build Trust and Confidence
SOC 2: Build Trust and ConfidenceSOC 2: Build Trust and Confidence
SOC 2: Build Trust and Confidence
 
5.4 it security audit (mauritius)
5.4  it security audit (mauritius)5.4  it security audit (mauritius)
5.4 it security audit (mauritius)
 
CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016
 
CMMI V2.0
CMMI V2.0CMMI V2.0
CMMI V2.0
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
Iso 27001 2013
Iso 27001 2013Iso 27001 2013
Iso 27001 2013
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
ISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdfISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdf
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
IT Governance Presentation
IT Governance PresentationIT Governance Presentation
IT Governance Presentation
 

Viewers also liked

Audit rizkie hafizzah
Audit rizkie hafizzahAudit rizkie hafizzah
Audit rizkie hafizzah
Rizkie Hafizzah
 
Entity Level Controls And
Entity Level Controls AndEntity Level Controls And
Entity Level Controls And
mkosinsk
 
Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2
Yasir Khan
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000
Sagar Rahurkar
 
Tech Audit overview
Tech Audit overviewTech Audit overview
Tech Audit overview
edtech111
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
genetics
 
International Auditing Standards (ISA)
International Auditing Standards (ISA)International Auditing Standards (ISA)
International Auditing Standards (ISA)
Manon Cuylits
 
CISSPills #3.02
CISSPills #3.02CISSPills #3.02
AIS Lecture 1
AIS Lecture 1AIS Lecture 1
AIS Lecture 1
Cheng Olayvar
 
SAP Audit Issues - SAP FI/CO Training
SAP Audit Issues - SAP FI/CO TrainingSAP Audit Issues - SAP FI/CO Training
SAP Audit Issues - SAP FI/CO Training
SapFico Training
 
Metodology Risk Assessment ISMS
Metodology Risk Assessment ISMSMetodology Risk Assessment ISMS
Metodology Risk Assessment ISMS
blodotaji
 
Iso27001 Audit Services
Iso27001   Audit ServicesIso27001   Audit Services
Iso27001 Audit Services
tschraider
 
Why ISO-27001 is a better choice?
Why ISO-27001 is a better choice? Why ISO-27001 is a better choice?
Why ISO-27001 is a better choice?
Patten John
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1
Cheng Olayvar
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
Ben Rothke
 
Iso27001 Approach
Iso27001   ApproachIso27001   Approach
Iso27001 Approach
tschraider
 
The information security audit
The information security auditThe information security audit
The information security audit
Dhani Ahmad
 
IS Audit and Internal Controls
IS Audit and Internal ControlsIS Audit and Internal Controls
IS Audit and Internal Controls
Bharath Rao
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
CBIZ, Inc.
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
 

Viewers also liked (20)

Audit rizkie hafizzah
Audit rizkie hafizzahAudit rizkie hafizzah
Audit rizkie hafizzah
 
Entity Level Controls And
Entity Level Controls AndEntity Level Controls And
Entity Level Controls And
 
Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000
 
Tech Audit overview
Tech Audit overviewTech Audit overview
Tech Audit overview
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 
International Auditing Standards (ISA)
International Auditing Standards (ISA)International Auditing Standards (ISA)
International Auditing Standards (ISA)
 
CISSPills #3.02
CISSPills #3.02CISSPills #3.02
CISSPills #3.02
 
AIS Lecture 1
AIS Lecture 1AIS Lecture 1
AIS Lecture 1
 
SAP Audit Issues - SAP FI/CO Training
SAP Audit Issues - SAP FI/CO TrainingSAP Audit Issues - SAP FI/CO Training
SAP Audit Issues - SAP FI/CO Training
 
Metodology Risk Assessment ISMS
Metodology Risk Assessment ISMSMetodology Risk Assessment ISMS
Metodology Risk Assessment ISMS
 
Iso27001 Audit Services
Iso27001   Audit ServicesIso27001   Audit Services
Iso27001 Audit Services
 
Why ISO-27001 is a better choice?
Why ISO-27001 is a better choice? Why ISO-27001 is a better choice?
Why ISO-27001 is a better choice?
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
 
Iso27001 Approach
Iso27001   ApproachIso27001   Approach
Iso27001 Approach
 
The information security audit
The information security auditThe information security audit
The information security audit
 
IS Audit and Internal Controls
IS Audit and Internal ControlsIS Audit and Internal Controls
IS Audit and Internal Controls
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 

