Case Experiences and Best practices Using ArchiMate® and TOGAF®

<p>Implementing Enterprise Architecture in any organization requires an effective method and a consistent way of modeling to build architecture models. The Open Group standards <a title=”proven, comprehensive and generic methodology and framework” href=”http://www.bizzdesign.com/consultancy/enterprise-architecture-management/togaf/#The Open Group Architecture Framework”>TOGAF</a>® and <a title=”open modeling language for architects to model and communicate Enterprise Architecture” href=”http://www.bizzdesign.com/consultancy/enterprise-architecture-management/archimate/#Architects need a unified framework to describe enterprise architectures”>ArchiMate</a>®  are used worldwide to implement Enterprise Architecture. TOGAF® focuses on the method of implementing and maintaining Enterprise Architecture. ArchiMate® is an Enterprise Architecture modeling language standard. A lot of organizations in various markets worldwide use (a a combination of) these standards.</p><p>On <strong>28-March-2013</strong> I will present a webinar via <a title=”Leading the development of open, vendor-neutral IT standards and certifications” href=”http://www.opengroup.org”>The Open Group</a> in which I will give an overview of some real-life case experiences in using ArchiMate® and TOGAF® for implementing Enterprise Architecture. The approach, deliverables and examples of the several case studies will be shared. Furthermore, practical do’s and don’ts in adopting ArchiMate® and TOGAF® will be discussed. Attendees of this webinar will benefit from the lessons learned, and will learn which aspects are typically important to consider when implementing Enterprise Architecture in any organization.</p><p><a title=”Register for this webinar” href=”https://opengroupevents.webex.com/ec0606l/eventcenter/enroll/join.do?confViewID=1003593497&amp;theAction=detail&amp;confId=1003593497&amp;path=program_detail&amp;siteurl=opengroupevents”>Registration details</a> for this webinar can be found on the Open Group website.</p><p> </p><div class=”captionImage left” style=”width: 600px;”><img class=”left” src=”http://www.bizzdesign.com/assets/BlogDocuments-2/_resampled/resizedimage600255-Togaf-archimate-repository-reference-models.png” alt=”Togaf archimate repository reference models” title=”During the webinar Rob Kroese will explain TOGAF and archiMate” width=”600″ height=”255″/><p class=”caption”>ArchiMate® and TOGAF®</p></div>

Categories Uncategorized

An Update on ArchiMate® 2 Certification

In this blog we provide latest news on the status of the ArchiMate® Certification for People program. Recent changes to the program include the availability of the ArchiMate 2 Examination through Prometric test centers and also the addition of the ArchiMate 2 Foundation qualification. … Continue reading

Complexity from Big Data and Cloud Trends Makes Architecture Tools like ArchiMate and TOGAF More Powerful, Says Expert Panel

We recently assembled a panel of Enterprise Architecture (EA) experts to explain how such simultaneous and complex trends as big data, Cloud Computing, security, and overall IT transformation can be helped by the combined strengths of The Open Group Architecture Framework (TOGAF®) and the ArchiMate® modeling language. … Continue reading

Delivering Business Value with Enterprise Architecture Using TOGAF® and ArchiMate®

