Select Page
Epicor Multi-Site Migration:  A Moving Guide

Epicor Multi-Site Migration: A Moving Guide

Out of Epicor Multi-Site, Out of Mind

 

An Epicor multi-site implementation, whether moving from a single site to multiple sites, or vice versa, is a common phenomenon in the manufacturing and distribution world.  Companies and sites in Epicor are rarely in a “set it and forget it” proposition.  As companies evolve, the need to further break out or combine business units can become necessary.  As your business grows, you might wonder if your satellite facility should be considered part of your main site or if it should be a site of its own.  Or, in a similar Epicor multi-site configuration puzzle, you might wonder how to map out the consolidation of a two-company environment into a single-company installation.

 

Assume, for example, that a company has four sites (A, B, C, D) split across two companies (1 and 2) in the following manner:

  • Company 1:  Sites A, B, C
  • Company 2:  Site D

And the company desires to combine operations under a single operating unit, such that the lone site under company 2 would be absorbed under the operations of company 1:

  • Company 1:  Site A, B, C, D

Such a change may seem like simply a matter of converting existing data—of pointing all records from the old company and site to the new company and sites.  Alas, systems are often less than accommodating in allowing for historical transactions to be modified in this manner.

 

Epicor Multi-Site Implementation Recommended

 

Epicor offers no toolsets to “move” a site across companies.  No toolset currently exists that provides the ability to change the company context of all records in a single instance, as to point them to another company context.  Historical transactions don’t like having their keys modified, and such revisionist history is fraught with potential challenges, and thus not recommended.

 

The recommended best practice in such an Epicor multi-site implementation scenario is to reimplement site 2-D in Company 1.  This would involve the setup and configuration of the site and the transfer of setup, master file, and open transaction data into the new site, and the continuance of business operations from within this new site.  This would not include the loading of historical transactions—it would essentially be an act of starting fresh in the new company, as if the site were converted from a legacy system and not from Epicor.

 

To achieve Epicor site consolidation, as described above, a four-stage process can create the desired infrastructure:

  • Plan:  The planning stage finalizes scope and organization through assessment, planning, resource organization, scheduling, etc.  The resolution of conflicts in data, customization, or configuration will occur as part of the testing phase.  Scripts will be developed for the movement of data and customizations.
  • Architect:  The architect stage involves the setup and testing of an environment that would represent the future state deployment, and the elicitation and resolution of any gaps, issues, or conflicts that would come from the planned deployment.  Key activities are the development of the test environment, testing of new site deployment, and gap/issue resolution.
  • Validate:  The validate stage is used to verify that we can successfully execute a cutover and run the business as intended, as if we were in a live environment.
  • Stabilize:  This is the final, successful deployment of a new site at cutover.

 

To address the scenario described above, the following environment map would be recommended:

  • Test Environment:  The initial environment used to model the construction of the new site.
  • Pilot Environment:  The environment in which conference room pilot (CRP) validation occurs.
  • Live Environment:  The existing Live environment, which will be updated at the cutover of the new site.

 

In a traditional Epicor implementation, we go through a five-stage process:  Plan, Educate, Architect, Validate, Stabilize.  This conventional waterfall approach to implementing an ERP application does not adequately address a scenario where training is not required, and prototyping is centered less on the use of the system than it is on properly implementing and integrating an existing Epicor process into a different Epicor company.  As such, the methodology is somewhat simplified, considering the team is already well-versed in the application.

 

The environmental build, relative to the four-stage model described above, would be as follows:

 

Architect:

Initial Live Environment Setup:

  • Extract Setup information from 2-D.
  • Create New Site D in company 1.
  • Update Site configuration in 1-D.
  • Update Company configuration in company 1, as needed.

Test Environment Setup:

  • Build Test environment from copy of production.
  • Extract master file records from Company 2 (Live) and load into Company 1 (Test) and reconcile Conflicts as needed.
  • Extract open transaction records from Company 2 (Live) and load into Company 1 (Test) and reconcile conflicts as needed.
  • Extract open balances and open AR & AP from Company 2 (Live) and load into Company 1 (Pilot).
  • Perform user testing to verify functionality in Site 1-D and the effect of adding 1-D on sites 1-A, 1-B, and 1-C.

Verify:

Pilot Environment:

  • Build Pilot environment from copy of production.
  • Extract master file records from Company 2 (Live) and load into Company 1 (Pilot).
  • Extract open transaction records from Company 2 (Live) and load into Company 1 (Pilot).
  • Extract open balances and open AR & AP from Company 2 (Live) and load into Company 1 (Pilot).
  • Perform conference room pilot (CRP) event to verify functionality in Site 1-D and the effect of adding 1-D on sites 1-A, 1-B, and 1-C.

Stabilize:

Live Environment-Cutover:

  • Extract master file records from Company 2 (Live) and load into Company 1 (Live).
  • Extract open transaction records from Company 2 (Live) and load into Company 1 (Live).
  • Extract open balances and open AR & AP from Company 2 (Live) and load into Company 1 (Live).
  • Perform any ancillary cutover activities as required.
  • Resume operation in new environment.

 

Considerations

 

As with any project, there are a number of considerations that should be clarified at the onset of an Epicor multi-site migration.  The following assumptions have been made:

  • There are always minor data transformations needed when loading data into a new Company and Site, such as the new Company and Site IDs.  You should give consideration to any transformations above and beyond these basic adjustments:
    • Are there data transformations that will need to occur beyond the necessary changes to allow the data to function correctly and without conflict in the new company?
    • Are there changes to setup tables that will need to be mapped when loading master files and open transactions?
  • There is a necessity to identify who will be building test case scripts and who will be performing the necessary testing and validation—and this validation is twofold:
    • Validate the functionality of the new site within the existing company.
    • Confirm that the addition of the new site does not introduce any processing issues with any of the existing sites.
  • It is critical to identify a process for resolving conflicts—the addition of a new site may introduce conflicts with the existing Epicor implementation, and a resolution strategy should be devised at the project’s onset.

 

Conflicts and Conflict Resolution

 

Potential conflicts may exist between Company 1 and Company 2, and these may surface as a function of the “move” of Site 2-D into Company 1.  These may include the following:

  • Company configurations in Company 1 may not be in agreement with those of Company 2.
  • Security and menu settings in Company 1 may not be in agreement with those of Company 2.
  • Conflicts between customizations and/or reports may exist between Companies 1 and 2.
  • System Agent configuration conflicts may exist between Companies 1 and 2.
  • Setup Table conflicts may exist between Companies 1 and 2.
  • GL structure conflicts may exist between Companies 1 and 2.
  • Master File conflicts may exist between Companies 1 and 2.

 

Historical Data Access and Epicor Multi-Site Design

 

With any such migration, questions exist as to how historical data will be accessed.  As noted above, our recommended approach does not include the loading of historical transactional data.  In the current situation, the historical data from site D in Company 2 will continue to reside in the database, but the ability to modify the data will be removed at cutover.  Read-only access and report access could still be permitted, to provide access to historical data.  Additionally, the utilization of cross-company BAQs could be applied for reporting from Company 1 and consolidating datasets between the legacy site 2-D and the new site 1-D.

 

As companies expand, it’s common for new physical facilities to be spun up and incorporated into the existing Epicor application in some form or fashion.  In other cases, companies manage parallel business within the same space, and may decide they need to better break these out, as to keep their operating interests independent of one another.  In all possible scenarios, Epicor multi-site implementation can be tricky, demanding a thorough migration plan.

 

 

Looking to tweak your company/site configuration as part of an Epicor upgrade?  Learn more about multi-company and multi-site upgrades here.

Epicor ERP Upgrade Considerations for Data Dailies

Epicor ERP Upgrade Considerations for Data Dailies

The further away you get from the “new release” of a software, the more challenging an upgrade becomes, and this is especially true for Epicor ERP upgrade customers.  If you’re coming from a Progress 4GL business logic-based version, which would include anything earlier than version 10, such as Epicor’s 905 and 803 platforms, you might feel a little lost in all your options.  The need to move beyond Epicor’s legacy platform is obvious—the analog film of the old version is deteriorating on the reels.  But the move to Epicor’s E10 platform is more of an epic picture than it is an opening trailer.  Thus, it is important to storyboard the flow of the narrative from the old to the new, before the cameras roll, knowing that your plot armor will only take you through the first act of your Epicor ERP upgrade.