Similar to Security and Audit Report Sign-Off—Made Easy

Document Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesDocument Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized Enterprises
TeamBreota
 
3g 1 Audit Administration Software Webmars
3g   1   Audit Administration Software Webmars3g   1   Audit Administration Software Webmars
3g 1 Audit Administration Software Webmars
Rajeswaran Muthu Venkatachalam
 
Webmars Presentation Ver1
Webmars Presentation Ver1Webmars Presentation Ver1
Webmars Presentation Ver1
Rajeswaran Muthu Venkatachalam
 
Speed Up Your Manufacturing and Distribution with Paperless Processes
Speed Up Your Manufacturing and Distribution with Paperless ProcessesSpeed Up Your Manufacturing and Distribution with Paperless Processes
Speed Up Your Manufacturing and Distribution with Paperless Processes
HelpSystems
 
I doc on cloud
I doc on cloudI doc on cloud
Company profile
Company profileCompany profile
Company profile
CDS
 
Automate Data Scraping and Extraction for Web
Automate Data Scraping and Extraction for WebAutomate Data Scraping and Extraction for Web
Automate Data Scraping and Extraction for Web
HelpSystems
 
Document Management for your Entire Organization
Document Management for your Entire OrganizationDocument Management for your Entire Organization
Document Management for your Entire Organization
Net at Work
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
Precisely
 
Company Profile CDS Services
Company Profile CDS ServicesCompany Profile CDS Services
Company Profile CDS Services
Vikas Sachdeva
 
Dev secops security and compliance at the speed of continuous delivery - owasp
Dev secops  security and compliance at the speed of continuous delivery - owaspDev secops  security and compliance at the speed of continuous delivery - owasp
Dev secops security and compliance at the speed of continuous delivery - owasp
Dag Rowe
 
Are processes masquerading as projects hurting your business
Are processes masquerading as projects hurting your businessAre processes masquerading as projects hurting your business
Are processes masquerading as projects hurting your business
Ben Bradley
 
The Future of Business Process With Nintex
The Future of Business Process With NintexThe Future of Business Process With Nintex
The Future of Business Process With Nintex
David J Rosenthal
 
DEMO_Redfaire AP Automation SHORT
DEMO_Redfaire AP Automation SHORTDEMO_Redfaire AP Automation SHORT
DEMO_Redfaire AP Automation SHORT
Stuart McDonnell
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
Precisely
 
Enterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze IncEnterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze Inc
robinwilliams8624
 
Sage 500 Document Management by Altec
Sage 500 Document Management by AltecSage 500 Document Management by Altec
Sage 500 Document Management by Altec
Net at Work
 
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Microsoft Technet France
 
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Microsoft Décideurs IT
 
Restore brochure optimising document management through technology
Restore brochure optimising document management through technologyRestore brochure optimising document management through technology
Restore brochure optimising document management through technology
Nicola (Grice) Tatters
 

Similar to Security and Audit Report Sign-Off—Made Easy (20)

Document Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesDocument Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized Enterprises
 
3g 1 Audit Administration Software Webmars
3g   1   Audit Administration Software Webmars3g   1   Audit Administration Software Webmars
3g 1 Audit Administration Software Webmars
 
Webmars Presentation Ver1
Webmars Presentation Ver1Webmars Presentation Ver1
Webmars Presentation Ver1
 
Speed Up Your Manufacturing and Distribution with Paperless Processes
Speed Up Your Manufacturing and Distribution with Paperless ProcessesSpeed Up Your Manufacturing and Distribution with Paperless Processes
Speed Up Your Manufacturing and Distribution with Paperless Processes
 
I doc on cloud
I doc on cloudI doc on cloud
I doc on cloud
 
Company profile
Company profileCompany profile
Company profile
 
Automate Data Scraping and Extraction for Web
Automate Data Scraping and Extraction for WebAutomate Data Scraping and Extraction for Web
Automate Data Scraping and Extraction for Web
 
Document Management for your Entire Organization
Document Management for your Entire OrganizationDocument Management for your Entire Organization
Document Management for your Entire Organization
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
 
Company Profile CDS Services
Company Profile CDS ServicesCompany Profile CDS Services
Company Profile CDS Services
 
Dev secops security and compliance at the speed of continuous delivery - owasp
Dev secops  security and compliance at the speed of continuous delivery - owaspDev secops  security and compliance at the speed of continuous delivery - owasp
Dev secops security and compliance at the speed of continuous delivery - owasp
 
