Architecture & Security

The agitility of Digitisation involves a whole new set of requirements – without question, this will affect your business as well as technical architecture of your IT system landscape. Digital transformation of IT Architecture is hardly a revolution, but rather accelarated evolution. Existing technologies and systems must surface in order to meet the challenges of today’s Digital world.

Core topics for transforming Architecture:

  • Breaking up of „functional silos“: Big, monolithic IT systems are not flexible enough, to meet ever changing demand. To be future-proof, solutions must be highly modular and orchestrated in a most flexible way. „All-In-One“ has been of little avail in the past, even more so in the digital age. It’s not about ripping and replacing existing IT investments, but make them fit for the digital world. Service-oriented Architecture („SOA“) are of even greater significance today.
  • Removal of physical boundaries: Architecture of the digital world communicate across data centers and companies, limiting redudancies and increasing efficiency. Mobility as part of the digital transformation calls for opening of closed corporate networks as well as the integration of Cloud services.

MWith the flexibilisation of solutions and the opening of corporate IT towards partners and customers, it becomes necessary to shed a different light on the subject of IT security. Within the framework of digitization, many existing topics must be viewed in a different light:

  • „Identity Management“: The identification of users can no longer be done solely on the basis of the company’s own data. Customers, partners and employees use a variety of services and functions within and outside the company and must be identifiable at all times. Depending on the criticality of the data, strong authentication measures (“PKI”, “two-factor”, “three-factor”) must be used and positions of trust established.
  • Rights Management / Authorization: Existing technologies for controlling user access to information must be more strongly established. It is important to be able to flexibly adapt access rights to changing requirements at any time.
  • Protection of corporate know-how: With the increasing use of cloud services, existing protection measures (“isolation”) are becoming increasingly unsuitable for protecting the company’s intellectual property against unauthorized access. The storage of data in the private or public cloud requires suitable encryption measures for storage (“data at rest”) as well as for transmission (“data in motion”).


Let's talk.

Your contact

Michael Schießl