 

Two Epicor ERP Upgrade Paths

 

The hero’s journey in any good film starts with a call to action, with a road diverged in a wood where the protagonist must choose one of two paths.  In general, you can consider any move from a legacy version of a software to an updated version to be an upgrade.  But there are two distinct paths for moving from your legacy version to E10, and these greatly affect the nature of the final implementation.

 

Path 1.  A straight, utility-driven upgrade from the legacy to the current version:  In a straight upgrade, a utility converts the data from the legacy version, generating an E10 database that adheres to the structure of version 10 schema.

 

Path 2.  A reimplementation:  This is an alternative method for moving to E10 from the legacy version, but this method does not actually upgrade the legacy data to make the E10 database.  Rather, the upgrading company reimplements the application in E10, normally using the legacy data—filtered, scrubbed and reworked—as the starting point.

 

Data as the Villain… or the Hero?

 

Regardless of your opening scene, one of the most important considerations in any Epicor ERP upgrade is what to do with your data.  Companies can have one of many data challenges as they anticipate an Epicor upgrade.  It is not uncommon for a company’s current Epicor implementation, along with all its legacy data, to be handed down from a previous administration.  A lot of staff changes over ten years, for example, can leave a company with a system that has a setup and configuration at odds with their current orientation.  In such cases, a given company may wish to have another shot at configuring the application—to undo some of the decisions of the past.

 

Some companies unfortunately inherit a legacy system with data that has been carelessly maintained and is thus dirty beyond recognition.  In these cases, customers may look to either clean up the data or cut it entirely.  In other cases, significant changes to the business may have led to an inordinate number of part, customer, or supplier records that are obsolete.  While these might have historical value, they may also unduly clutter the database and place the company in a no-win situation.  In extreme cases, the company may even have a company and site structure that has evolved to be radically different from what is depicted in the Epicor application.

 

The data of an ERP system can be broken up into a number of classes:

  • Setup data:  This refers to the foundational data that underlies the setup of subsequent master file records.  Examples of setup data might include part classes, product groups, buyers, sales persons, etc.
  • Master file data:  This normally refers to the three core master files in any ERP system—the part master, the supplier master, and the customer master.  Subsequent master files may also need to be set up that relate to the extension or relation of these master file records, such as supplier or customer part price lists.
  • Live transactional data:  This refers to the open transactions in your system, such as purchase orders, sales orders, jobs, and invoices.  The decision as to whether to reimplement or upgrade greatly affects how these are to be handled, given that in an Epicor ERP upgrade they come along as part of the ride, whereas in a reimplementation they would need to be loaded in the style of a new install.
  • Historical data:  Historical data refers to all of the transactions that have been processed in the past and are no longer active, and would include purchase orders, sales orders, jobs, and invoices that have long since been closed.

From Classic to New Release

 

In a straight Epicor upgrade, the data from the legacy version is updated and fine-tuned to fit into the version 10 schema.  In such a situation, limited changes can be made to setup and master file data—you get what you had in the legacy version, only now it’s in version 10.  Tweaks can be made—new setup files can be defined and new parts, customers, and suppliers can be defined that replace or supplement their legacy analogues.  But any data that has been transacted against remains in the database.  It can be inactivated, but it’s still there, and some customers have a problem with this much clutter.  Depending on the degree of the issues noted above, this may or may not be a big deal.  Also, one of the upsides of a straight ERP upgrade is the ability to retain historical data with minimal effort.

 

Given the potential issues with data that a company may face, reimplementation offers the ability to cleanly address these challenges.  It is common for businesses to transform significantly after their original implementations.  They may have a number of legacy companies, sites and warehouses that are no longer needed and may even burden the database and create confusion internally.  Customers may also wish to make radical changes to their company or site structures as a function of the upgrade.  In these cases, consideration should be made to performing a reimplementation in lieu of an E10 upgrade.

 

Typecasting your Data Forecasting

 

When you perform a straight Epicor upgrade, you are accepting that you will take all of your past performances with you, and this may create challenges that impede your future state aspirations.  Conversely, dumping your legacy database also involves leaving behind the historical data that amounts to the history of your business.  Epicor’s E10 ERP software is a big step up from its 905 and 803 antecedents, and with each point release, the gap between the new and legacy versions widens further.  Legacy Epicor customers looking to move their businesses forward will need to transition to a modern ERP platform, and Epicor’s E10 application provides a compelling case.  And when making this critical Epicor ERP upgrade rewrite, customers will do well to consider their data dailies.

 

 

 

Looking for a good storyline for your Epicor upgrade?  Learn more about E10 from our Epicor ERP team.  

Endpoint Security: A Powerful Endgame

Endpoint Security: A Powerful Endgame

 

You already know you need protection from the cybersecurity threats circulating the market, but you might not have the time to know the specifics—like what endpoint security is or why you need it.  If you have devices accessing a network, then you have an endpoint that needs protection.  This elusive endpoint is simply any device that interacts with your network—the touchpoint between your network’s perimeter and the outside world.  The bring-your-own-device (BYOD) movement that’s currently shaping the business world makes network security challenging because it creates a high demand for comprehensive endpoint security.  You need to protect your customers and your business by protecting your team, and this begins with endpoint security.

 

 

 

Bring Your Own Disaster

 

The BYOD movement introduces a number of specific challenges in securing networks.  The proliferation of devices interacting with a network, both in kind and in number, increases the number of endpoints and thus also increases the potential vulnerability of a network.  Each new endpoint is a potentially exploitable gateway.  The propagation of vulnerabilities demands a solution that can address this new circumstance.  The solution that companies are increasingly utilizing to address their evolving needs has come to be known as endpoint security.  Endpoint security helps ensure that all devices interacting with a network are compliant to the necessary security standards, protecting both the network and the devices themselves.

 

Endpoint security differs from traditional antivirus in the way that it detects and responds to threats.  Traditional antivirus operates by comparing a program’s signature to a database of known malicious programs.  Programs flagged as malicious would be stopped by the antivirus agent.  This method of threat prevention is, by design, a step behind the attackers.  Traditional antivirus can only detect malicious programs that have already been logged in the antivirus agent’s database.  This creates problems in detecting new threats—what are sometimes called zero-day attacks.  This also creates problems with newer “signatureless” attack methodologies that work to obscure their signatures, to work around the known signatures that antivirus looks for.

 

The question here is one of prevention vs. one of detection:  antivirus focuses on preventing attacks.  While this sounds logical, the tools available at its disposal, as we have seen, are limited.  Should a malware attack slip through, antivirus is ill-equipped to deal with it once it’s inside the network.  This brings in the need for more dynamic, behavioral-based detection methodologies that can leverage artificial intelligence and machine learning to detect suspicious application behaviors and react accordingly.

 

Leveling Up

 

Modern endpoint security platforms operate in a multi-level manner, protecting networks and network devices in multiple phases of vulnerability and response.

  • The pre-execution phase: This level is for threats as they enter the network.
  • The on-execution phase: This step is for threats that have entered the network and are in the process of acting out their program logic.
  • The post-execution phase: This involves the steps to mollify threats that have executed.

Combining static prevention with dynamic detection, modern endpoint security platforms leverage machine learning to detect threats on execution.  This becomes beneficial, not only for signatureless attacks, but also for “file-less” attacks that are operating exclusively in memory.

As part of our EstesCloud security stack, we work with several vendors to provide broad and comprehensive endpoint detection and response.  AI, combined with our SOC (Security Operations Center), provides the level of endpoint security that cannot be addressed by traditional antivirus.  Our cybersecurity solution comes with a strong warranty—cyber threat protection provides you with financial support of $1,000 per endpoint, or up to $1 million per company, securing you against the financial implications of a ransomware attack if your company indeed suffers an attack and our team is unable to block or remediate the effects.

 

 

 

Is your company in need of a security assessment?  Learn more about how EstesGroup can protect your business.

Remote Epicor CRP: A Skeleton Key

Remote Epicor CRP: A Skeleton Key

When Your E10 Conference Room Pilot Feels Like Space Exploration

 

Conducting a successful Epicor CRP remotely is a lot like doing one in person—except that nobody’s in the same room.  Customers suddenly working remotely in the midst of an Epicor implementation may feel like their project happened long, long ago in a galaxy far, far away.  As such, many have asked us for guidance on whether to proceed with their project or to put it on hold until their team returns to on-site infrastructure.  With a little adjustment, companies can proceed with their Epicor implementation and keep their team’s momentum.  As much as I like to get in the customer’s on-site orbit, a few little changes when orchestrating a remote Epicor CRP will go a long way since the fundamental implementation principles do not change.

 

 

 

Here are 5 recommendations for conducting a remote Epicor CRP event:

 

1)  Place extra effort on the preparation stage.

 

A number of planning steps can be performed before the event.  This may include level-setting expectations of the core team and end users.   For many of the attendees, this might be the first time they have gone through a systematic verification event such as a CRP.  Provide them with an understanding of the logic behind such an event and an idea of how the event will be conducted.

 

Consider which roles will be required and who will be performing them: Who will be the facilitator?  Who will be keeping score against the test script to confirm which steps have or have not passed testing?  Who will document discoveries, issues, gaps, decisions, or general notes that extend beyond the test script?  Having these roles defined will help build traction early.

 

Also, make sure that team members and users have access to the necessary documents (test scripts, agenda, end user procedures) prior to the event.  Make sure that technical steps have been validated, and work with the IT department as necessary to ensure web conferencing software is working as expected, and that team members will be able to access the application remotely.  Consider performing a quick dry run with a subset of the team to ensure the event can be conducted as intended.

 

2)  Start with a well-defined set of scenarios and a detailed testing script.

 

A CRP is only as successful as its completeness—in covering the key business scenarios that support the organization.  Companies implementing Epicor vary to the degree in which they document and define their scenarios prior to testing them in a milestone event such as a CRP.  A remote Epicor CRP requires a better-defined test script.  If you plan to bring in new users to try out the processes you’ve defined, you will want the test cases to be well-defined to avoid the ambiguity that can encumber a remote testing session.

 

In on-site situations, the assistance of the core team members, who have been living and breathing these scenarios on a daily basis, can help drive through the confusion that could be caused by a loosely defined testing script.  It becomes difficult in remote situations to provide this kind of guidance, so plan it out ahead of time.

 

3)  Organize your testing with a detailed agenda.

 

Once the scripts have been solidified, organize their execution within your remote Epicor CRP with a detailed day-by-day agenda.  This helps clarify expectations and becomes a tangible roadmap that everyone can follow for the week’s event.  For each day, identify scripts to be covered, the timeframe for which to cover them, and the necessary attendees.  This is especially important with end users that you will be bringing into the event, as their attendance will likely be for smaller and more-specific blocks of time.  Given that an individual’s availability may be compromised during this event, work with the project manager, the consultants, and the core team to logically arrange activities as to allow for a logical flow of events and an efficient use of team member and user resources.

 

4)  Make sure Epicor EUPs are well-defined and complete.

 

End User Procedures are often overlooked when entering a CRP, and we’ve seen companies conduct successful on-site Epicor Conference Room Pilot events where they successfully verify their processes in the absence of detailed click-by-click steps.  Consultant knowledge and team member capabilities often come into play here in guiding end users through processes.  Companies facing a remote CRP do not possess this luxury.  As such, Epicor EUPs need to be buttoned down in order to conduct a successful CRP.  It’s always good to introduce general users to a CRP event.  In a remote CRP, you will know with certainty whether you’ve given your user community sufficient instructions to do their jobs.

 

5)  Place extra emphasis on communication when conducting your event.

 

Due to the cross-functional nature of ERP systems, and the importance of confirming that a configured system operates properly across functional areas, communication is a pillar of any such event.  This is magnified when performing a remote Epicor CRP.  Open, transparent communication is essential.  Remember that in a remote Conference Room Pilot, it is hard to read non-verbal cues, and the team needs to be cognizant of such communication challenges.  Often it can be beneficial at the onset of the event to come to an agreement with the team on the ground rules to be followed, specifically when it comes to agreed-upon guidelines for things like clarifying a scenario before moving to the next, or deciding when to call “time-out” when a discussion is going down a bad path.

