Technical architecture: What IT does for a living

CIO Governance

Technical architecture is the sum and substance of what IT deploys to support the enterprise. Which leads to the question, What constitutes good technical architecture? Or more foundationally, What constitutes technical architecture, whether good, bad, or indifferent?

The role of IT architecture in a transformed banking experience

Citrix

To put the challenger banks’ development into perspective, Monzo … The post The role of IT architecture in a transformed banking experience first appeared on Citrix Blogs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

What to know about zero trust architectures

Citrix

Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote or hybrid work models.

Zero trust architecture benefits for your business

Citrix

But in reality, there’s no telling how or when a malicious actor might … The post Zero trust architecture benefits for your business first appeared on Citrix Blogs.

What is a Tiered Resiliency Architecture and Why Does it Matter?

Solutions Review

In this submission, Pure Storage CTO Andy Stone offers an introduction to tiered resiliency architectures for fast ransomware recovery. Tiered Resiliency Architecture. A tiered resiliency architecture is a future-proof way to build speed and durability into a recovery strategy.

Implementing Multi-Region Disaster Recovery Using Event-Driven Architecture

AWS Disaster Recovery

In this blog post, we share a reference architecture that uses a multi-Region active/passive strategy to implement a hot standby strategy for disaster recovery (DR). DR implementation architecture on multi-Region active/passive workloads.

What is Hybrid Cloud Architecture? How does it work?

Acronis

Modern business IT demands connections that are faster, more intricate, and constantly available.

What is data architecture? A framework for managing data

CIO Governance

Data architecture definition . Data architecture describes the structure of an organization's logical and physical data assets and data management resources, according to The Open Group Architecture Framework (TOGAF).

IT Resilience Within AWS Cloud, Part II: Architecture and Patterns

AWS Disaster Recovery

In Part II, we’ll provide technical considerations related to architecture and patterns for resilience in AWS Cloud. Considerations on architecture and patterns. Resilience is an overarching concern that is highly tied to other architecture attributes.

Journey to Adopt Cloud-Native Architecture Series: #3 – Improved Resilience and Standardized Observability

AWS Disaster Recovery

In this blog, we talk about architecture patterns to improve system resiliency, why observability matters, and how to build a holistic observability solution. Current Architecture with improved resiliency and standardized observability.

Disaster Recovery (DR) Architecture on AWS, Part II: Backup and Restore with Rapid Recovery

AWS Disaster Recovery

In Figure 5, we show a possible architecture for detecting and responding to events that impact your workload availability. Disaster Recovery (DR) Architecture on AWS, Part I: Strategies for Recovery in the Cloud.

Using Route 53 Private Hosted Zones for Cross-account Multi-region Architectures

AWS Disaster Recovery

Route 53 Private Hosted Zones (PHZs) and Resolver endpoints on AWS create an architecture best practice for centralized DNS in hybrid cloud environment. This blog presents an architecture that provides a unified view of the DNS while allowing different AWS accounts to manage subdomains.

Disaster Recovery (DR) Architecture on AWS, Part IV: Multi-site Active/Active

AWS Disaster Recovery

The architecture in Figure 2 shows you how to use AWS Regions as your active sites, creating a multi-Region active/active architecture. I use Amazon DynamoDB for the example architecture in Figure 2.

U.S. Office of Management and Budget Introduces New Zero Trust Architecture Strategy

Security Industry Association

In a presidential response to reinforce federal defenses against threats to public safety, infrastructure and privacy, a new zero trust architecture (ZTA) strategy, requiring agencies to meet specific cybersecurity standards and objectives by the end of 2024, is being implemented.

Five Reasons to Consider Upgrading to a Modern, Open-Architecture Access Control System

Security Industry Association

The best way to minimize costs and streamline the transition is to select an open-architecture solution for access control. Here are five reasons to consider upgrading your access control system to a modern, open-architecture solution. Open-architecture solutions allow for scalability.

Scaling Software Builds in Azure with FlashBlade in a Cloud-Adjacent Architecture

Pure Storage

Pure Storage ® , Azure, and Equinix have collaborated to develop a connected-cloud architecture for EDA and highly parallel HPC workloads, such as software build and testing. There are many advantages to this particular architecture. We conducted a performance test of this architecture.

Scaling Software Builds in Azure with FlashBlade in a Cloud-Adjacent Architecture

Pure Storage

Pure Storage ® , Azure, and Equinix have collaborated to develop a connected-cloud architecture for EDA and highly parallel HPC workloads, such as software build and testing. There are many advantages to this particular architecture. We conducted a performance test of this architecture.

Disaster Recovery (DR) Architecture on AWS, Part III: Pilot Light and Warm Standby

AWS Disaster Recovery

In a previous blog post , I showed how quick detection is essential for low RTO, and I shared a serverless architecture to achieve this. Disaster Recovery (DR) Architecture on AWS, Part I: Strategies for Recovery in the Cloud.

What is a Tiered Resiliency Architecture and Why Does it Matter?

Continuity Insights

Ransomware attacks are increasing at an unprecedented rate while the level of their sophistication continues to rise. In fact, according to industry estimates, the global damage caused by ransomware could cost $265 billion by 2031. Simply put, ransomware attacks are presenting an incredibly frequent (and expensive) risk to modern businesses. So how can organizations combat this growing. Source. Crisis Communication Cyber Disaster Recovery Enterprise Risk Management

The Impact of Enterprise Architecture on Business Continuity and Disaster Recovery

Continuity Insights

By Nick Murison, CISO at Ardoq: Over the past year and a half, businesses have had to navigate what feels like never-ending uncertainty and disruption – highlighting the importance of business continuity and disaster recovery planning. At the onset of the COVID-19 pandemic, organizations were forced to adapt – many without already having the necessary. Source. Enterprise Risk Management

Understand resiliency patterns and trade-offs to architect efficiently in the cloud

AWS Disaster Recovery

Firms designing for resilience on cloud often need to evaluate multiple factors before they can decide the most optimal architecture for their workloads. This will help you achieve varying levels of resiliency and make decisions about the most appropriate architecture for your needs.

