leanIX Blog | IT Management - clever and smart

September 15, 2016

IT Security Management - an EA-driven approach with LeanIX Survey

As the requirements mentioned in our previous posts in our series on IT Security Management with LeanIX Survey clarify, a purely technical approach alone is not enough. In the current business environment, it will hardly be possible anymore to completely seal off one’s own IT landscape. Companies should instead follow a lean IT security management approach that makes it possible for them to iteratively improve their IT security:

September 12, 2016

LeanIX captures first prize at the 2016 Pirate Summit

Founder's presentation proves victorious during "Walk the plank" pitch 


LeanIX founders André Christ and Jörg G. Beyer proudly present the 1st prize
1,200 start-ups from 40 countries applied to present their products in front of a top-class jury during the Pirate Summit Global Tour. At the final round in Cologne on 8 September 2016, LeanIX managed to sail to victory with their pitch "Helping companies to build great IT architectures".

September 8, 2016

Digital Transformation and IT Security Management

The short- and long-term effects of inadequate IT security
In the third of our articles on IT Security Management with LeanIX Survey, we'll examine the great impact of digitization on IT security at a company. When customers become digital customers, for example, this means that sensitive customer data is transferred into online systems which require special protection. Furthermore, companies are expected to become increasingly “open”. As a result of new work concepts such as a home office, mobile computing and “Bring Your Own Device (BYOD)”, access to company data is provided on end devices whose security aspects are increasingly difficult for the company to control. Additionally, cross-company supply chains are leading to much closer networking with customers and business partners in the course of Industry 4.0 in a wide range of business processes (acquisition, production, sales, logistics). But this also means that the customers and suppliers are partially responsible for the protection of these systems. This makes professional IT security management all the more important.

September 1, 2016

IT Security Management with Surveys: Case Study

Regular IT security audit in the finance industry

In the second article in our series on the use of surveys for IT Security, we are looking at a real-life case study. The company in our case study, which operates internationally in the finance sector, had followed an elaborate and work-intensive IT security process in the past. The data required for the regularly created IT security audit was manually entered in Excel sheets from several source systems, sent to various experts via email, collected again and finally consolidated into a report by hand. This process – and the work associated with it – was used for hundreds of applications. Due to the long response times and great manual effort, weeks would often pass between the survey and the analysis. The result: Information that functioned as the foundation for the company's internal compliance audits and IT security information for external interest groups was often several weeks old by the time it was used.