Search for topics or resources
Enter your search below and hit enter or click the search icon.
August 19th, 2025
2 min read
Native JD Edwards (JDE) security provides strong foundational tools, but many organizations are turning to third-party solutions like All Out Security and Q Software (Pathlock) to enhance compliance, streamline audits, and simplify security management. In this episode of Not Your Grandpa’s JD Edwards, Brian Connor from ERP Suites explains the differences between native and third-party tools, their pros and cons, and why ease of use, compliance reporting, and flexibility often drive companies toward bolt-on solutions.
Introduction
Security Options in JD Edwards
Native JD Edwards Security: Strengths and Limitations
Third-Party Tools: All Out Security and Q Software
How Third-Party Tools Support Compliance and Audits
Implementation and Setup Differences
Ongoing Change Control and Maintenance
Cost, Training, and Resource Considerations
Common Mistakes and Misunderstandings
Practical Differences Between All Out and Q Software
Conclusion and Call to Action
Data security in JD Edwards is more critical than ever. While native security tools are powerful, businesses often struggle with audit readiness and compliance reporting. Brian Connor, Director of JDE Security Practice at ERP Suites, shares insights on native vs. third-party solutions and what companies should consider when designing their security strategy.
JDE users have three main options:
Native JDE Tools – Security Workbench, role assignments, and UTO security.
Third-Party Tools – All Out Security and Q Software (Pathlock).
Custom Solutions – Homegrown interfaces built by CNCs or developers.
Strengths:
Provides complete coverage for securing access
Supports role assignments and hierarchy-based control
Limitations:
Less intuitive for setup and maintenance
Requires training and familiarity
Troubleshooting and change management can be time-intensive
All Out Security:
Writes directly to native JDE tables
Fast installation (about an hour)
Intuitive interface and rapid adoption
Q Software (Pathlock):
Uses separate Q tables, publishing changes to JDE
Installation and upgrades are more time-intensive
Strong compliance reporting but requires more planning
Provide push-button audit reports in PDF format (auditor-preferred)
Simplify segregation of duties (SoD) analysis
Reduce time spent pulling, formatting, and validating security data
Enhance transparency for internal and external auditors
All Out Security: Installed and running in about an hour. Minimal extra tables. Simple for training and adoption.
Q Software: Requires a full-day installation with custom business functions and additional tables. More complex upgrades.
Native Tools: Require manual, time-consuming updates.
All Out Security: Provides a “Supergrid” for bulk updates and integrated change control with approval workflows.
Q Software: Allows testing in external tables before publishing but requires careful synchronization.
ERP Suites offers fixed-fee pricing for training, installation, and dashboard setup.
Training typically spans 2–4 days, depending on user experience.
Companies can choose between full-service implementation or a “train-the-trainer” model for long-term independence.
Implementing without a clear plan or strategy
Expecting one tool to behave like another
Underestimating training and change management needs
Failing to document security policies across teams
All Out: Faster implementation, easier upgrades, more flexible, integrates directly with JDE.
Q Software: Strong compliance tools but more complex, requires exclusive use of Q Software for changes.
Key takeaway: Match the tool to your company’s culture, processes, and priorities.
Whether you rely on native JDE tools or adopt third-party solutions, a clear strategy and the right toolset can transform your security management, making compliance audits faster and less stressful.
ERP Suites helps companies evaluate and implement the best-fit security solution for their environment. Visit ERP.Suites.com to connect with Brian and the security team for tailored guidance.
If this episode sparked new ideas for your security strategy, be sure to subscribe, share, and review Not Your Grandpa’s JD Edwards.
Topics: