SlideShare una empresa de Scribd logo
1 de 17
FITS Consulting
Problem. Solved.
MEGA Solution Platform Overview
Collaborative Ecosystem for Transformation Lifecycle Management
2 FITS Confidential
Administration Modules
Communicate
Transform
Engage
Common Modeling platform
Architecture Modules
Alerts Workflows Reports Dashboards Portals
Social
Collaboration
Gap Analysis Planning Assessment
Common
Platform
Capabilities
Archimate Zachman UML BPMN SOA Micros-services
1
IT Business
Management
2
Business Process
Analysis
3
Information
System
4
IT Architecture
5
IT Portfolio
Management
6
Integrated Risk
Management
7
Audit
Unified Meta Model
Strategy Business Data Application Infrastructure Security
8 9
Power Studio Power Supervisor
Mega – Platform Components
Artificial Intelligence
Visual
Intelligence
Predictive
Intelligence
3 FITS Confidential
HOPEX IT Business Management allows you to describe company strategy in depth at each level
of the organization and evaluate its alignment with the business initiatives. The modules also
provides the ability to define, assess and plan business capabilities and to develop and manage
the strategic initiative portfolio of the organization
Align to strategic goals
• Capture your company’s
strategy including
objectives and tactics.
• Define transformation
stages and then plan
business capabilities
required for each stage.
Improve IT Strategic Planning
• Build an IT strategic
roadmap by connecting
applications and projects
to planned business
capabilities.
• Assess the impact of
change on the existing IT
landscape and quickly
adjust as needed.
Focus Investments on strategic
projects
• Prioritize future
investments and IT
projects based on strategic
alignment.
Plan:
• Capture vision, objectives, strategy, and
tactics
• Map business capabilities and functionalities
• Create value streams
• Build strategic roadmap
Optimize:
• Automatically collect IT assets
• Build a data glossary as central
documentation for IT projects
• Rationalize IT portfolio​ (apps, technology)
• Create, share dashboards and ID cards of
applications, technology and data
Transform:
• Identify IT transformation projects
• Perform what-if analysis using transformation
scenarios
• Prioritize projects based on strategic
alignment
• Turn ideas into projects aligned to business
outcomes
• Define mission, vision, goals
and strategy for the whole
enterprise
• Define objectives and
tactics for each
transformation stage
• Value streams define the
stages necessary to satisfy
customers.
• Link business capabilities to
each stage of the value stream.
• If capabilities are missing,
identify the actions required to
develop or acquire new
business capabilities (build vs
partner)
• Map applications to
business capabilities in
business capability maps
• Multiple criteria
rendering are available
thanks to user-defined
icons and color coding
• View how applications use the
data of a data dictionary
• Connect applications and data
through data stores.
• Perform impact analysis to
understand the impact of
an asset on the business
and IT landscape
• Prioritize projects based on
assessment such as strategic
alignment, deliverables and
impacted capabilities
IT Business Management
4 FITS Confidential
Improve business efficiency
• Model, analyze and
standardize your business
processes to improve
business efficiency and
support new business models
Deliver Superior Customer
Experience
• Map customer journeys to
design optimal processes and
deliver superior customer
experience
Ensure Compliance with
Policies and Regulations
• Maintain business process
models in a single repository,
identify areas of concerns,
and improve operations to
drive compliance initiatives
Improve:
• Model your business process groups and
their associated organizational processes
• Develop organizational process maps and
assign participants
• Develop organizational models
• Assign business processes to portfolios and
assess processes based on custom criteria
Delight:
• Design customer journey per persona
• Define pain points and customer
expectations
• Map journey steps to related touchpoints
from the operating model
• Assess customer journey steps by channel
and define action plans
Mitigate:
• Define, classify and assess risks
• Map risks to their related operating model
components
• Define risk mitigation strategies
• Define internal controls
• Evaluate effectiveness of controls and
calculate residual risks
• Describes main business
processes
• Describes a sequence of
operations and participants
• Assigns participants to
organizational units of the
company.
• Design improved processes
and Automatically
highlights differences
• Describes company
organization (structures,
departments, functions,
people etc.) and external
organization (clients,
customers, partners)
• Automatically build
diagrams from a table
entry
• Improves user efficiency
and helps save time
• Allows users to focus on
the process itself instead
of spending time to
design it
• Enable users to assess
processes through
questionnaires, and standard
and custom criteria such as
execution (design, knowledge,
IT support) and performance
(business value, efficiency and
risks)
• Manage end-to-end
customer experience, map
and rank touchpoints in
order to identify where to
optimize/invest first
• Link touchpoints to
organization’s internal
processes, and check how
internal processes support
the customer journey
• Enables user to include risks
and controls in process
models
• Contextualize risk by linking it
to the different operating
model components to
improve analysis and design
of mitigation strategies
Business Process Analysis
With Business Process Analysis, analysts can document, assess and analyse their operating model
including organization structure, functions, people roles and responsibilities, processes, risks,
policies and procedures and compliance requirements based on internal and international
standards.
5 FITS Confidential
Get Visibility Into Your Data
• Build and leverage a data
dictionary and a business
glossary to improve business
efficiency and ensure
everybody shares a common
understanding
Ensure Data Integrity and
Lineage
• Map data lineage and view
how data is transformed
• Understand data usage by
linking data to applications
and processes
• Assess data quality using the
six dimensions of data quality
• Analyze impact of change
Demonstrate Data Compliance
• Assign data governance roles
• Upload and describe
regulations or policy chapters
and articles
• Define the business rules
related to articles
• Tie rules to business
processes to ensure their
enforcement
Model:
• Build your data glossary to unify data
definition based on business terminology
• Model your conceptual and logical data
models
• Reverse engineer your physical data models
• Map your data entities to business domains
• Generate data reference model based on
business domains with data criteria overlay
Explore:
• Define data lineage across internal and
external applications
• Explore data flows and auto-generate data
lineage views
• Explore the relationship between business
concept and a technical data automatically
Enforce:
• Categorize your data entities
• Assess your data entities based on specific set
of criteria in line with the applicable
regulatory requirements
• Evaluate data compliance state based on
applicable data regulatory requirements
• Based on data dictionary, a
full working Business
Glossary can be initialized
• Enrich glossary concept
includes definitions,
pictures and synonyms
• Share the glossary across
the organization
• Describe the transformations
that happen to the data
including:
• Applications and
technologies for external
systems.
• Data origin, processing
type, control
measurement and
subject.
• Different types of flows
• Understand how a business
concept and a technical
data are tied each other
• View how applications use
the data of a data
dictionary
• Connect applications and
data through data stores.
• Understand where data is
used in processes to
improve compliance
• Assess data quality under the
six dimensions of data quality
including Completeness,
Uniqueness, Timeliness,
Consistency, Validation and
Accuracy.
• Categorize data as sensitive or
golden.
• Evaluate data compliance
requirements
• Includes all entities, their
relationships and attributes.
• Understand data
requirements to achieve
business objectives
• Map data by business domains
• Gives a comprehensive view on
data per business domain to
improve decision making
• Assign data criteria such as
data category (sensitive and
golden data) to the business
domains
Information Architecture
HOPEX Information Architecture provides the timely, in-depth information that enterprise
information managers and business architects need to manage knowledge and data as an
enterprise asset. With our solution, stakeholders can make collaborative, well-informed decisions
about information usage across the various functions of your organization.
6 FITS Confidential
Get a Clear Picture of Your IT
Systems
• Map applications and
technologies, and how
they interact with one
another to identify
efficiencies and avoid
disruptions
Tackle Continuous Business
Changes
• Keep current with agile
developments and design
future IT systems. Ensure
that your IT stays ahead of
the needs of the business
Speed up Application
Deployments
• Precisely describe how
technical components of an
application can be deployed
to avoid potential pitfalls
Describe:
• Define your applications’ environment
scenarios to depicts external context
• Define your applications’ structural views to
describe your applications construct
• Develop your application workflow models
to express the logical sequence of execution
Align:
• Define your application functionalities
• Map your applications to business
capabilities to understand and evaluate
business X IT alignment
• Auto-generate your business capability x
functionality map to explore how IT is
supporting the business
Deploy:
• Define your application technology
components and their relationships
• Depict your applications’ technical
deployment and infrastructures
• Ensure optimal technology usage and
deployment infrastructure
• An environment
architecture diagram
represents the main
exchanges between
applications
• Enables user to depict the
same application in
multiple scenarios
• Describes all flows between
applications and interfaces
• Map applications to
capabilities in business
capability maps
• Map applications to
functionalities in
functionality maps
• Grouping Functionalities by
capability helps identify
business needs and identify
overlaps.
• Describes one possible
configuration of the
deployment of an
application
• Describes how the different
application technical areas
are connected to each
other and the technologies
and communication
protocols they use.
• Describes the servers,
workstations, network and
exchange protocols.
• Communication Channels
show physical connections
between IT infrastructure
objects.
• Interactions show exchanges
of information between
processes hosted on
infrastructure devices.
• Provides a structural view of
the Application System
Environment.
• It shows all the objects and
communication paths that
must exist in order for the
scenarios to work.
• Use Service Oriented
Architecture to provide
detailed description of
application interactions
• Describe workflows and
sequences of tasks performed
by applications
• Tasks can be assigned to
participants that represent
applications, IT services or org-
units (for interactive tasks).
IT Architecture
HOPEX IT Architecture provides IT Architects with an IT asset view, and helps them consolidate
and update a consistent picture of applications and the technical infrastructure. It shows gaps in
services, redundancies, the resources supporting different processes, and how the architecture
aligns with business goals.
7 FITS Confidential
Get visibility into IT landscape
• Build a complete inventory of
your IT assets including
applications, technology and
data by automatically collecting
data
• Get insight into the fitness of
your IT landscape through
dashboards and ID cards of
applications, technology and
data.
Reduce Cost
• Quickly identify the
applications to eliminate or
modernize using a
collaborative approach
• Clearly understand the impact
of removing an application
Mitigate Technology Risks
• Get visibility into technology
lifecycles and manage technology
obsolescence
• Define approved or unapproved
technologies based on IT policy
• View the impact of an obsolete or
unapproved technology to
applications and business
capabilities.
Inventory:
• Collect your application information
• Define your application functional and
financial context
• Capture your application business
environment
• Define your application lifecycle
• Collect your application data related
information
Rationalize:
• Group your applications into portfolios
• Define your portfolio assessment criteria
and weights
• Plan and execute application assessment
campaigns
• Auto-generate application rationalization
recommendations
• Monitor rationalization execution
Resolve:
• Define your technology catalog
• Capture your technology lifecycle
• Define your company technology standards
and
• Auto-identify technology conflicts based on
application and technology lifecycle evolution
• Describe business areas
supported by applications
• Get a comprehensive view of
the functional scope of an
application
• Define Application and
Technology Lifecycle as well
as deployment timeline
• Launch campaigns to
business and IT owners to
assess business value,
functional support, and
technical efficiency
• View application
assessments including
Business Value,
Functional Support and
Technical Efficiency
• Recommends actions on
applications (Renovate,
Maintain, Enhance..)
based on assessment
criteria
• Shows application
portfolio evolution over
time integrating
application lifecycle
• Decide the technologies that
comply with the IT policy rules
• Ensure that development
teams don’t use rogue
technologies that jeopardize
IT Solutions
• Detect application conflict
periods due to obsolete
underlying technologies
• List all underlying technology
components used in
applications
• Provides enhanced monitoring
of technologies lifecycle,
Obsolescence and Compliance
• Categorize your
technologies by domain
and View technology state
• Describe application input
and output data flows
• Includes one or many
business data items within
the same Application flow
• Define the data used by
each application
• Set how the application
processes data
IT Portfolio Management
HOPEX IT Portfolio Management solution makes it easy to streamline your IT assets, optimize
costs, and improve flexibility. It uses a three-step methodology to help you take an inventory and
perform a comprehensive assessment of your IT assets, and then develop and manage any
necessary transformation plans.
8 FITS Confidential
Manage:
• Collect your risk information
• Contextualize your risk information by
connecting it to surrounding organizational
components
• Plan and execute risk assessment campaigns
• Consolidate risk assessment results and
calculate net risk value
Control:
• Define risk mitigation strategies
• Design internal control activities required
to implement the selected mitigation
strategy with the control execution steps
• Conduct periodical control execution
assessments to evaluate controls’
effectiveness and compute residual risk
Comply:
• Define regulatory requirements (internal and
external)
• Define regulatory requirements
• Contextualize regulatory requirements and
specify related implementation components
• Conduct periodical compliance assessment
campaigns and define associated corrective
actions
Integrated Risk Management
HOPEX IRM uniquely leverages information managed by IT, Business or Privacy compliance to better
understand risk context and their impact on the business. Combined with other HOPEX solutions,
companies can effectively manage risks globally, ensuring employees share a common understanding of
the enterprise assets, processes and technologies while ensuring data privacy compliance.
Improve Risk visibility
• Collect your risks
• Assess your risks
• Define your risk mitigation
strategies
Strengthen Controls
• Design your controls
• Define control execution steps
• Assess your controls
• Define action plans
• Compute residual risk
• Manage incidents and corrective
actions
Enhance Compliance
• Define your regulatory
frameworks
• Define your compliance
requirements
• Assess your compliance
effectiveness
• Define your compliance action
plans
• Create a new Risk, capture all
relevant information and set
Risk Target & treatment
method.
• Define the context of a Risk
by specifying which
Processes, Entities,
Applications and Business
Lines are affected.
• Contributors can declare a
new Incident from their
dedicated Interface and
provide all the relevant
information.
• Contextualize the Incident
by specifying the
materialized Risk, the
failing Control and other
information
• Define applicable
frameworks
• Create framework
requirements
• Specify what parts of the
Organization have to
comply with the
Requirement
• Assess effectiveness of
implemented Controls
• Carry out analysis such as Risk
Trend or Risk Reduction.
• Define and monitor KRIs
• Track KRIs performance
through indicator status,
measurement freshness, and
time to failure
• prepare and launch an
assessment campaign to
automatically send out risk
assessment questionnaires
• Risks can be assessed in all
their possible contexts with
new assessment templates
• Create & define Controls and
describe how the Control is to
be implemented (processes), by
whom (entities) and what
(applications).
• specify control methods and
corresponding execution steps.
• Several Control execution steps
can be created
• prepare & launch automated
Control execution campaigns
9 FITS Confidential
Ensure Audit Effectiveness
• develop a consolidated schedule
for all audit plans
• Ensure best fit assignment of
auditors based on skills and
availability
• Ensure consistency of audit
activities using audit checklist
templates
Improve Audit Efficiency
• ensure online access to audit
background information
• Capture in real time all audit
findings
• Define recommendations
• Generate consolidated audit
report
Govern Audit Action Plans
• Convert recommendations into
action plans
• Enable real time monitoring and
follow up
• Ensure audit trail for all
corrective actions
• Improve accountability though
visibility of progress of audit
action plans
Plan:
• Define your audit list
• Schedule your audits based on importance
and effort
• Assign your audit team based on skills and
availability
• Prepare your audit check list or copy it from
an existing template
Execute:
• Receive audit assignment
• Access audit background information
during audit execution
• Capture findings against audit checklist and
define recommendations
• Consolidate audit team findings and
generate audit report
Follow up:
• Convert recommendations into audit action
plans
• Assign action plan owners
• Track action plan execution
Audit
HOPEX Audit allows you to manage your Internal Audit activities , manage your Auditors and
generate work programs/activity plans automatically. It helps you capture all background
information relevant to an activity as well as generate checklists for your Auditors. It also allows
you to document Findings, issue Recommendations, and launch follow-up Audits.
• build a Work program for the
Audits they are assigned to.
• Each Activity can have
Workpapers and any
background information
necessary for the Auditor to
carry out his/her tasks.
• If an Audit is recurrent,
Auditors can « cloning » an
already existing Audit’s Work
program
• The Lead Auditor can
consolidate and approve
the audit results.
• the Lead Auditor can
produce a draft Audit
Report and submit to the
Audit Director.
• The Audit Report presents
all Information relevant to
the Stakeholders.
• Recommendation
Owners can define
Action Plans to
implement
Recommendations and
assign them to the right
Action Owners
• Recommendation Owners can
follow-up on Action Plans
• Contributors can provide
progress updates and monitor
their Actions.
• Audit Activities are sent to the
Auditors they have been
assigned to.
• Auditors can then complete
the Activity and any Test
Sheets he/she has been given
to fill.
• Auditors can follow their audit
check list on the system
• They can document any
Findings and write the
corresponding
Recommendations
• Use audit everywhere mobile
app to perform your audits
online
10 FITS Confidential
HOPEX Power Studio provides admin users and configuration experts with the ability to customize the entire system to enable your
organization’s enterprise architecture practices and standards. The power studio allows you to customize your metamodel structure,
RTF reports, publisher portal, workflows, and various diagrams.
Reports Configuration
• Study the reporting
requirements and make sure
the required metamodel
configuration is in place.
• Use RTF descriptors to feed
the data into your report.
• Include diagrams, catalogues,
and matrices into your RTF
reports as needed.
Publisher Configuration
• Study the publisher portal
requirements and make sure the
required metamodel configuration
is in place.
• Use HTML descriptors to feed the
data into your portal.
• Leverage MEGA’s accelerator
template to bootstrap your
configuration.
• Include Diagrams, Catalogues,
Matrices, Dashboards, and other
outcomes in your publisher portal
• Give portal access to your
organization members without
any extra licenses.
Workflow
Configuration
• Use MEGA’s easy diagram
modeler to configure your
workflow.
• Assign the action
performers, state
transitions, and special
events.
• Write various scripts to
execute actions, make
calculations, lock objects,
and send automated
notifications.
Diagram Customization
• Use MEGA’s out-of-the box
TOGAF and Archimate stencils
as a baseline for your
diagrams.
• Configure the various diagram
stencils to include/exclude
objects as needed.
• Customize the diagram and
object look and feel to fit the
organization’s brand identity.
• Automatically set any
object’s shape based on
specific attributes.
Power Studio
Metamodel
Configuration
• Configure you metamodel,
classes, attributes, and
relationships.
• Use the available configuration
as your base to leverage the
out-of-the box functionality.
-Batch Process-
-Batch Node-
Owned Batch Node
1 Batch Node Owner
Batch Sequence Name
Batch Sequence
Owned Batch Sequence
1
Batch Behavior
1
Predecessor
Next Sequence
-Composite c lassifier-
-Classifier Component-
1
Successor
Previous Sequence
-Batch Call-
-Feature Type-
1 Called Batch Process
Batch Call
-Library Element-
-Feature Type-
System Process
System Process
Batch Realization
1
{Base Type}
Realized System Process
{Composite Realization}
System Process Batch Realization
{Owned Realization}
Owned System Process Realization
1
{Realizer Composite}
Realizer Batch Process
-Composite Realization-
-Property Owner-
{Owned Batch Node}
Owned Batch Call
{Batch Node Owner}
Batch Call Owner
-Element in Diagram- -Desc ribed Element-
-Requirement-driven Element-
-Requirement-driven Element-
11 FITS Confidential
HOPEX Power Supervisor provides power users with the necessary functionality to maintain the MEGA repository. It is the essential
tool set required for administrators to efficiently and effectively manage role-based access rights and permissions, confidentiality
areas, repository backups and management tasks scheduling and other administration features.
• Use or expand on the out-
of-the box MEGA user
profiles to conform with the
required access rights.
• Create new user profiles
from scratch or copy an
existing user profile.
• Define the access
permissions on the module,
diagram, object, page, and
attribute level.
User Access Rights
Management
• Backup and restore the
MEGA application database
to easily backtrack any
changes or errors.
• Choose and select
particular blocks of your
configuration to publish to
production with minimal
conflicts and issues.
Database Backups
• Enable LDAP authentication
using MEGA’s out-of-the
box adapter.
• Choose which users can
access the system via LDAP
and who can access using
MEGA native
authentication.
LDAP Integration
• Keep a watchful eye on the
application usage by
monitoring the currently
authenticated users and
the content they are
working on.
• Maintain an audit log of
the user access and change
history to easily track and
debug system errors.
Transaction Management
• Create your environment
• Specify the location where the
DB will be created
• Create the repository
associated with the
environment to store your
information
• Schedule periodic DB backups
Environment &
Repository
Management
Power Supervisor
12 FITS Confidential
Visual Intelligence
Automatically construct relationships-
based environment graph view showing all
meta classes connected to a specific object
with the ability to filter the relationships
displayed
Automatically construct multi-level
relationship tree views with the ability to
expend and collapse the different nodes
Develop connected tabular views between
related metaclasses to list relationships
information for the specific object type you
want to analyze
Environment Graph Dendrograms 360 Matrix Timeline
Auto construct timeline views from date
attributes captured on the metaclasses
13 FITS Confidential
Predictive Intelligence
Automatically build time based predictive model for the impact of target
architecture and transformation roadmap on business capabilities
Automatically predict technology obsolescence conflict based on
application lifecycle and technology lifecycle
14 FITS Confidential
MEGA Use Cases
Analyze
1.1
Baseline Architecture
1
2.1
Business Continuity Management
Manage
2.2
Data Glossary Management
2.3
Policy / Contract Management
2.4
Quality Management
2
4.1
Strategic Planning
4.2
Performance Management
Plan
4
6.2
Demand Management
6.1
Architecture Transformation Planning
Transform
6
5.1
Application Portfolio
Rationalization
5.3
Technology
Obsolescence
5.2
Business Process
Excellence
5.4
IT Service Costing
Optimize
5.5
Cloud Transformation
5
5.6
Process Mining
7.1
Solution Implementation Governance
7.3
Project Change Management
Implement
7.2
Software Development
7
7.4
Process Automation
3.3
Data Governance & Compliance
3.1
Governance, Risk, & Compliance
Control
3
3.2
Audit Management
MEGA comes with a library of use cases to enable the deployment of enterprise architecture in support of different scenarios.
The common aspect across all use cases, is the use of the enterprise information to drive the adoption of those different
practices. MEGA not only provides the modeling conventions to support each of those domains, but also enables specialized
functionality and reporting in addition to automating underlying processes using advanced workflow capabilities
15 FITS Confidential
Uses Cases Playbooks
Understand the key
challenges
Business Drivers
• Key Stakeholders
• Business Challenges
• Benefits
Define the sequence of
activities necessary to
complete the use case
Methodology
• Methodology phases
• Methodology steps
Define the list of business
outcomes required to
support the use case
Business Outcomes
• Data collection
requirements
• Usage and benefit
• Data collection
requirements
Each use case comes with the following three key components necessary to implement the specific capabilities required for each
scenario:
16 FITS Confidential
User Types License Types
Perpetual Licenses
Permanent licenses paid once and use on ongoing basis. An
annual maintenance cost of 21% is due to ensure upgrade
and support. Licenses will continue to work even if AMC is
not paid
On Premise Subscription Licenses
Licenses are rented on annual basis. The licenses are
installed on local machine provided by the client. The rental
is inclusive of annual maintenance cost. When subscription
period expires, the system will not be accessible anymore.
SaaS Subscription Licenses
Licenses are rented on annual basis. The licenses are
installed on a rented infrastructure included in the
subscription fees. When subscription period expires, the
system will not be accessible anymore.
Access Type
• Enter and maintain information
• Develop and update diagrams
• Collaborate
• Participate in workflows
• Navigate Repository
• Generate reports
• View dashboards
• Enter and maintain specific
information
• Collaborate
• Participate in workflows
• Navigate repository
• Generate reports
• View dashboards
• Navigate repository
• Generate reports
• View dashboards
Super User Contributor Viewer
Named Users
Client can define a limited
number of users as per license
quantity. Access is granted for
those specific users by name.
Concurrent Users
Client can define as many users
as they want but access is
limited to any defined users up
to the license quantity.
MEGA License Structures
PHONE & EMAIL
info@fits.consulting
+971 4 3903503
www.FITS.Consulting
HQ ADDRESS
Dubai Internet City
Building #17, Office G60
P.O. BOX 500628
Dubai, UAE
SOCIAL MEDIA
LinkedIn: FITS Consulting
Hank
you
P R O B L E M . S O L V E D .
F I T S C O N S U L T I N G
MANAGING PARTNER (UAE &
GCC)
Mike Merdinian
Mobile: +971 55 4284084
Mike.Merdinian@fits.consulting
MANAGING PARTNER (KSA &
GCC)
Abdallah El Kadi
Mobile: +966 56 1125098
Abdallah.Kadi@fits.consulting

Más contenido relacionado

Similar a MEGA Solution Footprint V5.pptx

WHAT IS BUSINESS ANALYTICS um hj mnjh nit 1 ppt only kjjn
WHAT IS BUSINESS ANALYTICS um hj mnjh nit 1 ppt only kjjnWHAT IS BUSINESS ANALYTICS um hj mnjh nit 1 ppt only kjjn
WHAT IS BUSINESS ANALYTICS um hj mnjh nit 1 ppt only kjjnRohitKumar639388
 
Best practice for_agile_ds_projects
Best practice for_agile_ds_projectsBest practice for_agile_ds_projects
Best practice for_agile_ds_projectsKhalid Kahloot
 
Business analytics why now_what next
Business analytics why now_what nextBusiness analytics why now_what next
Business analytics why now_what nextBohitesh Misra, PMP
 
Strategic Portfolio Management for IT
Strategic Portfolio Management for ITStrategic Portfolio Management for IT
Strategic Portfolio Management for ITiasaglobal
 
IT Operating Model - Fundamental
IT Operating Model - FundamentalIT Operating Model - Fundamental
IT Operating Model - FundamentalEryk Budi Pratama
 
Service Management Solution Framework (SMSF)
Service Management Solution Framework (SMSF)Service Management Solution Framework (SMSF)
Service Management Solution Framework (SMSF)Malcolm Ryder
 
Gaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptxGaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptxRobert Sheesley, CBA, CPHIMS
 
Ict mgmt processes_roles_competencies
Ict mgmt processes_roles_competenciesIct mgmt processes_roles_competencies
Ict mgmt processes_roles_competenciesSalegram Padhee
 
2PR57 - Senior Systems Analyst
2PR57 - Senior Systems Analyst2PR57 - Senior Systems Analyst
2PR57 - Senior Systems AnalystJoseph Dias
 
Accenture-Value-Realization-for-SAP
Accenture-Value-Realization-for-SAPAccenture-Value-Realization-for-SAP
Accenture-Value-Realization-for-SAPLionel Vuillemin
 
Supporting material for my Webinar to the ACS - June2017
Supporting material for my Webinar to the ACS - June2017Supporting material for my Webinar to the ACS - June2017
Supporting material for my Webinar to the ACS - June2017Daljit Banger
 
Msattaur_resume_2015_Analyst_4
Msattaur_resume_2015_Analyst_4Msattaur_resume_2015_Analyst_4
Msattaur_resume_2015_Analyst_4Mohamed Sattaur
 
About Element22 - Unlocking The Power Of Data
About Element22 - Unlocking The Power Of DataAbout Element22 - Unlocking The Power Of Data
About Element22 - Unlocking The Power Of DataElement22
 
White Paper-2-Mapping Manager-Bringing Agility To Business Intelligence
White Paper-2-Mapping Manager-Bringing Agility To Business IntelligenceWhite Paper-2-Mapping Manager-Bringing Agility To Business Intelligence
White Paper-2-Mapping Manager-Bringing Agility To Business IntelligenceAnalytixDataServices
 
Measurement Roadmap
Measurement RoadmapMeasurement Roadmap
Measurement RoadmapAni Lopez
 

Similar a MEGA Solution Footprint V5.pptx (20)

Transformação Digital de TI com EA
Transformação Digital de TI com EATransformação Digital de TI com EA
Transformação Digital de TI com EA
 
WHAT IS BUSINESS ANALYTICS um hj mnjh nit 1 ppt only kjjn
WHAT IS BUSINESS ANALYTICS um hj mnjh nit 1 ppt only kjjnWHAT IS BUSINESS ANALYTICS um hj mnjh nit 1 ppt only kjjn
WHAT IS BUSINESS ANALYTICS um hj mnjh nit 1 ppt only kjjn
 
Best practice for_agile_ds_projects
Best practice for_agile_ds_projectsBest practice for_agile_ds_projects
Best practice for_agile_ds_projects
 
Business analytics why now_what next
Business analytics why now_what nextBusiness analytics why now_what next
Business analytics why now_what next
 
Strategic Portfolio Management for IT
Strategic Portfolio Management for ITStrategic Portfolio Management for IT
Strategic Portfolio Management for IT
 
IT Operating Model - Fundamental
IT Operating Model - FundamentalIT Operating Model - Fundamental
IT Operating Model - Fundamental
 
Service Management Solution Framework (SMSF)
Service Management Solution Framework (SMSF)Service Management Solution Framework (SMSF)
Service Management Solution Framework (SMSF)
 
BA
BABA
BA
 
Gaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptxGaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptx
 
Benchmarking
BenchmarkingBenchmarking
Benchmarking
 
Data mining
Data miningData mining
Data mining
 
Ict mgmt processes_roles_competencies
Ict mgmt processes_roles_competenciesIct mgmt processes_roles_competencies
Ict mgmt processes_roles_competencies
 
2PR57 - Senior Systems Analyst
2PR57 - Senior Systems Analyst2PR57 - Senior Systems Analyst
2PR57 - Senior Systems Analyst
 
Accenture-Value-Realization-for-SAP
Accenture-Value-Realization-for-SAPAccenture-Value-Realization-for-SAP
Accenture-Value-Realization-for-SAP
 
Supporting material for my Webinar to the ACS - June2017
Supporting material for my Webinar to the ACS - June2017Supporting material for my Webinar to the ACS - June2017
Supporting material for my Webinar to the ACS - June2017
 
Msattaur_resume_2015_Analyst_4
Msattaur_resume_2015_Analyst_4Msattaur_resume_2015_Analyst_4
Msattaur_resume_2015_Analyst_4
 
About Element22 - Unlocking The Power Of Data
About Element22 - Unlocking The Power Of DataAbout Element22 - Unlocking The Power Of Data
About Element22 - Unlocking The Power Of Data
 
Chapter 10 supporting decision making
Chapter 10  supporting decision makingChapter 10  supporting decision making
Chapter 10 supporting decision making
 
White Paper-2-Mapping Manager-Bringing Agility To Business Intelligence
White Paper-2-Mapping Manager-Bringing Agility To Business IntelligenceWhite Paper-2-Mapping Manager-Bringing Agility To Business Intelligence
White Paper-2-Mapping Manager-Bringing Agility To Business Intelligence
 
Measurement Roadmap
Measurement RoadmapMeasurement Roadmap
Measurement Roadmap
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

