leanIX Blog | IT Management - clever and smart

October 14, 2016

EA Connect Day 2016

With more than 100 participants, LeanIX establishes a day solely for the international IT Architecture Scene

On October the 6th, LeanIX hosted the 3rd EA Connect Day at the Zalando Innovation Lab in Berlin with over 100 attendees! IT Managers, Enterprise Architects and DevOps Experts from around the world came together to listen to top-notch experts and share their opinions. The conversations created were very interesting so we would love to give you a trailer of the event:

September 15, 2016

IT Security Management - an EA-driven approach with LeanIX Survey

As the requirements mentioned in our previous posts in our series on IT Security Management with LeanIX Survey clarify, a purely technical approach alone is not enough. In the current business environment, it will hardly be possible anymore to completely seal off one’s own IT landscape. Companies should instead follow a lean IT security management approach that makes it possible for them to iteratively improve their IT security:

September 12, 2016

LeanIX captures first prize at the 2016 Pirate Summit

Founder's presentation proves victorious during "Walk the plank" pitch 


LeanIX founders André Christ and Jörg G. Beyer proudly present the 1st prize
1,200 start-ups from 40 countries applied to present their products in front of a top-class jury during the Pirate Summit Global Tour. At the final round in Cologne on 8 September 2016, LeanIX managed to sail to victory with their pitch "Helping companies to build great IT architectures".

September 8, 2016

Digital Transformation and IT Security Management

The short- and long-term effects of inadequate IT security
In the third of our articles on IT Security Management with LeanIX Survey, we'll examine the great impact of digitization on IT security at a company. When customers become digital customers, for example, this means that sensitive customer data is transferred into online systems which require special protection. Furthermore, companies are expected to become increasingly “open”. As a result of new work concepts such as a home office, mobile computing and “Bring Your Own Device (BYOD)”, access to company data is provided on end devices whose security aspects are increasingly difficult for the company to control. Additionally, cross-company supply chains are leading to much closer networking with customers and business partners in the course of Industry 4.0 in a wide range of business processes (acquisition, production, sales, logistics). But this also means that the customers and suppliers are partially responsible for the protection of these systems. This makes professional IT security management all the more important.