Select Page
Epicor ERP Multi-Level Pegging & Supply Chain Management

Epicor ERP Multi-Level Pegging & Supply Chain Management

Blessings and Curses of Supply Chain Inventory

 

Inventory. That word can hold a lot of different meanings for manufacturing companies. Production Personnel see it as the ingredients for making their products. Supply Chain Professionals base much of their career on it. Accountants see it a major corporate cost. Executives see it as both an expense and potential sales.

 

All of these views are correct and each hold merit. Without inventory, parts can’t be built. Without parts to sell, companies can’t grow. As Inventory can represent a significant expense, managing these costs efficiently can increase the bottom line and offer significant competitive advantages.

 

The key to an optimized inventory is only buying what you need, when you need it. While simple in concept, the execution can be very, very difficult. For those manufacturing companies that manufacture products with a deep Bill of Material, managing the what and when of raw materials can become a monumental undertaking.

 

It is that very example that Epicor can provide a powerful tool with their Multi-Level Pegging Process. Going beyond just looking at the material demands of the top-level assembly, the multi-level pegging process will calculate the material needs of all of the indented bill-of-materials on a job. Have a part that takes a manufactured sub-assembly, and that sub-assembly takes another sub-assembly to make it? The Multi-level pegging process will capture all of those materials demands. And Epicor displays all the pertinent information regarding those materials on their built-in Multi-level Pegging Dashboard.

 

Strategic information such as the quantities needed, and material status is provided in an easy to read format. Additional details such as is the material currently available, is it on order, or has a  been generated are also displayed.

For those companies wishing to optimize their inventory, having the materials at the right quantities at the right time, the Epicor Multi-Level Pegging process provides a powerful tool for manufacturing and material professionals to achieve that lofty goal.

 

This functionality is only part of what the Multi-Level Pegging process can do for your company.

 

Do you have questions about Multi-Level Pegging and Supply Chain Management? Let us know, Contact Us Today.

Epicor ERP is a complex software and at the heart of the application is Part Setup.

Is your Epicor ERP designed with Part Setup Methods and Manufacturing Best Practices in mind?

Find out by downloading the Parts Setup Best Practices PDF today.

In-House Hosting vs. Cloud Based Hosting

In-House Hosting vs. Cloud Based Hosting

If you’ve recently decided to implement an ERP system like Epicor ERP at your company, you have a couple of options for where to deploy the system. You can either have it hosted on your in-house server or it can be hosted on a cloud server. Here is a look at each of these options.

In-House Servers

In-house servers are a more traditional route to providing the software your team needs to get its job done. The server is physically located at your place of business. Some of the reasons why this is still the best answer for many companies include:

  • You maintain complete control of the server. You are not reliant on the cloud for your security, but rather are able to find a custom solution to handle your security needs on your own
  • You can upgrade your system any time you’d like without paying additional hosting fees
  • All of your critical data remains in-house, with no access by third-parties

Unfortunately, there are some downsides to in-house hosting as well, including:

  • A large upfront investment in hardware and infrastructure
  • Space for your server room is required, as well as IT support
  • You have no guarantees regarding uptime or the time it takes to recover your data
  • You are responsible for backing up your data and you may be more likely to suffer data loss if there is a disaster in your area

Hosted Cloud Servers

Hosted cloud services allow you the opportunity to have access to the same software you would use with an in-house server, yet the software is accessible in the cloud. The benefits of host-based cloud services include:

  • The ability for your staff to access files even when they’re out of the office. Cloud-based services are available anywhere where there is an internet connection
  • You avoid the stress and expense of maintaining an in-house server, including the expense of having IT staff
  • Your host provides security, a disaster recovery plan, and an uptime guarantee
  • Hosted cloud services are scalable, meaning you pay for the services you need, when you need them, rather than shelling out money for services you don’t need simply because they were available in your big-box solution
  • You can initiate backup and restore processes from anywhere. Data on the cloud can be backed up in intervals as short as every fifteen minutes, which minimizes the potential for data loss
  • Your host will provide upgrades when they become available, ensuring that you’re using the newest technology available

The downside to hosted cloud servers includes:

  • The inability to access your files if your internet is down
  • You must pay a monthly hosting fee for the service
  • You may be limited on the amount of data and files you can store due to storage availability and cost

Which is Better?