MEGA Solution Footprint V5.pptx

  • 1. FITS Consulting Problem. Solved. MEGA Solution Platform Overview Collaborative Ecosystem for Transformation Lifecycle Management
  • 2. 2 FITS Confidential Administration Modules Communicate Transform Engage Common Modeling platform Architecture Modules Alerts Workflows Reports Dashboards Portals Social Collaboration Gap Analysis Planning Assessment Common Platform Capabilities Archimate Zachman UML BPMN SOA Micros-services 1 IT Business Management 2 Business Process Analysis 3 Information System 4 IT Architecture 5 IT Portfolio Management 6 Integrated Risk Management 7 Audit Unified Meta Model Strategy Business Data Application Infrastructure Security 8 9 Power Studio Power Supervisor Mega – Platform Components Artificial Intelligence Visual Intelligence Predictive Intelligence
  • 3. 3 FITS Confidential HOPEX IT Business Management allows you to describe company strategy in depth at each level of the organization and evaluate its alignment with the business initiatives. The modules also provides the ability to define, assess and plan business capabilities and to develop and manage the strategic initiative portfolio of the organization Align to strategic goals • Capture your company’s strategy including objectives and tactics. • Define transformation stages and then plan business capabilities required for each stage. Improve IT Strategic Planning • Build an IT strategic roadmap by connecting applications and projects to planned business capabilities. • Assess the impact of change on the existing IT landscape and quickly adjust as needed. Focus Investments on strategic projects • Prioritize future investments and IT projects based on strategic alignment. Plan: • Capture vision, objectives, strategy, and tactics • Map business capabilities and functionalities • Create value streams • Build strategic roadmap Optimize: • Automatically collect IT assets • Build a data glossary as central documentation for IT projects • Rationalize IT portfolio​ (apps, technology) • Create, share dashboards and ID cards of applications, technology and data Transform: • Identify IT transformation projects • Perform what-if analysis using transformation scenarios • Prioritize projects based on strategic alignment • Turn ideas into projects aligned to business outcomes • Define mission, vision, goals and strategy for the whole enterprise • Define objectives and tactics for each transformation stage • Value streams define the stages necessary to satisfy customers. • Link business capabilities to each stage of the value stream. • If capabilities are missing, identify the actions required to develop or acquire new business capabilities (build vs partner) • Map applications to business capabilities in business capability maps • Multiple criteria rendering are available thanks to user-defined icons and color coding • View how applications use the data of a data dictionary • Connect applications and data through data stores. • Perform impact analysis to understand the impact of an asset on the business and IT landscape • Prioritize projects based on assessment such as strategic alignment, deliverables and impacted capabilities IT Business Management
  • 4. 4 FITS Confidential Improve business efficiency • Model, analyze and standardize your business processes to improve business efficiency and support new business models Deliver Superior Customer Experience • Map customer journeys to design optimal processes and deliver superior customer experience Ensure Compliance with Policies and Regulations • Maintain business process models in a single repository, identify areas of concerns, and improve operations to drive compliance initiatives Improve: • Model your business process groups and their associated organizational processes • Develop organizational process maps and assign participants • Develop organizational models • Assign business processes to portfolios and assess processes based on custom criteria Delight: • Design customer journey per persona • Define pain points and customer expectations • Map journey steps to related touchpoints from the operating model • Assess customer journey steps by channel and define action plans Mitigate: • Define, classify and assess risks • Map risks to their related operating model components • Define risk mitigation strategies • Define internal controls • Evaluate effectiveness of controls and calculate residual risks • Describes main business processes • Describes a sequence of operations and participants • Assigns participants to organizational units of the company. • Design improved processes and Automatically highlights differences • Describes company organization (structures, departments, functions, people etc.) and external organization (clients, customers, partners) • Automatically build diagrams from a table entry • Improves user efficiency and helps save time • Allows users to focus on the process itself instead of spending time to design it • Enable users to assess processes through questionnaires, and standard and custom criteria such as execution (design, knowledge, IT support) and performance (business value, efficiency and risks) • Manage end-to-end customer experience, map and rank touchpoints in order to identify where to optimize/invest first • Link touchpoints to organization’s internal processes, and check how internal processes support the customer journey • Enables user to include risks and controls in process models • Contextualize risk by linking it to the different operating model components to improve analysis and design of mitigation strategies Business Process Analysis With Business Process Analysis, analysts can document, assess and analyse their operating model including organization structure, functions, people roles and responsibilities, processes, risks, policies and procedures and compliance requirements based on internal and international standards.
  • 5. 5 FITS Confidential Get Visibility Into Your Data • Build and leverage a data dictionary and a business glossary to improve business efficiency and ensure everybody shares a common understanding Ensure Data Integrity and Lineage • Map data lineage and view how data is transformed • Understand data usage by linking data to applications and processes • Assess data quality using the six dimensions of data quality • Analyze impact of change Demonstrate Data Compliance • Assign data governance roles • Upload and describe regulations or policy chapters and articles • Define the business rules related to articles • Tie rules to business processes to ensure their enforcement Model: • Build your data glossary to unify data definition based on business terminology • Model your conceptual and logical data models • Reverse engineer your physical data models • Map your data entities to business domains • Generate data reference model based on business domains with data criteria overlay Explore: • Define data lineage across internal and external applications • Explore data flows and auto-generate data lineage views • Explore the relationship between business concept and a technical data automatically Enforce: • Categorize your data entities • Assess your data entities based on specific set of criteria in line with the applicable regulatory requirements • Evaluate data compliance state based on applicable data regulatory requirements • Based on data dictionary, a full working Business Glossary can be initialized • Enrich glossary concept includes definitions, pictures and synonyms • Share the glossary across the organization • Describe the transformations that happen to the data including: • Applications and technologies for external systems. • Data origin, processing type, control measurement and subject. • Different types of flows • Understand how a business concept and a technical data are tied each other • View how applications use the data of a data dictionary • Connect applications and data through data stores. • Understand where data is used in processes to improve compliance • Assess data quality under the six dimensions of data quality including Completeness, Uniqueness, Timeliness, Consistency, Validation and Accuracy. • Categorize data as sensitive or golden. • Evaluate data compliance requirements • Includes all entities, their relationships and attributes. • Understand data requirements to achieve business objectives • Map data by business domains • Gives a comprehensive view on data per business domain to improve decision making • Assign data criteria such as data category (sensitive and golden data) to the business domains Information Architecture HOPEX Information Architecture provides the timely, in-depth information that enterprise information managers and business architects need to manage knowledge and data as an enterprise asset. With our solution, stakeholders can make collaborative, well-informed decisions about information usage across the various functions of your organization.
