Category Archives: Enterprise Architecture

SABSA – in 3 minutes

The basics of SABSA SABSA is a framework for developing risk-driven enterprise information security and information assurance architectures and for delivering security infrastructure solutions that support critical business initiatives. It is an open standard, comprising a number of frameworks, models, methods and processes,  free for use by all, with no licensing…

TOGAF® Version 9.1- in 3 minutes

1   Title/current version TOGAF® Version 9.1, an Open Group Standard 2   The basics TOGAF® – the Enterprise Architecture standard used by the world’s leading organizations to improve business efficiency. 3   Summary TOGAF®, is a proven Enterprise Architecture methodology and framework used by the world’s leading organizations to improve business efficiency….

ArchiMate® 3.0.1 – in 3 minutes

The basics The ArchiMate Specification is a modeling language that enables Enterprise Architects to describe, analyze and visualize relationships among architecture domains using easy to understand visuals representations. It provides a common language for describing how various parts of the enterprise are constructed and how they operate, including business processes,…

An Introduction to the ArchiMate® 3.0 Specification

A White Paper by: Andrew Josey, Marc Lankhorst, Iver Band, Henk Jonkers, and Dick Quartel June 2016 An Introduction to the ArchiMate® 3.0 Specification Copyright © 2016, The Open Group The Open Group hereby authorizes you to use this document for any purpose, PROVIDED THAT any copy of this document,…

The Open Group IT4IT™ Standard – in 3 minutes

1 Title/Current Version IT4IT™ Reference Architecture Version 2.1, an Open Group Standard 2 The Basics The Open Group IT4IT Reference Architecture is a standard reference architecture for managing the business of IT. It uses a value chain approach to create a model of the functions that IT performs to help…

The Open Trusted Technology Provider™ Standard (O-TTPS) – approved as ISO/IEC 20243:2015 and the O-TTPS Certification Program – in 3 minutes

Introduction The increase of cybersecurity threats, along with the global nature of Information and Communication Technology (ICT), results in a threat landscape ripe for the introduction of tainted (e.g., malware-enabled or malware-capable) and counterfeit components into ICT products. This poses significant risk to customers in the operation of their business…