Professional Documents
Culture Documents
MEGA Solution Footprint V5
MEGA Solution Footprint V5
Problem. Solved.
1 2 3 4 5 6 7
Administration Modules
2 FITS Confidential
HOPEX IT Business Management allows you to describe company strategy in depth at each level
IT Business Management of the organization and evaluate its alignment with the business initiatives. The modules also
provides the ability to define, assess and plan business capabilities and to develop and manage
the strategic initiative portfolio of the organization
3 FITS Confidential
With Business Process Analysis, analysts can document, assess and analyse their operating model
Business Process Analysis including organization structure, functions, people roles and responsibilities, processes, risks,
policies and procedures and compliance requirements based on internal and international
standards.
• Enable users to assess • Manage end-to-end • Enables user to include risks Ensure Compliance with
Step 3
Mitigate: processes through customer experience, map and controls in process Policies and Regulations
• Define, classify and assess risks questionnaires, and standard and rank touchpoints in models
• Map risks to their related operating model and custom criteria such as order to identify where to • Contextualize risk by linking it • Maintain business process
components execution (design, knowledge, optimize/invest first to the different operating models in a single repository,
• Define risk mitigation strategies IT support) and performance • Link touchpoints to model components to identify areas of concerns, and
(business value, efficiency and organization’s internal improve analysis and design improve operations to drive
• Define internal controls risks) processes, and check how of mitigation strategies compliance initiatives
• Evaluate effectiveness of controls and internal processes support
calculate residual risks the customer journey
4 FITS Confidential
HOPEX Information Architecture provides the timely, in-depth information that enterprise
Information Architecture information managers and business architects need to manage knowledge and data as an
enterprise asset. With our solution, stakeholders can make collaborative, well-informed decisions
about information usage across the various functions of your organization.
• Describe the transformations • Understand how a business • Assess data quality under the Demonstrate Data Compliance
Step 3
Enforce: that happen to the data concept and a technical six dimensions of data quality • Assign data governance roles
• Categorize your data entities including: data are tied each other including Completeness, • Upload and describe
• Assess your data entities based on specific set • Applications and • View how applications use Uniqueness, Timeliness, regulations or policy chapters
of criteria in line with the applicable technologies for external the data of a data Consistency, Validation and
and articles
systems. dictionary Accuracy.
regulatory requirements • Data origin, processing • •
• Define the business rules
Connect applications and Categorize data as sensitive or
• Evaluate data compliance state based on type, control data through data stores. golden. related to articles
applicable data regulatory requirements measurement and • Understand where data is • Evaluate data compliance • Tie rules to business processes
subject. used in processes to requirements to ensure their enforcement
• Different types of flows improve compliance
5 FITS Confidential
HOPEX IT Architecture provides IT Architects with an IT asset view, and helps them consolidate
IT Architecture and update a consistent picture of applications and the technical infrastructure. It shows gaps in
services, redundancies, the resources supporting different processes, and how the architecture
aligns with business goals.
• Map applications to • Describes one possible • Describes the servers, Speed up Application
Step 3
Deploy: capabilities in business configuration of the workstations, network and Deployments
• Define your application technology capability maps deployment of an exchange protocols.
•
• Precisely describe how
components and their relationships • Map applications to application Communication Channels
show physical connections technical components of an
• Depict your applications’ technical functionalities in • Describes how the different
between IT infrastructure application can be deployed
deployment and infrastructures functionality maps application technical areas objects. to avoid potential pitfalls
• Ensure optimal technology usage and • Grouping Functionalities by are connected to each • Interactions show exchanges
deployment infrastructure capability helps identify other and the technologies of information between
business needs and identify and communication processes hosted on
overlaps. protocols they use. infrastructure devices.
6 FITS Confidential
HOPEX IT Portfolio Management solution makes it easy to streamline your IT assets, optimize
IT Portfolio Management costs, and improve flexibility. It uses a three-step methodology to help you take an inventory and
perform a comprehensive assessment of your IT assets, and then develop and manage any
necessary transformation plans.