  • 6. 6 FITS Confidential Get a Clear Picture of Your IT Systems • Map applications and technologies, and how they interact with one another to identify efficiencies and avoid disruptions Tackle Continuous Business Changes • Keep current with agile developments and design future IT systems. Ensure that your IT stays ahead of the needs of the business Speed up Application Deployments • Precisely describe how technical components of an application can be deployed to avoid potential pitfalls Describe: • Define your applications’ environment scenarios to depicts external context • Define your applications’ structural views to describe your applications construct • Develop your application workflow models to express the logical sequence of execution Align: • Define your application functionalities • Map your applications to business capabilities to understand and evaluate business X IT alignment • Auto-generate your business capability x functionality map to explore how IT is supporting the business Deploy: • Define your application technology components and their relationships • Depict your applications’ technical deployment and infrastructures • Ensure optimal technology usage and deployment infrastructure • An environment architecture diagram represents the main exchanges between applications • Enables user to depict the same application in multiple scenarios • Describes all flows between applications and interfaces • Map applications to capabilities in business capability maps • Map applications to functionalities in functionality maps • Grouping Functionalities by capability helps identify business needs and identify overlaps. • Describes one possible configuration of the deployment of an application • Describes how the different application technical areas are connected to each other and the technologies and communication protocols they use. • Describes the servers, workstations, network and exchange protocols. • Communication Channels show physical connections between IT infrastructure objects. • Interactions show exchanges of information between processes hosted on infrastructure devices. • Provides a structural view of the Application System Environment. • It shows all the objects and communication paths that must exist in order for the scenarios to work. • Use Service Oriented Architecture to provide detailed description of application interactions • Describe workflows and sequences of tasks performed by applications • Tasks can be assigned to participants that represent applications, IT services or org- units (for interactive tasks). IT Architecture HOPEX IT Architecture provides IT Architects with an IT asset view, and helps them consolidate and update a consistent picture of applications and the technical infrastructure. It shows gaps in services, redundancies, the resources supporting different processes, and how the architecture aligns with business goals.
  • 7. 7 FITS Confidential Get visibility into IT landscape • Build a complete inventory of your IT assets including applications, technology and data by automatically collecting data • Get insight into the fitness of your IT landscape through dashboards and ID cards of applications, technology and data. Reduce Cost • Quickly identify the applications to eliminate or modernize using a collaborative approach • Clearly understand the impact of removing an application Mitigate Technology Risks • Get visibility into technology lifecycles and manage technology obsolescence • Define approved or unapproved technologies based on IT policy • View the impact of an obsolete or unapproved technology to applications and business capabilities. Inventory: • Collect your application information • Define your application functional and financial context • Capture your application business environment • Define your application lifecycle • Collect your application data related information Rationalize: • Group your applications into portfolios • Define your portfolio assessment criteria and weights • Plan and execute application assessment campaigns • Auto-generate application rationalization recommendations • Monitor rationalization execution Resolve: • Define your technology catalog • Capture your technology lifecycle • Define your company technology standards and • Auto-identify technology conflicts based on application and technology lifecycle evolution • Describe business areas supported by applications • Get a comprehensive view of the functional scope of an application • Define Application and Technology Lifecycle as well as deployment timeline • Launch campaigns to business and IT owners to assess business value, functional support, and technical efficiency • View application assessments including Business Value, Functional Support and Technical Efficiency • Recommends actions on applications (Renovate, Maintain, Enhance..) based on assessment criteria • Shows application portfolio evolution over time integrating application lifecycle • Decide the technologies that comply with the IT policy rules • Ensure that development teams don’t use rogue technologies that jeopardize IT Solutions • Detect application conflict periods due to obsolete underlying technologies • List all underlying technology components used in applications • Provides enhanced monitoring of technologies lifecycle, Obsolescence and Compliance • Categorize your technologies by domain and View technology state • Describe application input and output data flows • Includes one or many business data items within the same Application flow • Define the data used by each application • Set how the application processes data IT Portfolio Management HOPEX IT Portfolio Management solution makes it easy to streamline your IT assets, optimize costs, and improve flexibility. It uses a three-step methodology to help you take an inventory and perform a comprehensive assessment of your IT assets, and then develop and manage any necessary transformation plans.
  • 8. 8 FITS Confidential Manage: • Collect your risk information • Contextualize your risk information by connecting it to surrounding organizational components • Plan and execute risk assessment campaigns • Consolidate risk assessment results and calculate net risk value Control: • Define risk mitigation strategies • Design internal control activities required to implement the selected mitigation strategy with the control execution steps • Conduct periodical control execution assessments to evaluate controls’ effectiveness and compute residual risk Comply: • Define regulatory requirements (internal and external) • Define regulatory requirements • Contextualize regulatory requirements and specify related implementation components • Conduct periodical compliance assessment campaigns and define associated corrective actions Integrated Risk Management HOPEX IRM uniquely leverages information managed by IT, Business or Privacy compliance to better understand risk context and their impact on the business. Combined with other HOPEX solutions, companies can effectively manage risks globally, ensuring employees share a common understanding of the enterprise assets, processes and technologies while ensuring data privacy compliance. Improve Risk visibility • Collect your risks • Assess your risks • Define your risk mitigation strategies Strengthen Controls • Design your controls • Define control execution steps • Assess your controls • Define action plans • Compute residual risk • Manage incidents and corrective actions Enhance Compliance • Define your regulatory frameworks • Define your compliance requirements • Assess your compliance effectiveness • Define your compliance action plans • Create a new Risk, capture all relevant information and set Risk Target & treatment method. • Define the context of a Risk by specifying which Processes, Entities, Applications and Business Lines are affected. • Contributors can declare a new Incident from their dedicated Interface and provide all the relevant information. • Contextualize the Incident by specifying the materialized Risk, the failing Control and other information • Define applicable frameworks • Create framework requirements • Specify what parts of the Organization have to comply with the Requirement • Assess effectiveness of implemented Controls • Carry out analysis such as Risk Trend or Risk Reduction. • Define and monitor KRIs • Track KRIs performance through indicator status, measurement freshness, and time to failure • prepare and launch an assessment campaign to automatically send out risk assessment questionnaires • Risks can be assessed in all their possible contexts with new assessment templates • Create & define Controls and describe how the Control is to be implemented (processes), by whom (entities) and what (applications). • specify control methods and corresponding execution steps. • Several Control execution steps can be created • prepare & launch automated Control execution campaigns
  • 9. 9 FITS Confidential Ensure Audit Effectiveness • develop a consolidated schedule for all audit plans • Ensure best fit assignment of auditors based on skills and availability • Ensure consistency of audit activities using audit checklist templates Improve Audit Efficiency • ensure online access to audit background information • Capture in real time all audit findings • Define recommendations • Generate consolidated audit report Govern Audit Action Plans • Convert recommendations into action plans • Enable real time monitoring and follow up • Ensure audit trail for all corrective actions • Improve accountability though visibility of progress of audit action plans Plan: • Define your audit list • Schedule your audits based on importance and effort • Assign your audit team based on skills and availability • Prepare your audit check list or copy it from an existing template Execute: • Receive audit assignment • Access audit background information during audit execution • Capture findings against audit checklist and define recommendations • Consolidate audit team findings and generate audit report Follow up: • Convert recommendations into audit action plans • Assign action plan owners • Track action plan execution Audit HOPEX Audit allows you to manage your Internal Audit activities , manage your Auditors and generate work programs/activity plans automatically. It helps you capture all background information relevant to an activity as well as generate checklists for your Auditors. It also allows you to document Findings, issue Recommendations, and launch follow-up Audits. • build a Work program for the Audits they are assigned to. • Each Activity can have Workpapers and any background information necessary for the Auditor to carry out his/her tasks. • If an Audit is recurrent, Auditors can « cloning » an already existing Audit’s Work program • The Lead Auditor can consolidate and approve the audit results. • the Lead Auditor can produce a draft Audit Report and submit to the Audit Director. • The Audit Report presents all Information relevant to the Stakeholders. • Recommendation Owners can define Action Plans to implement Recommendations and assign them to the right Action Owners • Recommendation Owners can follow-up on Action Plans • Contributors can provide progress updates and monitor their Actions. • Audit Activities are sent to the Auditors they have been assigned to. • Auditors can then complete the Activity and any Test Sheets he/she has been given to fill. • Auditors can follow their audit check list on the system • They can document any Findings and write the corresponding Recommendations • Use audit everywhere mobile app to perform your audits online
