Architecture and Technology Support

A CONCISE AND CONSISTENT VISION IN THE DEVELOPMENT OF IT ARCHITECTURES AND THE SELECTION OF TECHNOLOGIES, VENDORS AND PRODUCTS.

This area of KuppingerCole Analysts Advisory Services falls into two separate, but closely related parts: Architecture Design and Vendor Selection & Choice of Tools.

KuppingerCole pursues a clear and stringent vision for the development of IT architectures and technology selection: the actual product decisions are at the end of a clearly defined process. The starting points are the documentation and recording of the requirements and framework conditions that are relevant for the provision of the services achieved. On this basis, exemplary usage scenarios are defined that describe the system to be implemented as comprehensively as possible. In accordance with established modelling methods, capabilities & building blocks are derived, which are subsequently used in the actual composition of the architecture blueprint.

At that point, capabilities and architectural blocks are mapped to potential IT systems. Thus, a clear dividing line between architecture design and system selection can be drawn.

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

Get Full Access

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Sign Up now

Blog

Blog

OVHCloud Bets on Shift Back to Private Cloud

There is more to the cloud than AWS, Azure, IBM and Google according to OVHCloud - the new name for OVH as it celebrates its 20th anniversary. While the big four have carved up the public cloud between them, the French cloud specialist believes that business needs are changing, which gives them an opportunity in the enterprise market it is now targeting. In short, OVHCloud believes there is a small, but discernible shift back to the private cloud - for security and compliance imperatives. That [...]

Stay Connected

Latest Insights

Next Webinar

Webinar

6 Myths of Privileged Access Management Busted

Industry thought leaders have stated that if there is only one project you can tackle to improve the security of your organization it should be Privileged Access Management (PAM). But successfully securing and managing privileged access is a tough task and is only getting harder to solve.

Next Conference

Conference

Cybersecurity Leadership Summit 2019

In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS19) in Berlin, Germany, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management, Data Security and Social Engineering threats.