Are processes masquerading as projects hurting your business
Are processes masquerading as projects hurting your businessAre processes masquerading as projects hurting your business
Are processes masquerading as projects hurting your business
 
The Future of Business Process With Nintex
The Future of Business Process With NintexThe Future of Business Process With Nintex
The Future of Business Process With Nintex
 
DEMO_Redfaire AP Automation SHORT
DEMO_Redfaire AP Automation SHORTDEMO_Redfaire AP Automation SHORT
DEMO_Redfaire AP Automation SHORT
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
Enterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze IncEnterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze Inc
 
Sage 500 Document Management by Altec
Sage 500 Document Management by AltecSage 500 Document Management by Altec
Sage 500 Document Management by Altec
 
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
 
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
 
Restore brochure optimising document management through technology
Restore brochure optimising document management through technologyRestore brochure optimising document management through technology
Restore brochure optimising document management through technology
 

More from HelpSystems

El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020
HelpSystems
 
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
HelpSystems
 
Rbt jdbc odbc webinar
Rbt jdbc odbc webinar Rbt jdbc odbc webinar
Rbt jdbc odbc webinar
HelpSystems
 
RPA en 45 minutos
RPA en 45 minutos RPA en 45 minutos
RPA en 45 minutos
HelpSystems
 
Webinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsWebinar go anywhere_mft_scripts
Webinar go anywhere_mft_scripts
HelpSystems
 
Automatización de Procesos de IT
Automatización de Procesos de ITAutomatización de Procesos de IT
Automatización de Procesos de IT
HelpSystems
 
Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3
HelpSystems
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
HelpSystems
 
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPACaso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
HelpSystems
 
Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3
HelpSystems
 
Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2
HelpSystems
 
Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1
HelpSystems
 
Webinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringWebinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business Monitoring
HelpSystems
 
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
1 año de RGPD:  3 formas en las que HelpSystems puede ayudar1 año de RGPD:  3 formas en las que HelpSystems puede ayudar
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
HelpSystems
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
HelpSystems
 
Automate feature tour
Automate feature tourAutomate feature tour
Automate feature tour
HelpSystems
 
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
HelpSystems
 
5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts
HelpSystems
 
CASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanCASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San Juan
HelpSystems
 
Webinar Security Scan
Webinar Security ScanWebinar Security Scan
Webinar Security Scan
HelpSystems
 

More from HelpSystems (20)

El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020
 
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
 
Rbt jdbc odbc webinar
Rbt jdbc odbc webinar Rbt jdbc odbc webinar
Rbt jdbc odbc webinar
 
RPA en 45 minutos
RPA en 45 minutos RPA en 45 minutos
RPA en 45 minutos
 
Webinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsWebinar go anywhere_mft_scripts
Webinar go anywhere_mft_scripts
 
Automatización de Procesos de IT
Automatización de Procesos de ITAutomatización de Procesos de IT
Automatización de Procesos de IT
 
Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
 
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPACaso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
 
Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3
 
Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2
 
Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1
 
Webinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringWebinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business Monitoring
 
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
1 año de RGPD:  3 formas en las que HelpSystems puede ayudar1 año de RGPD:  3 formas en las que HelpSystems puede ayudar
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
 
Automate feature tour
Automate feature tourAutomate feature tour
Automate feature tour
 
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
 
5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts
 
CASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanCASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San Juan
 
Webinar Security Scan
Webinar Security ScanWebinar Security Scan
Webinar Security Scan
 

Recently uploaded

Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
316895207-SAP-Oil-and-Gas-Downstream-Training.pptx
316895207-SAP-Oil-and-Gas-Downstream-Training.pptx316895207-SAP-Oil-and-Gas-Downstream-Training.pptx
316895207-SAP-Oil-and-Gas-Downstream-Training.pptx
ssuserad3af4
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
VALiNTRY360
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
TaghreedAltamimi
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
Ayan Halder
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 

Recently uploaded (20)

Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
316895207-SAP-Oil-and-Gas-Downstream-Training.pptx
316895207-SAP-Oil-and-Gas-Downstream-Training.pptx316895207-SAP-Oil-and-Gas-Downstream-Training.pptx
316895207-SAP-Oil-and-Gas-Downstream-Training.pptx
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 