Which solution is best for you depends greatly on the size of your business, the potential for growth, and the industry you’re in. If you have limited funds for investing in IT staff or infrastructure, or you don’t want the stress of maintaining your own server, a hosted cloud server may be the ideal solution for you. However, if you wish to be in control of your server, or if you deal with a lot of sensitive information — such as customer health records or financial data — and don’t feel comfortable with allowing a third-party to access that information, you may fare better with hosted services in-house.

Conclusion

EstesGroup is pleased to provide expert assistance in determining whether your business is best served by hosted cloud services or hosted services on your in-house server. Contact us today so we can begin exploring your options with you.

 

Download our Epicor ERP On-Premise (In-House) vs Cloud Hosted Calculator by filling out the form.

 

5 Ways EstesGroup Helps with Your CMMC Compliance

5 Ways EstesGroup Helps with Your CMMC Compliance

You might be reading this post if you are researching Cybersecurity Maturity Model Certification (CMMC), your company needs to become compliant, or your company is already compliant with CMMC but you have need of more IT services. In 2019 the Department of Defense announced a new cybersecurity protocol named CMMC that all DoD contractors (and some of their supply chains) would need to adhere to starting in 2020. There are 5 Levels of CMMC Certification, and EstesGroup can be an asset to companies in any of the levels.

 

5 Ways EstesGroup Helps with Your CMMC Compliance

  1. EstesGroup helps you identify the technology and/or services you need to meet your CMMC Level Requirements.  
  2. EstesGroup can improve your Process Maturity by helping evaluate your Procedures, Policies, or Practices. Once we’ve reviewed those processes, we can help update them to ensure you meet your CMMC Level and other compliance requirements. 
  3. There are 17 Domains that CMMC is built on. EstesGroup has the experience, tools, and services to support your business across nearly all of these domains.  
    • EstesGroup routinely deploys tools and managed services that directly support these CMMC domains: 
      • Access Control, Asset Management, Audit and Accountability, Configuration Management, Identification and Authentication, Maintenance, Recovery, Risk Management, Security Assessment, Situational Awareness, Systems and Communications Protection, and System and Information Integrity. 
    • EstesGroup can consult on and support technology used in these domains as well, but these domains typically require internal personnel or a third party on-site.  
      • Awareness and Training, Incident Response, Media Protection, Personnel Security, Physical Protection, and Risk Management 
  4. EstesGroup Managed Services (ERP Hosting ECHO & Managed IT) employ many of the standard Cybersecurity measures required for CMMC. We regularly monitor our internal and client assets for threats, perform preventative maintenance, and update technology or processes to meet or exceed cybersecurity requirements.  
  5. EstesCloud Hosting (ECHO) services enable many CMMC requirements without significant impact to you, your users, or your bottom line. By hosting your servers or software solutions in a managed cloud environment, you can compartmentalize your compliant systems and protect them at the highest CMMC levels, without locking down your whole office. For more details, see our page on EstesCloud Hosting for Aerospace & Defense  

 

 

To Learn about CMMC, read our blog What is CMMC: Cybersecurity Maturity Model Certification?”

 

EstesGroup is a Managed Service Provider who works with Manufacturing and Distribution companies by providing: ERP Hosting (ECHO), Managed IT, Epicor ERP, and Prophet 21 ERP services.

 

Have questions about CMMC or do you want more information on how EstesGroup makes companies more secure? Contact Us or fill out the form below.

 

What is CMMC: Cybersecurity Maturity Model Certification?

What is CMMC: Cybersecurity Maturity Model Certification?

CMMC: The Looming Cyber-Security Certification that Affects 60,000+ Companies. 

 

In 2019, the U. S. Department of Defense (DoD) announced a new security protocol program for contractors, called Cybersecurity Maturity Model Certification (CMMC). CMMC is a DoD Certification process that lays out a contractor’s security requirements and it is estimated that between 60,000-70,000 companies will need to become CMMC compliant in the next 1-3 years 

 

CMMC is basically a combination and addition to existing regulations in 48 Code of Federal Regulations (CFR) 52.204-21 and the Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012, and includes practices from National Institute and Technology (NIST) 800-171, the United Kingdoms’ Cyber Essentials, and Australia’s Essential Eight requirements. International Traffic in Arms Regulations (ITAR) will remain a separate certification from CMMC; though companies that are ITAR Compliant will need to adhere to CMMC as well. 

 

CMMC Version 1.0 was released late January 2020. To view the latest CMMC document, visit the CMMC DoD site. 

