<img height="1" width="1" src="https://www.facebook.com/tr?id=1758628641118349&amp;ev=PageView &amp;noscript=1">

The Enterprise Architecture Blog

How to Plan and Monitor Digital Transformations with Enterprise Architecture

Joyful descriptions of digital futures are rare these days. For every motivational article from McKinsey on evolving from “disrupted” to “disruptor”, the institute now seems obliged to publish a fully-rationalized version to account for the 86% of business executives whose digital transformations are occurring below expectations.

Read more

What Enterprise Architects Need to Know About a Windows 7 Transition

Enterprise Architects have begun the long goodbye of Windows 7. As anticipated, Microsoft is ending product support for the OS on January 14, 2020—a deadline whereupon all technical assistance and security updates particular to the version will be ceased. That is, unless businesses are willing to make payments.

Read more

Developing and Managing Change Strategies with Enterprise Architecture

Time is almost up for enterprises to decide how best to migrate from Microsoft SQL Server 2008/2008 R2 before official support services are discontinued. Come July 9, 2019 the following options must be completely evaluated by Enterprise Architects and their stakeholders:

Read more

An Enterprise Architecture Approach for Managing Technology Risks

In the realm of the information technology industry, every new technology is a potential risk factor as we don’t yet know the extent of the consequences (positive or negative) of using the technology for supporting business processes. Enterprise Architecture is critical for assessing the pros and cons of new technologies for the overall architectural fitness of an enterprise.

 

Read more

Data Breaches: Assess and Mitigate IT Risks (Part 2)

Exactis, a US-based marketing firm you didn’t know existed, discovered earlier this year that it was storing its database of 340 million customer records on a publicly accessible server. The security firm that located the risk told WIRED it was one of the most far-reaching databases of information it had ever seen—the entirety of which was easily vulnerable to attack.

Exactis’ failure presents obvious parallels to Equifax Inc.’s 2017 breach of 143 million US customers’ Social Security Numbers and much else. Disasters like it are why Senator Elizabeth Warren is championing for an Office of Cybersecurity at the US Federal Trade Commission to enforce higher data protection standards for handling consumer records.

The core principles of Senator Warren’s proposed Data Breach Prevention and Compensation Act of 2018 (DBPCA) became a reality in the European Union as of last May. For EU members it’s called the General Data Protection Regulation (GDPR)—and the LeanIX blog has reported on it from conception to reality plus hosted compliance seminars with those like Andreas Bosch from McKesson. But seeing that many EU companies grapple with its terms, are American enterprises likely to also struggle if/when their turn to submit?

And more specifically, must Enterprise Architects re-think operations to prepare for whatever wave of intensified scrutiny is coming their way?

Read more

Technology Obsolescence: Assess and Mitigate IT Risks (Part 1)

The not-so-modern phenomenon making the digitalized world shudder

 

Surprising no one, Allianz Group has named Business Interruption (BI) as the global business community’s most feared risk in its 2018 Risk Barometer report. It is now the sixth straight year that BI has taken this distinction.

What this means is that more than 1,900 risk management experts from top international enterprises have expressed, ad nauseum, the perils of systems outages—ones resulting not only from natural disasters but also from digitalization and the delicate interconnectedness of all business services.

Read more

Enterprise Architecture and IT Service Management Go Together

Enterprise Architecture is and has always been, a collaborative effort. We’ve previously outlined how Enterprise Architects can use their holistic view of the enterprise to support the critical questions of their stakeholders. This article will outline how enterprise architecture and IT service management intersect and support each other.

Read more

Why Enterprise Architecture is a key ingredient to  Security & Risk Management

Last year in March hackers stole sensitive data of millions of Americans from Equifax, one of America's biggest credit reporting agencies. In this massive breach, data including passports credit card numbers, driver's licenses as well as the Social Security numbers of nearly 146 million consumers were stolen.

Read more

Combining the pillars of modern Enterprise Architecture: Inventory and Modeling

Let’s review two indispensable tools for any self-respecting Enterprise Architect (EA): Inventorying and Modeling.

Both mechanisms provide unique advantages for handling complex IT ecosystems—and both present limitations which only the other can improve. 

Read more

How to Perform a Technology Risk Assessment


Sometime at the beginning of the year, the Head of Infrastructure of a manufacturing company walks into the CIO’s office:  “I just had Oracle on the phone. We have a problem”, he said. “Why is that?”, asks the CIO.

“We need to get off that Version 11 Database. They are going to waive premium support and the security risk is no longer acceptable”.

“Uh, ok… What does this really mean?", asks the CIO looking puzzled.

The head of infrastructure starts to explain: “The migration will have quite a few ripple effects, and the new version requires a newer server operating system. That means some of the older servers need to be replaced. I suspect that a large number of applications will be affected, and migration from the older ERP legacy systems will be tricky. I cannot promise that we will make it without any production downtime.”

With a worried expression, the CIO mutters, “I wish you would have told me that before the budget planning two months ago…” Source

Read more