Security and Audit Report Sign-Off—Made Easy

  • 1. All trademarks and registered trademarks are the property of their respective owners.© HelpSystems LLC. All rights reserved. Security and Audit Report Sign-Off—Made Easy Go Paperless by Automating Your Key Document Processes
  • 2. Security and Audit Report Sign-Off—Made Easy Your Presenters Richard Schoen Director of Document Management Technologies Greg Schmidt Senior Technical Solutions Consultant
  • 3. Security and Audit Report Sign-Off—Made Easy • HelpSystems overview • Common use cases for approval processing • Solution overview • Demo • Q&A Agenda
  • 4. Security and Audit Report Sign-Off—Made Easy HelpSystems Family of Brands
  • 5. Security and Audit Report Sign-Off—Made Easy Document Management Solution Overview
  • 6. Security and Audit Report Sign-Off—Made Easy Document Management Solution Overview
  • 7. Security and Audit Report Sign-Off—Made Easy Document Management Solution Overview
  • 8. Security and Audit Report Sign-Off—Made Easy Forms Management Input Forms—Capturing Data (Webforms) • Turn any paper-based form into an online form • Validate data as it’s entered (no re-keying) • Capture signatures on forms • Merge data with fillable PDFs for pixel-perfect output • Store in Webdocs (if form needs to be preserved) Output Forms—Generating Business Output (iForms) • Eliminate pre-printed forms • Generate form document output as PDF, TIFF, Excel, and CSV • Use spool files, text files, XML, and database for source data • Create individual documents or document packets • Print, email, and file automatically to network folder, SharePoint, or Webdocs
  • 9. Security and Audit Report Sign-Off—Made Easy Document Management Solution Overview
  • 10. Security and Audit Report Sign-Off—Made Easy “I’m generating meaningful audit reports from Powertech already.” “We don’t want to reprint reports for handwritten approvals.” “We need to implement an electronic audit review process.” “We need a demonstrable audit review and approval process.” “Audit documents need to be kept for years.” “Where should we keep our audit documents?” “We don’t want to build an audit and review process from scratch.” Key Security Audit Report Management Issues
  • 11. Security and Audit Report Sign-Off—Made Easy Problem: Our Security Documents Are Password-Protected • Security software generates audit reports—Good • Documents are in PDF format—Good • Documents cannot be changed—Good • Approvals cannot be added to files—Bad • How do we implement a sign-off process?
  • 12. Security and Audit Report Sign-Off—Made Easy Problem: Approval Processes Are Not Easy to Articulate • Audit documents written to network or IFS • Audit documents emailed to recipients • Manual processes • Audit trails live in email messages • Many copies of documents float around • Where is the final approved document?
  • 13. Security and Audit Report Sign-Off—Made Easy Problem: Where is the approved document? • Approval documents are printed • Documents are signed • Final paper version is filed • Document is re-scanned • Printed, signed, and re-filed again and again…
  • 14. Security and Audit Report Sign-Off—Made Easy Webdocs Approval Management • Capture, archive, and manage security and audit reports • Access documents securely from any browser • Route documents for secure approvals • Generate system audit reports from sign-offs • Secure by department or user groups • Track document changes with version control • Use any PC file or document format: TIFF, PDF, Word, Excel, Powerpoint, Outlook emails, audio and video files
  • 15. Security and Audit Report Sign-Off—Made Easy Benefits of Managing Audit Reports and Documents • Secure online document archive • Any type of audit document—IBM i or PC based • Secure approval routing processes • Permanent audit trail of approvals • Approval and notes stored with document • Provides a demonstrable audit and approval process
  • 16. Security and Audit Report Sign-Off—Made Easy Document Approval Process • Documents enter workflow review process at capture • Approvers view document approval routing inbox • Perform approvals and add comments • Document moves to the next step of approval process • Audit approval comments stay with document forever • Auditors are happy
  • 17. Security and Audit Report Sign-Off—Made Easy Capture, Review, and Approve Audit Reports Source Audit Reports and Documents • Spool file reports from IBM i • PDF documents from IFS on IBM i • PDF documents from network folders WebDocs
  • 18. Security and Audit Report Sign-Off—Made Easy Integration Easily capture audit reports from HelpSystems and other products
  • 20. UP NEXT... Questions and Answers Please enter your questions in the chat log
  • 21. © HelpSystems. Company Confidential.6/29/2016 21
  • 22. Security and Audit Report Sign-Off—Made Easy Thank You for Attending For More Information: Website: http://www.helpsystems.com/rjs Telephone: Sales: 800-328-1000 Support: +1 952-933-0609 Technical Experts: richard.schoen@helpsystems.com greg.schmidt@helpsystems.com