<p><span style=”color: #505050; font-size: 11px; line-height: 19px;”>The last few years have been tough for many organizations, especially in (the aftermath of) the global economic turmoil. Getting to grips with the complexity of doing business is increasingly important. Many of the problems that organizations struggle with have similar characteristics. Consider for example:</span></p><ul><li>Business transformation has major impact on the organization, from work floor up to (top) management, ranging from process, organization structure, data, and IT infrastructure</li><li>Various solution alternatives for business- and IT problems are available and viable. Which alternatives will we pursue?</li><li>Business Units have concerns that do not always align. Both for change projects and for business as usual we see BU’s competing to meet their own targets rather than keeping an eye on common goals</li><li>Etc.</li></ul><p>In these cases it pays off to use Enterprise Architecture methods! On<strong> 21-February-2013</strong> I will present a <a title=”Register if you would like to attent” href=”https://opengroupevents.webex.com/ec0606l/eventcenter/enroll/join.do?confViewID=1003476223&amp;theAction=detail&amp;confId=1003476223&amp;path=program_detail&amp;siteurl=opengroupevents”><strong>webinar </strong></a>in which I will show how <a title=”Specification TOGAF” href=”https://opengroupevents.webex.com/ec0606l/eventcenter/enroll/join.do?confViewID=1003476223&amp;theAction=detail&amp;confId=1003476223&amp;path=program_detail&amp;siteurl=opengroupevents”>TOGAF </a>and <a title=”Specification ArchiMate” href=”https://opengroupevents.webex.com/ec0606l/eventcenter/enroll/join.do?confViewID=1003476223&amp;theAction=detail&amp;confId=1003476223&amp;path=program_detail&amp;siteurl=opengroupevents”>ArchiMate </a>add business value. The combination of these open standards provides organizations with a balanced approach to EA with extensive tool support. <a title=”Register if you would like to attent the webinar” href=”https://opengroupevents.webex.com/cmp0307l/webcomponents/widget/detect.do?siteurl=opengroupevents&amp;LID=1&amp;RID=2&amp;TID=11&amp;rnd=3433236763&amp;DT=60&amp;DL=nl&amp;isDetected=true&amp;backUrl=%2Fec0606l%2Feventcenter%2Fenroll%2Fjoin.do%3FconfViewID%3D1003476223%26theAction%3Ddetail%26confId%3D1003476223%26path%3Dprogram_detail%26siteurl%3Dopengroupevents”>Registration details for this webinar</a> can be found in the Open Group website. If you are interested in the slides, you can download them on the right of this page.</p><p> </p><div class=”captionImage left” style=”width: 600px;”><div class=”captionImage left” style=”width: 600px;”><img class=”left” src=”http://www.bizzdesign.com/assets/BlogDocuments-2/_resampled/resizedimage600437-Agenda-Webinar-TOGAF-ArchiMate-Delivering-Business-Value.png” alt=”Webinar delivering business value with TOGAF and ArchiMate” title=”During this webinar we’ll teach you how to add value to your business” width=”600″ height=”437″/><p class=”caption”>Webinar Delivering Business Value with Enterprise Architecture Using TOGAF® and ArchiMate®</p></div></div>

Categories Uncategorized

Three Best Practices for Successful Implementation of Enterprise Architecture Using the TOGAF® Framework and the ArchiMate® Modeling Language

How should we organize ourselves in order to be successful? An architecture framework is a foundational structure for developing a broad range of architectures and consists of a process and a modeling component. The TOGAF® framework and the ArchiMate® modeling language are two leading and widely adopted standards in this field. Continue reading

Successful Enterprise Architecture using the TOGAF® and ArchiMate® Standards

The discipline of Enterprise Architecture was developed in the 1980s with a strong focus on the information systems landscape of organizations. Since those days, the scope of the discipline has slowly widened to include more and more aspects of the enterprise as a whole. Architects, especially at the strategic level, attempt to answer the question “How should we organize ourselves in order to be successful?” Continue reading

Designing secure organizations. Risk management, Enterprise security management and ArchiMate.