• Launch campaigns to • Recommends actions on • Decide the technologies that Mitigate Technology Risks
Step 3
Resolve: business and IT owners to applications (Renovate, comply with the IT policy rules
• Get visibility into technology
• Define your technology catalog assess business value, Maintain, Enhance..) • Ensure that development
teams don’t use rogue lifecycles and manage technology
• Capture your technology lifecycle functional support, and based on assessment obsolescence
technologies that jeopardize IT
• Define your company technology standards technical efficiency criteria Solutions • Define approved or unapproved
and • View application • Shows application • technologies based on IT policy
Detect application conflict
• Auto-identify technology conflicts based on assessments including portfolio evolution over • View the impact of an obsolete or
periods due to obsolete
Business Value, Functional time integrating unapproved technology to
application and technology lifecycle evolution underlying technologies
application lifecycle applications and business
Support and Technical capabilities.
Efficiency
7 FITS Confidential
HOPEX IRM uniquely leverages information managed by IT, Business or Privacy compliance to better
Integrated Risk Management understand risk context and their impact on the business. Combined with other HOPEX solutions,
companies can effectively manage risks globally, ensuring employees share a common understanding of
the enterprise assets, processes and technologies while ensuring data privacy compliance.
• Contributors can declare a • Define applicable • Carry out analysis such as Risk Enhance Compliance
Step 3
Comply: new Incident from their frameworks Trend or Risk Reduction. • Define your regulatory
• Define regulatory requirements (internal and dedicated Interface and • Create framework • Define and monitor KRIs
frameworks
requirements • Track KRIs performance
external) provide all the relevant • Define your compliance
• Specify what parts of the through indicator status,
• Define regulatory requirements information. requirements
measurement freshness, and
• Contextualize regulatory requirements and • Contextualize the Incident Organization have to • Assess your compliance
time to failure
comply with the effectiveness
specify related implementation components by specifying the •
Requirement Define your compliance action
• Conduct periodical compliance assessment materialized Risk, the plans
• Assess effectiveness of
campaigns and define associated corrective failing Control and other
implemented Controls
actions information
8 FITS Confidential
HOPEX Audit allows you to manage your Internal Audit activities , manage your Auditors and
Audit generate work programs/activity plans automatically. It helps you capture all background
information relevant to an activity as well as generate checklists for your Auditors. It also allows
you to document Findings, issue Recommendations, and launch follow-up Audits.
• The Lead Auditor can • Recommendation • Recommendation Owners can Govern Audit Action Plans
Step 3
Follow up: consolidate and approve Owners can define follow-up on Action Plans
• Convert recommendations into
• Convert recommendations into audit action the audit results. Action Plans to • Contributors can provide
progress updates and monitor action plans
plans • the Lead Auditor can implement • Enable real time monitoring and
Recommendations and their Actions.
• Assign action plan owners produce a draft Audit follow up
• Track action plan execution Report and submit to the assign them to the right • Ensure audit trail for all corrective
Audit Director. Action Owners actions
• The Audit Report presents • Improve accountability though
visibility of progress of audit
all Information relevant to action plans
the Stakeholders.
9 FITS Confidential
Power Studio
HOPEX Power Studio provides admin users and configuration experts with the ability to customize the entire system to enable your
organization’s enterprise architecture practices and standards. The power studio allows you to customize your metamodel structure,
RTF reports, publisher portal, workflows, and various diagrams.