  • 10. 10 FITS Confidential HOPEX Power Studio provides admin users and configuration experts with the ability to customize the entire system to enable your organization’s enterprise architecture practices and standards. The power studio allows you to customize your metamodel structure, RTF reports, publisher portal, workflows, and various diagrams. Reports Configuration • Study the reporting requirements and make sure the required metamodel configuration is in place. • Use RTF descriptors to feed the data into your report. • Include diagrams, catalogues, and matrices into your RTF reports as needed. Publisher Configuration • Study the publisher portal requirements and make sure the required metamodel configuration is in place. • Use HTML descriptors to feed the data into your portal. • Leverage MEGA’s accelerator template to bootstrap your configuration. • Include Diagrams, Catalogues, Matrices, Dashboards, and other outcomes in your publisher portal • Give portal access to your organization members without any extra licenses. Workflow Configuration • Use MEGA’s easy diagram modeler to configure your workflow. • Assign the action performers, state transitions, and special events. • Write various scripts to execute actions, make calculations, lock objects, and send automated notifications. Diagram Customization • Use MEGA’s out-of-the box TOGAF and Archimate stencils as a baseline for your diagrams. • Configure the various diagram stencils to include/exclude objects as needed. • Customize the diagram and object look and feel to fit the organization’s brand identity. • Automatically set any object’s shape based on specific attributes. Power Studio Metamodel Configuration • Configure you metamodel, classes, attributes, and relationships. • Use the available configuration as your base to leverage the out-of-the box functionality. -Batch Process- -Batch Node- Owned Batch Node 1 Batch Node Owner Batch Sequence Name Batch Sequence Owned Batch Sequence 1 Batch Behavior 1 Predecessor Next Sequence -Composite c lassifier- -Classifier Component- 1 Successor Previous Sequence -Batch Call- -Feature Type- 1 Called Batch Process Batch Call -Library Element- -Feature Type- System Process System Process Batch Realization 1 {Base Type} Realized System Process {Composite Realization} System Process Batch Realization {Owned Realization} Owned System Process Realization 1 {Realizer Composite} Realizer Batch Process -Composite Realization- -Property Owner- {Owned Batch Node} Owned Batch Call {Batch Node Owner} Batch Call Owner -Element in Diagram- -Desc ribed Element- -Requirement-driven Element- -Requirement-driven Element-
  • 11. 11 FITS Confidential HOPEX Power Supervisor provides power users with the necessary functionality to maintain the MEGA repository. It is the essential tool set required for administrators to efficiently and effectively manage role-based access rights and permissions, confidentiality areas, repository backups and management tasks scheduling and other administration features. • Use or expand on the out- of-the box MEGA user profiles to conform with the required access rights. • Create new user profiles from scratch or copy an existing user profile. • Define the access permissions on the module, diagram, object, page, and attribute level. User Access Rights Management • Backup and restore the MEGA application database to easily backtrack any changes or errors. • Choose and select particular blocks of your configuration to publish to production with minimal conflicts and issues. Database Backups • Enable LDAP authentication using MEGA’s out-of-the box adapter. • Choose which users can access the system via LDAP and who can access using MEGA native authentication. LDAP Integration • Keep a watchful eye on the application usage by monitoring the currently authenticated users and the content they are working on. • Maintain an audit log of the user access and change history to easily track and debug system errors. Transaction Management • Create your environment • Specify the location where the DB will be created • Create the repository associated with the environment to store your information • Schedule periodic DB backups Environment & Repository Management Power Supervisor
  • 12. 12 FITS Confidential Visual Intelligence Automatically construct relationships- based environment graph view showing all meta classes connected to a specific object with the ability to filter the relationships displayed Automatically construct multi-level relationship tree views with the ability to expend and collapse the different nodes Develop connected tabular views between related metaclasses to list relationships information for the specific object type you want to analyze Environment Graph Dendrograms 360 Matrix Timeline Auto construct timeline views from date attributes captured on the metaclasses
  • 13. 13 FITS Confidential Predictive Intelligence Automatically build time based predictive model for the impact of target architecture and transformation roadmap on business capabilities Automatically predict technology obsolescence conflict based on application lifecycle and technology lifecycle
  • 14. 14 FITS Confidential MEGA Use Cases Analyze 1.1 Baseline Architecture 1 2.1 Business Continuity Management Manage 2.2 Data Glossary Management 2.3 Policy / Contract Management 2.4 Quality Management 2 4.1 Strategic Planning 4.2 Performance Management Plan 4 6.2 Demand Management 6.1 Architecture Transformation Planning Transform 6 5.1 Application Portfolio Rationalization 5.3 Technology Obsolescence 5.2 Business Process Excellence 5.4 IT Service Costing Optimize 5.5 Cloud Transformation 5 5.6 Process Mining 7.1 Solution Implementation Governance 7.3 Project Change Management Implement 7.2 Software Development 7 7.4 Process Automation 3.3 Data Governance & Compliance 3.1 Governance, Risk, & Compliance Control 3 3.2 Audit Management MEGA comes with a library of use cases to enable the deployment of enterprise architecture in support of different scenarios. The common aspect across all use cases, is the use of the enterprise information to drive the adoption of those different practices. MEGA not only provides the modeling conventions to support each of those domains, but also enables specialized functionality and reporting in addition to automating underlying processes using advanced workflow capabilities
  • 15. 15 FITS Confidential Uses Cases Playbooks Understand the key challenges Business Drivers • Key Stakeholders • Business Challenges • Benefits Define the sequence of activities necessary to complete the use case Methodology • Methodology phases • Methodology steps Define the list of business outcomes required to support the use case Business Outcomes • Data collection requirements • Usage and benefit • Data collection requirements Each use case comes with the following three key components necessary to implement the specific capabilities required for each scenario:
  • 16. 16 FITS Confidential User Types License Types Perpetual Licenses Permanent licenses paid once and use on ongoing basis. An annual maintenance cost of 21% is due to ensure upgrade and support. Licenses will continue to work even if AMC is not paid On Premise Subscription Licenses Licenses are rented on annual basis. The licenses are installed on local machine provided by the client. The rental is inclusive of annual maintenance cost. When subscription period expires, the system will not be accessible anymore. SaaS Subscription Licenses Licenses are rented on annual basis. The licenses are installed on a rented infrastructure included in the subscription fees. When subscription period expires, the system will not be accessible anymore. Access Type • Enter and maintain information • Develop and update diagrams • Collaborate • Participate in workflows • Navigate Repository • Generate reports • View dashboards • Enter and maintain specific information • Collaborate • Participate in workflows • Navigate repository • Generate reports • View dashboards • Navigate repository • Generate reports • View dashboards Super User Contributor Viewer Named Users Client can define a limited number of users as per license quantity. Access is granted for those specific users by name. Concurrent Users Client can define as many users as they want but access is limited to any defined users up to the license quantity. MEGA License Structures
  • 17. PHONE & EMAIL info@fits.consulting +971 4 3903503 www.FITS.Consulting HQ ADDRESS Dubai Internet City Building #17, Office G60 P.O. BOX 500628 Dubai, UAE SOCIAL MEDIA LinkedIn: FITS Consulting Hank you P R O B L E M . S O L V E D . F I T S C O N S U L T I N G MANAGING PARTNER (UAE & GCC) Mike Merdinian Mobile: +971 55 4284084 Mike.Merdinian@fits.consulting MANAGING PARTNER (KSA & GCC) Abdallah El Kadi Mobile: +966 56 1125098 Abdallah.Kadi@fits.consulting