<p><span style=”color: #505050; font-size: 11px; line-height: 19px;”>No one is allowed to enter the building without proper authorization; all incoming e-mail messages are filtered; personal computers that are used to store sensitive data do not have a direct connection to the internet, and therefore cannot be accessed remotely. With these </span><strong style=”color: #505050; font-size: 11px; line-height: 19px;”>enterprise security</strong><span style=”color: #505050; font-size: 11px; line-height: 19px;”> rules, we have ensured that our private information is safe, right? Wrong! </span></p><p>Cyber-attacks are getting increasingly sophisticated, using a combination of digital, physical and social engineering techniques. A typical example is the so-called “road apple attack”. A would-be intruder “accidentally” leaves a USB flash drive – with company logo – in a public spot such as the company car park. An employee picks it up, and chances are that he will not be able to suppress his curiosity and plug it into his PC. Surprise: the drive is infected with malware which, unless proper measures have been taken, will infect the PC and send sensitive information to the intruder.</p><p><img class=”left” src=”http://www.bizzdesign.com/assets/BlogDocuments-2/_resampled/resizedimage600395-Risk-Management.png” width=”600″ height=”395″ alt=”” title=””/></p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p>Of course, there are several ways to prevent this from happening. The system administrator may decide to completely disable the use of USB drives, but perhaps this is too restrictive, causing employees to find ways to circumvent this. Or perhaps a policy against the use of unverified storage devices suffices, if people are disciplined enough to comply with it… There is no easy way to determine how much security is enough, and how much is too much. In other words, how do we find the optimal position on the trade-off between security, usability and costs?</p><p>Most of the present-day security and <strong><a title=”risk management, secuirity measures” href=”http://www.bizzdesign.com/consultancy/governance-risk-and-compliance/”>risk management </a></strong>approaches are based on checklists, heuristics and best practices. Security measures are applied in a bottom-up way, often neglecting the social aspects. This may lead to an overkill of preventive security measures, also in cases where cheaper (and less intrusive) curative measures may suffice. On the other hand, less obvious threats or vulnerabilities in the organization may easily be overlooked.</p><p> </p><div class=”captionImage left” style=”width: 424px;”><img class=”left” src=”http://www.bizzdesign.com/assets/BlogDocuments-2/Enterprise-security-management-ArchiMate.png” alt=”Enterprise Secuirity Management” title=”enterprise security management, model-based approach ” width=”424″ height=”458″/><p class=”caption”>enterprise security management, Archimate core</p></div><p><span style=”font-size: 11px; line-height: 19px;”>To avoid this, we advocate a model-based approach to </span><strong style=”font-size: 11px; line-height: 19px;”>enterprise security management</strong><span style=”font-size: 11px; line-height: 19px;”>, in which security aspects are fully integrated in the design chain: from strategy and business model, through enterprise architecture, to the design and implementation of the organization and IT support. For this purpose, risk-related concepts are included in existing architecture and design languages. At the </span><strong style=”font-size: 11px; line-height: 19px;”><a title=”enterprise architecture, Archimate” href=”http://www.bizzdesign.com/consultancy/enterprise-architecture-management/”>enterprise architecture</a></strong><span style=”font-size: 11px; line-height: 19px;”> level, </span><strong style=”font-size: 11px; line-height: 19px;”><a title=”ArchiMate open standard” href=”http://www.bizzdesign.com/consultancy/enterprise-architecture-management/archimate/”>ArchiMate</a></strong><span style=”font-size: 11px; line-height: 19px;”>, as a broadly accepted open standard (with available tool support) that is suitable to describe business and IT aspects in an integrated way, is an obvious choice. Architectures described in </span><strong style=”font-size: 11px; line-height: 19px;”><a title=”ArchiMate goals, principles and requirements” href=”http://www.bizzdesign.com/consultancy/enterprise-architecture-management/archimate/”>ArchiMate</a></strong><span style=”font-size: 11px; line-height: 19px;”> can be linked to goals, principles and requirements, and to detailed design models expressed in languages such as BPMN or UML. The resulting models provide the input for risk and vulnerability analysis, highlighting the areas in the architecture that are most susceptible to attack. In addition, they will guide the design of effective and efficient security measures.</span></p><p>With this approach, <strong><a title=”Bizzdesign the Netherlands Contact” href=”http://www.bizzdesign.com/contact/netherlands/”>BiZZdesign</a></strong> can help you to design a secure organization – without unduly restricting your people in their daily work. </p>

Categories Uncategorized

ArchiMate® 2.0 and Beyond

There are several sessions on ArchiMate™ at the upcoming Open Group Conference in Barcelona. Henry Franken’s “Delivering Enterprise Architecture with TOGAF® and ArchiMate®” session on October 22 at 2:00-2:45 p.m. UTC / 8:00-8:45 a.m. EST will also be livestreamed on The Open Group Website. Continue reading