 

CMMC Notables 

  • There are 5 Levels of security maturity process (basic is 1 and most stringent is 5) 
  • Any company who directly or even some who indirectly does business with DoD will adhere to CMMC – that means direct DoD contractors and high level CMMC companies’ supply chains must adhere to at minimum base level requirements 
  • No Self-Assessment (unlike NIST) Companies need to get certified through a qualified auditing firm 
  • DoD will publish all contractor’s certification levels requirements 

Is My Business Affected by CMMC? 

 

This is easily answered with a 2-part question: 1, is your business a direct contractor to the DOD, or 2, does your business do business with a company that is a contractor to the DoD*? If you answered “yes” to question 1, then your business will need to be CMMC compliant. If you answered “yes” to number two, then it is very probable that your company will need to be CMMC compliant. 

What are the CMMC Levels? 

  • Level 1 – “Basic Cyber Hygiene”  
    • Antivirus 
    • Meet safeguard requirements of 48 CFR 52.204-21 
    • Companies might be required to provide Federal Contract Information (FCI) 
  • Level 2 – “Intermediate Cyber Hygiene” 
    • Risk Management 
    • Cybersecurity Continuity plan 
    • User awareness and training 
    • Standard Operating Procedures (SOP) documented 
    • Back-Up / Disaster Recovery (BDR) 
  • Level 3 – “Good Cyber Hygiene”
    • Systems Multi-factor Authentication 
    • Security Compliance with all NIST SP 800-171 Rev 1 Requirements 
    • Security to defend against Advanced Persistent Threats (APTs) 
    • Share incident reports if company subject to DFARS 252.204-7012 
  • Level 4 – “Proactive” 
    • Network Segmentation 
    • Detonation Chambers 
    • Mobile device inclusion 
    • Use of DLP Technologies 
    • Adapt security as needed to address changing tactics, techniques, and procedures (TTPs) in use by APTs 
    • Review & document effectiveness and report to high-level management 
    • Supply Chain Risk Consideration* 
  • Level 5 – “Advanced / Progressive” 
    • 24/7 Security Operations Center (SOC) Operation 
    • Device authentication 
    • Cyber maneuver operations 
    • Organization-wide standardized implementation of security protocols 
    • Real-time assets tracking 

One important thing to note about CMMC, is that unlike NIST and other current certifications, CMMC will require certification from an authorized 3rd Party CMMC authorized certification company. Currently, most companies can self-certify for DoD-related securities. EstesGroup is not a CMMC Certification Company, but we can help companies prepare and get their security up to requirements.

For more specifics on CMMC, access the latest DoD’s CMMC Revision.

 

Learn more about CMMC with 5 Ways EstesGroup Helps with Your CMMC Compliance

 

Do you have questions of CMMC or how EstesGroup can help your company with CMMC? You can Contact Us or make a comment in the form below.

 

Configuring Epicor 10 ERP to Launch a Form’s Custom Version

Configuring Epicor 10 ERP to Launch a Form’s Custom Version

Making a form custom version in Epicor ERP gives businesses the information and flexibility they need to succeed. 

 

While administering our ECHO Epicor Hosting platform, we’ve had customers frequently ask us to help them configure the system to utilize a customized version of an entry form or tracker in all instances of the application.  At the menu level, this is rudimentary—locate all instances of the form in question and be sure to select the appropriate customization layer.  But there are times specifically when the customer wants the custom form to surface either when launching from another form using the handy “open with” functionality, or else when launching a form from the MES interface, and handling these cases requires additional setup activities.   

 

In the following example, I went through the steps of creating a customized version of Epicor 10 ERP’s Job Tracker, and then set up the system to launch the custom version using “open with” and MES. 

 

First, I created a simple customization of the Job Tracker Form: 

Nextwhile still in developer mode, I tried to open the Job Tracker from Job Entry, using the “Open With…” capability: 

When trying to perform an “Open With…” in developer mode, the system presents the Process Calling information, which denotes the specific Menu ID (JCGO3003).  It is this menu ID that is called when performing an “Open With“: 

located the menu ID (JCGO3003) in menu maintenance, and bound my customization to that specific menu ID: 

Once the customization has been bound to the primary menu ID, launching the Job Tracker from any other form (such as the Job Receipt to Inventory form)… 

…will launch the customized version of the form: 

Even launching the form from MES… 

will now bring up the custom version: 

In working with our Epicor ERP hosted customers, we’ve found that the accumulation of simple adjustments, such as the one described above, can greatly improve the user experience.

 

Are you looking to make better use of your Epicor application?  Give us a call or let us know in the form below.