SlideShare una empresa de Scribd logo
1 de 10
Enterprise Architecture
Integration
1
© Copyright 2014 Axis Technology, LLC
Enterprise Architecture - About
“The organizing logic for business processes and IT infrastructure reflecting the integration
and standardization requirements of the firm’s operating model.” [1]
“A conceptual blueprint that defines the structure and operation of an organization. The
intent of an enterprise architecture is to determine how an organization can most effectively
achieve its current and future objectives.”[2]
2
Why Enterprise Architecture?
• Effective management and exploitation of information through IT is key to business success
• Good information management = competitive advantage
• Current IT systems do not really meet the needs of business
– Fragmented, duplicated
– Poorly understood
– Not responsive to change
• Investment in Information Technology
– Focused on system maintenance
– Tactical developments rather than a strategic plan
[1] Source: MIT Center for Information Systems Research
[2] Source: SearchCIO.com
Key reasons why you need an enterprise
architecture:
• Critical to business survival and success
• Enables managed innovation within the
enterprise
© Copyright 2014 Axis Technology, LLC
Enterprise Architecture - Approach
• Gain a high-level understanding of business goals, offerings and channels, key processes, portfolio of projects,
systems and current architecture.
• Secure stakeholder consensus on the scope of the Research phase.
• Develop a detailed plan for the remaining project phases.
DesignDefine Inspect Road Map
• Define detail scope and plan to map engagement
• Meet with business leaders to understand business goals,
key performance indicators, products, channels and business
attributes
• Definition of scope and attributes of Research
• Detailed project schedule
Deliverables Benefits
Define Requirements…
Optimize
3
© Copyright 2014 Axis Technology, LLC
• Meet with systems IT representatives to understand system
and data architectures
• Conduct line of business interviews
• Conduct user interviews
• Define attributes (Business, User and System)
• Understand and document key data flows and systems of
record
Summary Presentation:
• Business summary
• Current system alignment
• Current system and data architectures
• Systems and data models
• Key data flows
Deliverables Benefits
Inspect and Identify…
• Understand and document current business strategy.
• Identify user needs and expectations.
• Research existing systems and data architecture and map them into a set of defined attributes.
4
Enterprise Architecture - Approach
DesignDefine Road MapOptimizeInspect
© Copyright 2014 Axis Technology, LLC
5
• Scenario analysis of collected information to develop system
and data architecture options
• Workshop sessions to review and refine system and data
architecture options
• Review of architecture options
Summary Presentation:
• Scenario analysis (tools used to generate options)
• Options presentation
Deliverables Benefits
Design Target State Architecture
• Process, prioritize and analyze business, systems and user information and goals.
• Identify possible architecture options.
• Develop evaluation criteria.
Enterprise Architecture - Approach
Define Road MapOptimizeInspect Design
© Copyright 2014 Axis Technology, LLC
• Select and refine architecture option.
• Create technology strategy that is best suited to business goals.
• Select and refine architecture
• Workshop sessions to align future projects with new
architecture
• Focus group to develop high level roadmap and technology
strategy
Summary Presentation:
• Scenario analysis
• Options presentation
• Selected High-level system and data architecture
• High level roadmap
• Change Impact analysis
Deliverables Benefits
Optimize…
6
Enterprise Architecture - Approach
Define Road MapInspect Design Optimize
© Copyright 2014 Axis Technology, LLC
7
• Develop an actionable approach to achieve the vision.
• Create a timeline that streamlines implementation and minimizes business disruption.
• Finalize strategy and architecture
• Creation of the roadmap, identifying projects, dependencies
and timelines
• Review of roadmap initiatives/projects
• Implementation timeline
• Project descriptions and dependencies
• Generation of project definitions documents
Deliverables Benefits
Road Map creation…
Enterprise Architecture - Approach
Define Inspect Design Optimize Road Map
© Copyright 2014 Axis Technology, LLC
Enterprise Architecture - Expertise
8
Major Insurance Company
• The Claim Services organization was developing a new
program in Data Management and Governance. Included in
this program were establishing key processes covering the
information life cycle that were missing from the current
environment. The program was developed over multiple
phases and included examination of the current processes
and standards in place, definition of a data quality
management strategy needed to support the business need
for timely, consistent, and quality data and enhancements to
the SDLC processes for data management.
• Multiple business and technology blueprint efforts. These
blueprint efforts analyze the current state and target
requirements of the in scope area, map the current state
against the LOB and Enterprise Architecture standards and
establish a roadmap to define the capabilities that will allow
the business area to drive to the target state and align with
the enterprise standards. Areas covered include the
Enterprise Business Architecture, Finance, Informatics
Systems Enhancement and CORE Domain Blueprints.
Major Financial Institute
• New Intermediary CRM tool rolled out to the Intermediary
sales team. As part of this rollout, the hardware/software
needed to be upgraded to be able to support the new CRM
application. The project team coordinated the planning,
execution and testing of the upgrade of the sales team’s
software/hardware. This effort required the team to work with
the bank’s NCG group, the GWIM technology team and the
Intermediary Sales Force team. Project management tasks
enable a smooth rollout of the software/hardware upgrade.
• A global financial conglomerate was developing a new program
to manage Developer Access to Sensitive Data. This was a
global program encompassing many different businesses as
well as many different countries and languages. This program
required educating the various businesses, developing and
tracking plans for each division within the businesses and
establishing processes to manage the project as well as
achieving the goals of the overall program. Additionally, both
internal audit and external regulators needed to be kept
abreast of progress and any difficulties encountered.
Major Healthcare Company
• Enterprise Architecture specifically focusing on guidance addressing identification and selection of solutions including evaluation of in-house
versus COTS. Evaluation of vendor technical footprint , capabilities, and maturity for functional, architectural, and infrastructure
requirements. Development of Market Landscape reports that identify and rank vendors who can deliver solutions based on business
requirements and Blueprint end-state. Provide technical advice and guidance to LOB, IT, & Procurement .
© Copyright 2014 Axis Technology, LLC 9
Enterprise Architecture - Drivers
Enterprise
Architecture
Mergers &
Acquisitions
Utilize IT
Resources and
Assets
Manage
Operational
costs through
“right-sizing”
Compliance
and
regulations
Profit Increase
Integrating
cultures of
disparate
organizations
Improve
return on
investment
New market
and business
opportunities
Leverage new
Technology
Changing
business
environment
Benefits
• IT rationalized to business plans
• Roadmap plan for the future that adapts
with your business
• More effective IT budget management
with maximum ROI
• Guidance through the challenges
associated with the adoption of a
coherent Enterprise IT Strategy
© Copyright 2014 Axis Technology, LLC
www.axistechnologyllc.com
Thank You!
70 Federal Street
Boston, MA 02110
(857) 445-0110
10
Axis Technology, LLC
Real-world breadth and depth of experience
in financial services and risk management solutions