 

Engagement can also be an issue, so make sure your team stays engaged.  If you’ve been invited to a session, the assumption is that you will stay engaged in it.  Look to try out different techniques to retain engagement, such as taking frequent breaks, encouraging individual feedback, or leveraging the chat functionality or the digital whiteboard of your web conferencing software to keep people focused.  Also, if you are the facilitator, the project manager, or the consultant in a remote CRP, it is important to know your audience.  An understanding of team members’ general proclivities when it comes to working in situations with a greater degree of ambiguity can go a long way to heading off conflicts and frustration or preventing rabbit-hole adventures.

 

 

Epicor ERP implementations are more of a walk on the moon than a walk in the park.

 

These challenges may seem insurmountable in light of circumstances that mandate remote activity.  But it has been our experience thus far that a great deal of progress can continue, in spite of a decentralized team.  As it relates to successfully preparing for and conducting a remote Epicor Conference Room Pilot, we have found the same to be the case—with a little extra work in the areas of planning and preparation, and some adjusted expectations on how team members will interact with each other, an event as complex and rigorous as a remote Epicor CRP can be successfully conducted.

 

A successful remote E10 CRP relies on many of the same principles that underlie an on-site event, but these steps need to be conducted with even more diligence to ensure the success of remote implementation.  In on-site Conference Room Pilot events, it is far too easy for the consultant or the core team to “muscle” their way through the event.  Remote CRP events do not have this luxury, as the influence of any one individual is minimized due to the remote nature of the event.  Use this as a blessing: tighten up the organization and use your remote Epicor Conference Room Pilot as a launch pad to boldly go where no project has gone before.

 

 

 

Are you working through an Epicor ERP implementation?  Do you need some guidance on the setup of the part master?  Successful part master setup is critical for project success.  Download our white paper for some recommendations.

Epicor Functionality in the Admin Console, Unwrapped

Epicor Functionality in the Admin Console, Unwrapped

New User Access, New E10 Functionality

 

Managing the Epicor functionality available to the user community is one key role of an Epicor Administrator.  In this light, it’s not uncommon for customers using the Epicor application to continue to add new modules.  An understanding of Epicor 10’s functionality develops over time, as administrators and users learn the full capabilities of E10 and how ERP can help run a business.  Once new E10 modules are licensed, and once the license is installed, users will need to have an administrator enable access through the Epicor Admin Console in order to allow users to make use of this new Epicor functionality.

 

Let’s walk through the steps you need to know to effectively manage newly installed Epicor modules.

 

In order to enable a new module, you will first need to be logged into the application server, which is the box where your Epicor application is installed.

 

Once on the application server, open the “Epicor Administration Console”:

 

 

Once the Epicor Admin Console is open, perform the following steps to enable the desired module:

  • Open the “Server Management” node in the left tree view and locate the Epicor instance in which you wish to enable the new module.  In the example below, it is the “Demo” instance.
  • Open up the E10 instance node and click on the “Licensing” node beneath it—this will display the license file in the panel to the right of the tree view.
  • Double-click the license file.  This will raise a little properties window.
  • Navigate to the “Modules” tab.  Sort by module name and locate the module you wish to enable.  Check the “Enabled” box to enable the module in question.
  • Click the “OK” button to commit the change:

Once that is accomplished, a user who has just logged into the Epicor application should see the new module available in the menu:

 

 

If your team is making suboptimal use of your Epicor application, you can easily enable some new functionality through the Epicor Admin Console, and they’ll be licensed to thrive.  There are several ancillary modules that can help extend the benefits of the Epicor application throughout your business.  Epicor has plenty of goodies in the basket.  The Epicor Admin Console is the tool for unwrapping these bonbons, enabling delectable Epicor functionality.  Bonbon appétit!

 

 

Not sure what specific Epicor functionality to enable?  EstesGroup specializes in Epicor ERP, and our consultants can help your users make the most of your Epicor License.