Editor's Notes

  1. Good Morning Everyone and welcome to our live webinar. Today is Thursday June 9th I’m Richard Schoen coming to you from our offices in Eden Prairie MN I’ll be the moderator today for our webinar titled: Security and Audit Report Sign-Off Made Easy This webinar will introduce you to the concept of quickly building rock solid approval processes around your audit, compliance and other operational reports and documents that need to have real, measurable signoff processes in place. We have lots of information to cover today so let’s get started. TODO: Demo report sample report to show auditing signoffs for auditors.
  2. As I mentioned I am Richard Schoen, Director of Document Management Technologies at HelpSystems. I am part of the technical solutions group at HelpSystems bringing topics like this to our customers and prospective customers. I have over 27 years of background with IBMi, Windows and Linux platforms and managing and delivering forms and documents. My co-presenter today is Greg Schmidt. Good morning Greg……….why don’t you introduce your self and tell us a little about your role here at HelpSystems.
  3. Our agenda today will hopefully provide a good introduction to HelpSystems, RJS and our secure document approval processing solutions. We’ll provide a quick company overview of HelpSystems and its history. Then we’ll talk about the common problems companies encounter when the need arises to create approval processes Then we’ll provide an overview of our WebDocs document and approval processing software that can facilitate electronic signoffs. Then we will provide a short demo of the software in action. We will end with a few minutes of Q&A and a couple of polling questions. Feel free to enter your questions in the chat window as we go and I will address them towards the end of the webinar. Select “All Presenters” so the questions are directed to me. We’ll also plan to complete our session in 30-40 minutes so you have plenty of time to make your next important meeting. Also todays event will be recorded and you will receive a link after the webinar to share with anyone in your organization who couldn’t attend todays session.
  4. HelpSystems has been in business for over 32 years providing system management, business intelligence and security solutions for IBMi, Windows, Linux and AIX platforms. The RJS document management products joined the HelpSystems product brand portfolio in 2014. The RJS products focus on helping companies implement paperless process to capture, manage, deliver and secure their critical documents. Our WebDocs family of products help companies go paperless by providing several key document management components. ---------------------------------------------------- Our WebDocs family of products help companies go paperless by providing several key document management components such as: -Document scanning to capture paper documents such as AP invoices -Electronic Business Form Output generation software which can be used to generate documents such as invoices, purchase orders, statements, checks and more. -WebForms, our web based data capture software allows companies to capture data at the source of entry and eliminate re-keying of information. (Used often in AP, HR and other departments looking to turn paper forms into actionable data.) -SignHere Electronic Signature Capture – Capturing signatures on business documents such as invoices, receipts, proofs of delivery and bills of lading without printing. -DeliverNow Automated Report and Document Bursting and Delivery. If you’re planning to implement paperless process in any of your departments, chances are we have a solution.
  5. Our solution covers 3 core areas of a business Document Management Process Management Forms Management
  6. Document management – This focuses around capturing and managing scanned paper documents, electronic reports from IBMi and other systems, mfg drawings, email, inbound faxes and other electronic documents such as photos, videos and more. We can manage any document that can be created in a PC format.
  7. Forms management – Forms management covers two different but important areas. Input forms – We can take any paper based form and turn it into an online version where data can be captured. This is a great way to capture data right away without re-keying. Output forms – generating high quality business output documents such as invoices, purchase orders, statements, bills of lading, checks and more to reduce paper usage.
  8. Input forms – We can take any paper based form and turn it into an online version where data can be captured directly into a business system. This is a great way to capture form based data right away without re-keying. Output forms – generating high quality business output documents such as invoices, purchase orders, statements, bills of lading, checks and more to reduce paper usage. This is also the main topic of today’s webinar. If you’re interested in learning more about input forms and data capture, take a look at one of our recent webinars replays on capturing data without paper or feel free to reach out for a personalized presentation from me or one of our sales team members.
  9. Process management – Webdocs contains a built-in document routing system to provide the ability to electronically route documents to the right people for review and approval as well as electronic signature capture. Signatures can be captured via desktop software or web based forms that can be sent out via the web. Secure document signoffs and approvals will be the core area of focus for today’s webinar.