Más contenido relacionado

La actualidad más candente

Creating Your Data Governance Dashboard
Creating Your Data Governance DashboardCreating Your Data Governance Dashboard
Creating Your Data Governance DashboardTrillium Software
 
Notes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapNotes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapAlan McSweeney
 
Ict Vision And Strategy Development
Ict Vision And Strategy DevelopmentIct Vision And Strategy Development
Ict Vision And Strategy DevelopmentAlan McSweeney
 
Notes On Single View Of The Customer
Notes On Single View Of The CustomerNotes On Single View Of The Customer
Notes On Single View Of The CustomerAlan McSweeney
 
Software Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration RoadmapSoftware Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration RoadmapInnovate Vancouver
 
Data Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationData Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationAlan McSweeney
 
Sabre: Master Reference Data in the Large Enterprise
Sabre: Master Reference Data in the Large EnterpriseSabre: Master Reference Data in the Large Enterprise
Sabre: Master Reference Data in the Large EnterpriseOrchestra Networks
 
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...Alan McSweeney
 
Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT MisalignmentDon’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT MisalignmentAlan McSweeney
 
Credit Suisse, Reference Data Management on a Global Scale
Credit Suisse, Reference Data Management on a Global ScaleCredit Suisse, Reference Data Management on a Global Scale
Credit Suisse, Reference Data Management on a Global ScaleOrchestra Networks
 
99+ Siebel CTMS Best Practices You Should Follow
99+ Siebel CTMS Best Practices You Should Follow99+ Siebel CTMS Best Practices You Should Follow
99+ Siebel CTMS Best Practices You Should FollowPerficient, Inc.
 