System Process
Suc c e s sor
Pre vious Se qu e nc e 1
-C la ss ifi e r Co m po ne nt -
{Ow ne d Ba tch Node }
Owne d Ba tc h Ca ll Ba tc h Ca ll
-B at c h C all-
• Configure you metamodel, • • Study the publisher portal • • Use MEGA’s out-of-the box
Study the reporting Use MEGA’s easy diagram
requirements and make sure the
classes, attributes, and requirements and make sure modeler to configure your TOGAF and Archimate stencils
required metamodel configuration
relationships. the required metamodel is in place. workflow. as a baseline for your
• Use the available configuration configuration is in place. • Use HTML descriptors to feed the • Assign the action diagrams.
as your base to leverage the • Use RTF descriptors to feed data into your portal. performers, state • Configure the various diagram
out-of-the box functionality. the data into your report. • Leverage MEGA’s accelerator transitions, and special stencils to include/exclude
• Include diagrams, catalogues, template to bootstrap your objects as needed.
configuration. events. •
and matrices into your RTF Customize the diagram and
• Include Diagrams, Catalogues, • Write various scripts to object look and feel to fit the
reports as needed. Matrices, Dashboards, and other execute actions, make organization’s brand identity.
outcomes in your publisher portal calculations, lock objects,
• Give portal access to your
• Automatically set any
and send automated object’s shape based on
organization members without
any extra licenses. notifications. specific attributes.
10 FITS Confidential
Power Supervisor
HOPEX Power Supervisor provides power users with the necessary functionality to maintain the MEGA repository. It is the essential
tool set required for administrators to efficiently and effectively manage role-based access rights and permissions, confidentiality
areas, repository backups and management tasks scheduling and other administration features.
Environment &
User Access Rights LDAP Integration Database Backups Transaction Management
Repository
Management
Management
11 FITS Confidential
Visual Intelligence
Automatically construct relationships- Automatically construct multi-level Develop connected tabular views between Auto construct timeline views from date
based environment graph view showing all relationship tree views with the ability to related metaclasses to list relationships attributes captured on the metaclasses
meta classes connected to a specific object expend and collapse the different nodes information for the specific object type you
with the ability to filter the relationships want to analyze
displayed
12 FITS Confidential
Predictive Intelligence
Automatically build time based predictive model for the impact of target Automatically predict technology obsolescence conflict based on
architecture and transformation roadmap on business capabilities application lifecycle and technology lifecycle
13 FITS Confidential
MEGA Use Cases MEGA comes with a library of use cases to enable the deployment of enterprise architecture in support of different scenarios.
The common aspect across all use cases, is the use of the enterprise information to drive the adoption of those different
practices. MEGA not only provides the modeling conventions to support each of those domains, but also enables specialized
functionality and reporting in addition to automating underlying processes using advanced workflow capabilities
6.1 6.2
6 Transform Architecture Transformation Planning Demand Management
4.1 4.2
4 Plan Strategic Planning Performance Management
1.1
1 Analyze Baseline Architecture
14 FITS Confidential
Uses Cases Playbooks Each use case comes with the following three key components necessary to implement the specific capabilities required for each
scenario:
Understand the key Define the sequence of Define the list of business
challenges activities necessary to outcomes required to
complete the use case support the use case
15 FITS Confidential
MEGA License Structures
Perpetual Licenses
Permanent licenses paid once and use on ongoing basis. An
annual maintenance cost of 21% is due to ensure upgrade
and support. Licenses will continue to work even if AMC is
not paid
• Enter and maintain information • Enter and maintain specific • Navigate repository
• Develop and update diagrams information • Generate reports
• Collaborate • Collaborate • View dashboards Access Type
• Participate in workflows • Participate in workflows
• Navigate Repository • Navigate repository
• Generate reports Named Users Concurrent Users
• Generate reports Client can define a limited Client can define as many users
• View dashboards • View dashboards number of users as per license as they want but access is
quantity. Access is granted for limited to any defined users up
those specific users by name. to the license quantity.
16 FITS Confidential
Hank you
F I T S C O N S U L T I N G
P R O B L E M . S O L V E D .
MANAGING PARTNER (UAE & MANAGING PARTNER (KSA & PHONE & EMAIL SOCIAL MEDIA HQ ADDRESS
GCC) GCC) info@fits.consulting LinkedIn: FITS Consulting Dubai Internet City
Mike Merdinian Abdallah El Kadi +971 4 3903503 Building #17, Office G60
Mobile: +971 55 4284084 Mobile: +966 56 1125098 www.FITS.Consulting P.O. BOX 500628