Creating a Multi-Region Application with AWS Services – Part 2, Data and Replication

AWS Disaster Recovery

It can even be used to sync on-premises files stored on NFS, SMB, HDFS, and self-managed object storage to AWS for hybrid architectures. A purpose-built database strategy offers many benefits, Figure 3 forms a purpose-built global database architecture.

Disaster Recovery (DR) for a Third-party Interactive Voice Response on AWS

AWS Disaster Recovery

This architecture enables customers facing challenges of cost overhead with redundant Session Initiation Protocol (SIP) trunks for the DC and DR sites. Solution architecture of DR on AWS for a third-party IVR solution.

Minimizing Dependencies in a Disaster Recovery Plan

AWS Disaster Recovery

Amazon Route 53 Architecture AWS Identity and Access Management (IAM) AWS Organizations Disaster recoveryThe Availability and Beyond whitepaper discusses the concept of static stability for improving resilience.

Disaster Recovery with AWS Managed Services, Part I: Single Region

AWS Disaster Recovery

This example architecture refers to an application that processes payment transactions that has been modernized with AMS.

Intelligent Alert Grouping Series Summary by Quintessence Anx

PagerDuty

Welcome to our final post in our EI Architecture Series on Intelligent Alert Grouping. I hope you’ve enjoyed this series, and if you’d like to take a look at any of our prior posts, please use the ei-architecture-series tag. Alerting ei-architecture-series

Alert 52

IT Resilience Within AWS Cloud, Part I: Mindset and Culture

AWS Disaster Recovery

In Part II, we’ll explore the technical considerations related to architecture and patterns. Like other architecture attributes, resilience is measured on a scale (that is, a degree to which a system is resilient). Architecture reviews.

Field Notes: Setting Up Disaster Recovery in a Different Seismic Zone Using AWS Outposts

AWS Disaster Recovery

In this blog post, I describe an architecture using AWS Outposts which helps set up disaster recovery on AWS within the same country at a distance that can meet the requirements set by regulators. Architecture Overview. Following is the architecture diagram showing the logical setup.

Field Notes: Protecting Domain-Joined Workloads with CloudEndure Disaster Recovery

AWS Disaster Recovery

Overview of architecture. In the following architecture, we show how you can protect domain-joined workloads in the case of a disaster. Architecture CloudEndure Disaster Recovery Technical How-to Disaster recovery Field Notes

Training Intelligent Alert Grouping by Quintessence Anx

PagerDuty

All posts in this series will use the ei-architecture-series tag , please make sure to take a look to read the other posts in this series as well. Alerting Best Practices & Insights ei-architecture-series event intelligenceComplex incidents are both exhausting and commonplace.

Alert 52

Intelligent Alert Grouping: What It Is and How To Use It by Quintessence Anx

PagerDuty

All the posts in this series will be under the ei-architecture-series tag , so please make sure to reference that page when looking for subsequent posts! Alerting ei-architecture-series

Alert 52

Field Notes: Requirements for Successfully Installing CloudEndure Migration and CloudEndure Disaster Recovery

AWS Disaster Recovery

Architecture Overview. Architecture CloudEndure Disaster Recovery CloudEndure Migration Technical How-to CloudEndure Disaster recovery Field NotesCustomers have been using CloudEndure Migration and CloudEndure Disaster Recovery to meet business needs for many years.

Cloud Application Security Made Easy with InfoScale

VOX Veritas

Make sure that you include security in your architecture -- and InfoScale can help Planning a move to the cloud?

What Is TOGAF®? A Complete Introduction

BMC

In a long line of enterprise architecture frameworks, TOGAF® is not the first and it’s unlikely to be the last. TOGAF is the acronym for The Open Group Architecture Framework, and it was developed by The […].

Russia May Underestimate Ukraine and NATO

The Rand Blog

Kremlin leaders might consider instead seeking a stable European security architecture that protects Russia's interests while also allowing for a vibrant and sovereign Ukraine

How to create a zero trust network

Citrix

The White House recently released an edict declaring the implementation of a federal zero-trust architecture (ZTA) requiring all agencies to comply with specific cybersecurity standards and objectives by … The post How to create a zero trust network first appeared on Citrix Blogs.

Minimize business risk by aligning disaster recovery and cybersecurity

Acronis

Disaster recovery solutions call for new thinking, architectures, and implementations – including alignment with cybersecurity to minimize business risk.

Hybrid cloud security with zero trust solutions from Citrix

Citrix

What to know about zero trust architectures How to implement zero trust security for your network. The growth in hybrid work creates challenges for IT admins everywhere. How do you keep remote workers safe? How do you protect endpoints? What do you do about unmanaged devices?

Minimize business risk by aligning disaster recovery and cybersecurity

Acronis

Disaster recovery solutions call for new thinking, architectures, and implementations – including alignment with cybersecurity to minimize business risk.

Get highly flexible, SaaS-based app delivery and security with Citrix

Citrix

What to know about zero trust architectures How to implement zero trust security for your network. Last November, Citrix introduced a paradigm-shifting advancement in application delivery with the first intent-based app delivery and security service.