United Technologies, Hands On Reference Data Management For Corporate Finance...
United Technologies, Hands On Reference Data Management For Corporate Finance...United Technologies, Hands On Reference Data Management For Corporate Finance...
United Technologies, Hands On Reference Data Management For Corporate Finance...Orchestra Networks
 
IBM Software Capabilities
IBM Software CapabilitiesIBM Software Capabilities
IBM Software CapabilitiesNone
 
Digital Enterprise Architecture: Four Elements Critical to Solution Envisioning
Digital Enterprise Architecture: Four Elements Critical to Solution EnvisioningDigital Enterprise Architecture: Four Elements Critical to Solution Envisioning
Digital Enterprise Architecture: Four Elements Critical to Solution EnvisioningCognizant
 
RPA (Robotic Process Automation), POA (Process Oriented Architecture) And BPM...
RPA (Robotic Process Automation), POA (Process Oriented Architecture) And BPM...RPA (Robotic Process Automation), POA (Process Oriented Architecture) And BPM...
RPA (Robotic Process Automation), POA (Process Oriented Architecture) And BPM...Alan McSweeney
 
Workday overview sigmora
Workday overview sigmoraWorkday overview sigmora
Workday overview sigmorabgadicha
 
Process Oriented Architecture
Process Oriented ArchitectureProcess Oriented Architecture
Process Oriented ArchitectureAlan McSweeney
 
Acolyance: Applying MDM to Drive ERP Success & ROI
Acolyance: Applying MDM to Drive ERP Success & ROIAcolyance: Applying MDM to Drive ERP Success & ROI
Acolyance: Applying MDM to Drive ERP Success & ROIOrchestra Networks
 
How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2Perficient, Inc.
 

La actualidad más candente (20)

Creating Your Data Governance Dashboard
Creating Your Data Governance DashboardCreating Your Data Governance Dashboard
Creating Your Data Governance Dashboard
 
Notes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapNotes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And Roadmap
 
Ict Vision And Strategy Development
Ict Vision And Strategy DevelopmentIct Vision And Strategy Development
Ict Vision And Strategy Development
 
Notes On Single View Of The Customer
Notes On Single View Of The CustomerNotes On Single View Of The Customer
Notes On Single View Of The Customer
 
Outsourcing & Cloud Computing
Outsourcing & Cloud ComputingOutsourcing & Cloud Computing
Outsourcing & Cloud Computing
 
Software Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration RoadmapSoftware Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration Roadmap
 
Data Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationData Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata Harmonisation
 
Sabre: Master Reference Data in the Large Enterprise
Sabre: Master Reference Data in the Large EnterpriseSabre: Master Reference Data in the Large Enterprise
Sabre: Master Reference Data in the Large Enterprise
 
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
Using the IVI (Innovation Value Institute) IT CMF (IT Capability Maturity Fra...
 
Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT MisalignmentDon’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
 
Credit Suisse, Reference Data Management on a Global Scale
Credit Suisse, Reference Data Management on a Global ScaleCredit Suisse, Reference Data Management on a Global Scale
Credit Suisse, Reference Data Management on a Global Scale
 
99+ Siebel CTMS Best Practices You Should Follow
99+ Siebel CTMS Best Practices You Should Follow99+ Siebel CTMS Best Practices You Should Follow
99+ Siebel CTMS Best Practices You Should Follow
 
United Technologies, Hands On Reference Data Management For Corporate Finance...
United Technologies, Hands On Reference Data Management For Corporate Finance...United Technologies, Hands On Reference Data Management For Corporate Finance...
United Technologies, Hands On Reference Data Management For Corporate Finance...
 