  10. These are some of the key issues companies face today when attempting to comply to audit requirements. Maybe you’re not generating any audit reports today. Or maybe you have implemented software such as Powertech, Policy Minder or one of our other security products, but we haven’t created an electronic approval process. We don’t want to re-print reports for handwritten approvals. We need to implement an electronic audit review process. We need a demonstrable audit review and approval process for our auditors. Audit documents need to be kept for years for compliance. Where should we keep our audit documents ? Without a manageable document archive, how can you adequately keep track of your security documents. We don’t want to build an audit and review process from scratch. Trying to build a secure document archive and audit process from scratch could take years.
  11. So we’re already generating security and audit reports so that’s a good start. Our documents also get generated in PDF format so they can’t be changed which is good. However this doesn’t really allow us to create a document approval and signoff process because the documents themselves cannot be signed or annotated. How do we put together a signoff process is we can’t sign or signed and protected documents ? Fortunately we will be demonstrating a way to create a secure signoff process for your documents today.
  12. So you may have already implemented audit or security software. You may even use one of our products such as Powertech, Policy Minder, Robot or other product to manage your operations and security processes. Or you might be generating security and audit reports from other software or processes. Often those documents are simply written to network folders or emailed to the security officer for review. Then copies of the reports get forwarded to the appropriate management team members for signoff or approval. Then the documents are mailed back to the security officer and so the process goes. While the process is somewhat paperless and automated it’s hard to figure out what the actual process is. What happens if the auditors start asking you to demonstrate your approval processes ? Red flags start popping up everywhere.
  13. This is how not to create a secure document signoff process. Approval documents printed Documents are signed Paper gets filed or document gets re-scanned Document then printed, signed and re-filed again and again….. With this type of process there are several document copies floating around and it’s hard to determine which is the reviewed version. If the audit report could get captured into a single secure location, links to the document can be sent around so there is only one master copy of the audit document.
  14. In our case we use different terminology to describe document management depending on the department where it will be used: Sometimes we talk about WebDocs as being an imaging or document management system used to capture and stored scanned image documents. While WebDocs is often used to manage scanned documents, the software can be utilized in many different ways. Especially when a business may already have a corporate approved standard product already in place for scanning documents or capturing reports. This is where WebDocs shines as a departmental of point solution to solve various business problems in the organization. We have helped implement WebDocs in many businesses where they may have an older imaging system such as Legato, Application Extender and others where we live alongside those applications solving a specific departmental need. Or WebDocs can become your corporate standard for managing system reports, forms and other documents in a single, secure repository. Accounts payable departments may think of WebDocs as a Smart AP invoice processing system by utilizing our scanning, OCR technology and smart routing to route documents around to various departments for GL coding and approvals, WebDocs manages the entire AP approval process from purchasing to payments. Our web forms technology can be coupled into the process to provide a lightweight purchasing approval process around non-PO based ordering when a company find that more than 50% of their purchases are made without approvals. HR departments can think of WebDocs as a place to hold all employee records, including electronic online applications, scanned paperwork and automatic system generated documents such as I9 and W4 and more. WebDocs offers a way to utilize the thousands of available PDF templates on government and other sites and automatically fill and extract live data from these forms. And our online form technology can capture employee applications and signatures. The goal is to capture the data once and then send it to the appropriate HR and employee systems such as timecard processing with Kronos and other applications and HR systems such as Oracle HCM, Taleo and other Human Capital Management systems. Manufacturing, engineering and distribution areas may utilize WebDocs to capture key customer orders, signed and unsigned shipping paperwork, proof of delivery, job information, work instructions, CAD drawings and more. Businesses may also think of WebDocs as a Report Management system to capture and manage all of their electronic reporting and business documents generated by their IBMi, Windows, Linux and AIX business systems. When capturing and routing documents for approvals, WebDocs can be thought of as an approval management system that captures, manages and routes documents for signoffs and approvals much like we mentioned when talking about managing security reporting and audit documents. WebDocs can also be thought of as a Forms Management system used to manage forms that get filled out online rather than via paper as they may today. HR applications, inspection reports, service orders, and expense reports are all candidates to be transformed from paper based forms to online actionable form processes. One thing to clarify about the WebDocs name is that even though we use the name WebDocs, the software can reside securely in your own data center on your own servers or in a cloud hosted data center if you desire.
