Enterprise Architecture Practice and Technology Security

Unformatted text preview:

Running head: Enterprise Architecture practice and technology security 1Enterprise Architecture practice and technology securityRunning head: Enterprise Architecture practice and technology security 1Enterprise Architecture practice and technology securityStudent's NameCourseProfessor's NameUniversityCityDateEnterprice Architecture Practice21. Based on your research, describe how an Enterprise Architecture practice can contributeto technology security.In my previous discussion, I discussed how enterprise architecture can be implemented inorganizational applications domains to solve operational issues effectively. We found out that Enterprise architecture practices solve maintenance problems by ensuring the architecture is flexible and open for any additional features. They also solve integration and scalability issues bymaking the architecture compatible with all required software and enabling the application to support multiple features and users, respectively, but we didn’t look at how they can contribute tothat technology security.The cornerstone of technology security is solid and lean on Enterprise Architecture, which helps to reduce technology insecurity in an organization. Since enterprise architecture has a 360-degree view of the enterprise, protection may be incorporated early in the planning phase, lowering the risks associated with new implementations. When it comes to defense, enterprise architecture always is at the wheel!Enterprise Architecture aids in the detection and elimination of Technology insecurities posed by shadow IT, redundant software, and other IT blunders. For example, a company can getthe best possible view of its existing technology assets by having an up-to-date view of the entireArchitecture. And using a technology stack to group the applications to determine the versions that are in use could help contribute the same technology’s security Some organizations also enhance technology protection by ensuring fixes and patches areapplied proactively using enterprise architecture and a collaborative and use tool like leanix. ThisApplication Landscape, heat map shows which applications are at risk because the underlying ITEnterprice Architecture Practice3components have reached the end of their lifecycle, and the IT Component Matrix of leanixmakes redundant IT components easy to find.Enterprice Architecture Practice4References Sarah Glittenberg (August 15, 2018), Enterprise Architecture plays a significant role in security management, retrieved from


View Full Document

Enterprise Architecture Practice and Technology Security

Download Enterprise Architecture Practice and Technology Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Enterprise Architecture Practice and Technology Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Enterprise Architecture Practice and Technology Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?