IBM Software Capabilities
IBM Software CapabilitiesIBM Software Capabilities
IBM Software Capabilities
 
Digital Enterprise Architecture: Four Elements Critical to Solution Envisioning
Digital Enterprise Architecture: Four Elements Critical to Solution EnvisioningDigital Enterprise Architecture: Four Elements Critical to Solution Envisioning
Digital Enterprise Architecture: Four Elements Critical to Solution Envisioning
 
RPA (Robotic Process Automation), POA (Process Oriented Architecture) And BPM...
RPA (Robotic Process Automation), POA (Process Oriented Architecture) And BPM...RPA (Robotic Process Automation), POA (Process Oriented Architecture) And BPM...
RPA (Robotic Process Automation), POA (Process Oriented Architecture) And BPM...
 
Workday overview sigmora
Workday overview sigmoraWorkday overview sigmora
Workday overview sigmora
 
Process Oriented Architecture
Process Oriented ArchitectureProcess Oriented Architecture
Process Oriented Architecture
 
Acolyance: Applying MDM to Drive ERP Success & ROI
Acolyance: Applying MDM to Drive ERP Success & ROIAcolyance: Applying MDM to Drive ERP Success & ROI
Acolyance: Applying MDM to Drive ERP Success & ROI
 
How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2
 

Similar a Enterprise Architecture

PECB Webinar: Aligning ITIL/ISO 20000 Service Design and TOGAF Enterprise Arc...
PECB Webinar: Aligning ITIL/ISO 20000 Service Design and TOGAF Enterprise Arc...PECB Webinar: Aligning ITIL/ISO 20000 Service Design and TOGAF Enterprise Arc...
PECB Webinar: Aligning ITIL/ISO 20000 Service Design and TOGAF Enterprise Arc...PECB
 
Training Heights PECB ITIL and TOGAF Alignment
Training Heights PECB ITIL and TOGAF AlignmentTraining Heights PECB ITIL and TOGAF Alignment
Training Heights PECB ITIL and TOGAF Alignmenttrainingheights2015
 
MEGA Solution Footprint V5.pptx
MEGA Solution Footprint V5.pptxMEGA Solution Footprint V5.pptx
MEGA Solution Footprint V5.pptxWissamShehab1
 
Axis Technology Consulting Overview
Axis Technology Consulting OverviewAxis Technology Consulting Overview
Axis Technology Consulting OverviewAxis Technology
 
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFPractical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFMichael Sukachev
 
Axis Technology - Consulting Overview
Axis Technology - Consulting OverviewAxis Technology - Consulting Overview
Axis Technology - Consulting OverviewAxis Technology, LLC
 
Gaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptxGaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptxRobert Sheesley, CBA, CPHIMS
 
Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...Prashanth Panduranga
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation William Francis
 
International Target Operating Model Design
International Target Operating Model DesignInternational Target Operating Model Design
International Target Operating Model DesignChris Oddy
 
Sabrion_Consulting_Overview CPG Retail Apparel.pdf
Sabrion_Consulting_Overview CPG Retail Apparel.pdfSabrion_Consulting_Overview CPG Retail Apparel.pdf
Sabrion_Consulting_Overview CPG Retail Apparel.pdfBrion Carroll (II)
 
Enterprise arhitecture blueprint objectives
Enterprise arhitecture blueprint objectivesEnterprise arhitecture blueprint objectives
Enterprise arhitecture blueprint objectivesAndy Parkins
 
Business Intelligence Module 3
Business Intelligence Module 3Business Intelligence Module 3
Business Intelligence Module 3Home
 

Similar a Enterprise Architecture (20)

PECB Webinar: Aligning ITIL/ISO 20000 Service Design and TOGAF Enterprise Arc...
PECB Webinar: Aligning ITIL/ISO 20000 Service Design and TOGAF Enterprise Arc...PECB Webinar: Aligning ITIL/ISO 20000 Service Design and TOGAF Enterprise Arc...
PECB Webinar: Aligning ITIL/ISO 20000 Service Design and TOGAF Enterprise Arc...
 