  15. This is an example of what a secure signoff process might look like. New report documents are uploaded or captured automatically from output queues or directories. Documents automatically enter workflow review processes at capture time. Approvers view document approval routing inbox. Perform approvals and add comments. Document moved to next step of approval process. Audit approval comments stay with document forever.
  16. Reports get generated on IBMi or Windows based software. You could be using any security product, audit software or any application that can generate a PDF or other PC formatted document for signoffs. Any documents that can be generated or captured electronically is a candidate for secure signoff processes. As documents get generated they get routed into the WebDocs Secure Document Archive and then they are added to workflow routing processes so that all the appropriate approvers have a chance to sign off on the security reports. As approvals are applied, commentary can also be added to each documents history so that audit reports can then be generated to articulate which documents were sign off on and what commentary may have been added to signoff documents.
  17. We would be remiss is we didn’t mention that WebDocs can be integrated with most of the existing HelpSystems products to capture reports and documents for archival and approval processing. SEQUEL or Showcase are used to generate queries, reports and documents. PDF, Excel and other document types can be generated and routed to WebDocs for archival or online access and approvals. PowerTech or Skyview and other system audit reports and canbe routed for secure electronic signatures and approvals. Robot, Halcyon, Bytware, CCSS and system generated reports from any of our IBM i or non-i scheduling and automation software can be integrated into the WebDocs document archive. These could be job checklists, job reports and any of the output generated as reports or IFS documents. AutoMate, our Windows process automation software can generate, burst and stage documents for capturing to WebDocs or Sharepoint for filing or electronic signing processes. iForms can be used to generate business forms and documents such as invoices, bills of lading, proofs of delivery and more for electronic archiving and distribution via WebDocs. Your ERP and other audit, security and business applications generate output that can be archived for Hopefully hearing about the many ways in which WebDocs can be integrated to your internal processes for report archival, auditing and secure signoffs has stimulated your thoughts and you’re imagining how your company can create secure, auditable approval processes with WebDocs. We look forward to hearing your requirements and talking about your approval process needs.
  18. Now we’re going to take a quick look at a sample security signoff sequence. Greg will provide us with a short demo.
  19. OK, now we’re going to take time for a little Q&A. I will also show a poll with a couple of questions we can share with the group. When entering questions, please remember to Select “All Presenters” so your questions are directed to me. We have software that is not form HelpSystems. Can our documents be captured for approval process ? Absolutely. The WebDocs software is not limited to capturing documents fro many specific applications. It supports documents generated from any IBMi, Windows, Linux, AIX or MAC-OS based systems. You mentioned signing of secure PDF documents. If I want to physically sign non-secure PDF documents can I do it with with your software ? For non-secure PDF documents which means they are not password protected against changes, you can use Adobe Acrobat or our SignHere signature capture software to capture physical signatures and annotations on your PDF documents. SignHere is a great product to use for capturing physical signatures on documents, especially in areas such as highvolume manufacturing and distribution environments where paperwork needs to be signed. Can we initiate the creation of secure audit reports from our existing applications ? Most applications can print directly to PDF documents today. Simply print and capture to a PDF document in a monitored folder and the documents get captured and the audit process begins. With IBMi applications you can generate spool file documents or IFS documents and those documents can also get automatically captured and routed into an approval process with minimal effort.
  20. Make sure to mark the date for our 2016 user conference titled: ShiftIT which will take place here in Minneapolis from June 20th – 23rd. Go to helpsystems.com/shiftit to register. We look forward to connecting with you face to face and talking with you about your automation issues in 2016.
  21. Thanks for attending our webinar today. We hope you learned some helpful information to allow your company to start thinking about putting real and auditable processes around your security document signoffs so that you’re never caught by the auditors without a secure signoff process in place. Again make sure to mark the date for our 2016 user conference titled: ShiftIT which will take place here in Minneapolis from June 20th – 23rd. Go to helpsystems.com/shiftit or reach out to your sales rep and they can provide registration info. We look forward to connecting with you face to face in 2016. And of course if you have any additional questions on security signoffs, our forms or other document management technology, feel free to reach out to our sales team, Greg Schmidt or me and we will be happy to address your questions or provide a more in-depth technical demo. You will also receive a link to this recording so you can share this webinar with those in your company who could not attend today’s session. Again thanks for attending todays webinar. Have a great day and enjoy the rest of your week. Pause for a moment. Stop screen sharing Save polling answers.