Training Heights PECB ITIL and TOGAF Alignment
Training Heights PECB ITIL and TOGAF AlignmentTraining Heights PECB ITIL and TOGAF Alignment
Training Heights PECB ITIL and TOGAF Alignment
 
MEGA Solution Footprint V5.pptx
MEGA Solution Footprint V5.pptxMEGA Solution Footprint V5.pptx
MEGA Solution Footprint V5.pptx
 
Resume John Tzanetakis
Resume John TzanetakisResume John Tzanetakis
Resume John Tzanetakis
 
Axis Technology Consulting Overview
Axis Technology Consulting OverviewAxis Technology Consulting Overview
Axis Technology Consulting Overview
 
Dhrub_Resume_New
Dhrub_Resume_NewDhrub_Resume_New
Dhrub_Resume_New
 
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFPractical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
 
Axis Technology - Consulting Overview
Axis Technology - Consulting OverviewAxis Technology - Consulting Overview
Axis Technology - Consulting Overview
 
Gaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptxGaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptx
 
Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation
 
SPGregory_Resume
SPGregory_ResumeSPGregory_Resume
SPGregory_Resume
 
International Target Operating Model Design
International Target Operating Model DesignInternational Target Operating Model Design
International Target Operating Model Design
 
Sabrion_Consulting_Overview CPG Retail Apparel.pdf
Sabrion_Consulting_Overview CPG Retail Apparel.pdfSabrion_Consulting_Overview CPG Retail Apparel.pdf
Sabrion_Consulting_Overview CPG Retail Apparel.pdf
 
Enterprise arhitecture blueprint objectives
Enterprise arhitecture blueprint objectivesEnterprise arhitecture blueprint objectives
Enterprise arhitecture blueprint objectives
 
IndEA.pptx
IndEA.pptxIndEA.pptx
IndEA.pptx
 
Case Studies
Case StudiesCase Studies
Case Studies
 
Chapter01
Chapter01Chapter01
Chapter01
 
MS IT-strategy.pptx
MS IT-strategy.pptxMS IT-strategy.pptx
MS IT-strategy.pptx
 
Business Intelligence Module 3
Business Intelligence Module 3Business Intelligence Module 3
Business Intelligence Module 3
 

Más de Axis Technology, LLC

Entitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperEntitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperAxis Technology, LLC
 
Tile-based Navigation & Analytics-White Paper
Tile-based Navigation & Analytics-White PaperTile-based Navigation & Analytics-White Paper
Tile-based Navigation & Analytics-White PaperAxis Technology, LLC
 
Assessing the Value of Rich Internet-White Paper
Assessing the Value of Rich Internet-White PaperAssessing the Value of Rich Internet-White Paper
Assessing the Value of Rich Internet-White PaperAxis Technology, LLC
 
Solution Evaluation & Selection Brochure
Solution Evaluation & Selection BrochureSolution Evaluation & Selection Brochure
Solution Evaluation & Selection BrochureAxis Technology, LLC
 
Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure Axis Technology, LLC
 
Data Architecture Strategy Brochure
Data Architecture Strategy BrochureData Architecture Strategy Brochure
Data Architecture Strategy BrochureAxis Technology, LLC
 
Regulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningRegulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningAxis Technology, LLC
 

Más de Axis Technology, LLC (20)

Entitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperEntitlements Management Strategy-White Paper
Entitlements Management Strategy-White Paper
 
Tile-based Navigation & Analytics-White Paper
Tile-based Navigation & Analytics-White PaperTile-based Navigation & Analytics-White Paper
Tile-based Navigation & Analytics-White Paper
 
Assessing the Value of Rich Internet-White Paper
Assessing the Value of Rich Internet-White PaperAssessing the Value of Rich Internet-White Paper
Assessing the Value of Rich Internet-White Paper
 
Solution Evaluation & Selection Brochure
Solution Evaluation & Selection BrochureSolution Evaluation & Selection Brochure
Solution Evaluation & Selection Brochure
 
Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure
 
eGRC Strategy Brochure
eGRC Strategy BrochureeGRC Strategy Brochure
eGRC Strategy Brochure
 
Entitlement Management Brochure
Entitlement Management Brochure Entitlement Management Brochure
Entitlement Management Brochure
 
Data Architecture Strategy Brochure
Data Architecture Strategy BrochureData Architecture Strategy Brochure
Data Architecture Strategy Brochure
 
Data Governance Brochure
Data Governance BrochureData Governance Brochure
Data Governance Brochure
 
Regulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningRegulatory & Compliance Account Opening
Regulatory & Compliance Account Opening
 
Client Connections
Client Connections Client Connections
Client Connections
 
Brokerage Executive Dashboard
Brokerage Executive DashboardBrokerage Executive Dashboard
Brokerage Executive Dashboard
 
Wealth Management
Wealth ManagementWealth Management
Wealth Management
 
IRA Simplification Project
IRA Simplification ProjectIRA Simplification Project
IRA Simplification Project
 
Data Management Strategy
Data Management StrategyData Management Strategy
Data Management Strategy
 
Joint Analysis Design
Joint Analysis DesignJoint Analysis Design
Joint Analysis Design
 
Enterprise Data Architecture
Enterprise Data Architecture Enterprise Data Architecture
Enterprise Data Architecture
 
Reference Data Management
Reference Data Management Reference Data Management
Reference Data Management
 
Axis Consulting Case Studies
Axis Consulting Case StudiesAxis Consulting Case Studies
Axis Consulting Case Studies
 
Entitlement and Access Manegement
Entitlement and Access ManegementEntitlement and Access Manegement
Entitlement and Access Manegement
 

Último

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Enterprise Architecture

  • 2. © Copyright 2014 Axis Technology, LLC Enterprise Architecture - About “The organizing logic for business processes and IT infrastructure reflecting the integration and standardization requirements of the firm’s operating model.” [1] “A conceptual blueprint that defines the structure and operation of an organization. The intent of an enterprise architecture is to determine how an organization can most effectively achieve its current and future objectives.”[2] 2 Why Enterprise Architecture? • Effective management and exploitation of information through IT is key to business success • Good information management = competitive advantage • Current IT systems do not really meet the needs of business – Fragmented, duplicated – Poorly understood – Not responsive to change • Investment in Information Technology – Focused on system maintenance – Tactical developments rather than a strategic plan [1] Source: MIT Center for Information Systems Research [2] Source: SearchCIO.com Key reasons why you need an enterprise architecture: • Critical to business survival and success • Enables managed innovation within the enterprise
  • 3. © Copyright 2014 Axis Technology, LLC Enterprise Architecture - Approach • Gain a high-level understanding of business goals, offerings and channels, key processes, portfolio of projects, systems and current architecture. • Secure stakeholder consensus on the scope of the Research phase. • Develop a detailed plan for the remaining project phases. DesignDefine Inspect Road Map • Define detail scope and plan to map engagement • Meet with business leaders to understand business goals, key performance indicators, products, channels and business attributes • Definition of scope and attributes of Research • Detailed project schedule Deliverables Benefits Define Requirements… Optimize 3
  • 4. © Copyright 2014 Axis Technology, LLC • Meet with systems IT representatives to understand system and data architectures • Conduct line of business interviews • Conduct user interviews • Define attributes (Business, User and System) • Understand and document key data flows and systems of record Summary Presentation: • Business summary • Current system alignment • Current system and data architectures • Systems and data models • Key data flows Deliverables Benefits Inspect and Identify… • Understand and document current business strategy. • Identify user needs and expectations. • Research existing systems and data architecture and map them into a set of defined attributes. 4 Enterprise Architecture - Approach DesignDefine Road MapOptimizeInspect
  • 5. © Copyright 2014 Axis Technology, LLC 5 • Scenario analysis of collected information to develop system and data architecture options • Workshop sessions to review and refine system and data architecture options • Review of architecture options Summary Presentation: • Scenario analysis (tools used to generate options) • Options presentation Deliverables Benefits Design Target State Architecture • Process, prioritize and analyze business, systems and user information and goals. • Identify possible architecture options. • Develop evaluation criteria. Enterprise Architecture - Approach Define Road MapOptimizeInspect Design
  • 6. © Copyright 2014 Axis Technology, LLC • Select and refine architecture option. • Create technology strategy that is best suited to business goals. • Select and refine architecture • Workshop sessions to align future projects with new architecture • Focus group to develop high level roadmap and technology strategy Summary Presentation: • Scenario analysis • Options presentation • Selected High-level system and data architecture • High level roadmap • Change Impact analysis Deliverables Benefits Optimize… 6 Enterprise Architecture - Approach Define Road MapInspect Design Optimize
  • 7. © Copyright 2014 Axis Technology, LLC 7 • Develop an actionable approach to achieve the vision. • Create a timeline that streamlines implementation and minimizes business disruption. • Finalize strategy and architecture • Creation of the roadmap, identifying projects, dependencies and timelines • Review of roadmap initiatives/projects • Implementation timeline • Project descriptions and dependencies • Generation of project definitions documents Deliverables Benefits Road Map creation… Enterprise Architecture - Approach Define Inspect Design Optimize Road Map
  • 8. © Copyright 2014 Axis Technology, LLC Enterprise Architecture - Expertise 8 Major Insurance Company • The Claim Services organization was developing a new program in Data Management and Governance. Included in this program were establishing key processes covering the information life cycle that were missing from the current environment. The program was developed over multiple phases and included examination of the current processes and standards in place, definition of a data quality management strategy needed to support the business need for timely, consistent, and quality data and enhancements to the SDLC processes for data management. • Multiple business and technology blueprint efforts. These blueprint efforts analyze the current state and target requirements of the in scope area, map the current state against the LOB and Enterprise Architecture standards and establish a roadmap to define the capabilities that will allow the business area to drive to the target state and align with the enterprise standards. Areas covered include the Enterprise Business Architecture, Finance, Informatics Systems Enhancement and CORE Domain Blueprints. Major Financial Institute • New Intermediary CRM tool rolled out to the Intermediary sales team. As part of this rollout, the hardware/software needed to be upgraded to be able to support the new CRM application. The project team coordinated the planning, execution and testing of the upgrade of the sales team’s software/hardware. This effort required the team to work with the bank’s NCG group, the GWIM technology team and the Intermediary Sales Force team. Project management tasks enable a smooth rollout of the software/hardware upgrade. • A global financial conglomerate was developing a new program to manage Developer Access to Sensitive Data. This was a global program encompassing many different businesses as well as many different countries and languages. This program required educating the various businesses, developing and tracking plans for each division within the businesses and establishing processes to manage the project as well as achieving the goals of the overall program. Additionally, both internal audit and external regulators needed to be kept abreast of progress and any difficulties encountered. Major Healthcare Company • Enterprise Architecture specifically focusing on guidance addressing identification and selection of solutions including evaluation of in-house versus COTS. Evaluation of vendor technical footprint , capabilities, and maturity for functional, architectural, and infrastructure requirements. Development of Market Landscape reports that identify and rank vendors who can deliver solutions based on business requirements and Blueprint end-state. Provide technical advice and guidance to LOB, IT, & Procurement .
  • 9. © Copyright 2014 Axis Technology, LLC 9 Enterprise Architecture - Drivers Enterprise Architecture Mergers & Acquisitions Utilize IT Resources and Assets Manage Operational costs through “right-sizing” Compliance and regulations Profit Increase Integrating cultures of disparate organizations Improve return on investment New market and business opportunities Leverage new Technology Changing business environment Benefits • IT rationalized to business plans • Roadmap plan for the future that adapts with your business • More effective IT budget management with maximum ROI • Guidance through the challenges associated with the adoption of a coherent Enterprise IT Strategy
  • 10. © Copyright 2014 Axis Technology, LLC www.axistechnologyllc.com Thank You! 70 Federal Street Boston, MA 02110 (857) 445-0110 10 Axis Technology, LLC Real-world breadth and depth of experience in financial services and risk management solutions