Enterprise Architecture Vs TOGAF

Great Essays
Have you ever asked yourself how can a process be more effective and produce positive results? That is what an Enterprise Architecture (EA) is for! The Meridian-Webster dictionary defined EA as a conceptual blueprint that defines the structure and operation of an organization with the intent to determine how an organization can most effectively achieve its current and future objectives. This paper presents a comparison between two of the most popular Enterprise Architecture, TOGAF and FEAF. Are these two frameworks any different? Are they industry specific? What do these two frameworks try to address? How easy or complex is their process?
The Open Group Architecture Framework (TOGAF)
TOGAF is one of the most popular recognized EA Frameworks
…show more content…
Its objective is the fulfillment of the established definitions in the Clinger-Cohen Act. Like DoDAF, its intention is to provide a common methodology within information technologies; nevertheless, unlike DoDAF, the FEAF is use across the board in the federal government of the United States of North America. FEAF goal is to improve the interoperability between the United States government agencies by implementing a specific obligatory EA framework for the entire federal government. FEAF is a collection of interrelated reference models designed to facilitate the definition of the business functions, as well as the analysis and optimization of federal …show more content…
TOGAF focuses on Enterprise Continuum with Architecture Development Method (ADM). FEAF describes the enterprise as segmented reference models; guides on a migration process from “As Is” to “To Be” architecture; and offers an approach to cataloging assets and measuring the success of EA. These two frameworks were created to integrate the strategic objectives and information systems. FEAF is more of Taxonomy to identify common assets and overlaps. On the other hand, TOGAF is a much richer framework that fully deals with Systems Integration issues (e.g. Governance). FEAF was created specifically for the federal government, versus TOGAF was created for any type of industry. This doesn’t mean that any of this frameworks are limited to a specific industry, but they were created with specific needs in mind (Odongo, Kang, & Ko,

Related Documents

  • Improved Essays

    The main issues will be integration, support for industry specifics transaction and advance features and if they are SaaS and on premises Platform implementation (Business Software.com, 20012). The architecture of the three accounting system vary. Netsuite and Unit4 are Multi-tenancy, which allows the programming code to be stored in one database and the customer data in another. This allows for changes and updates not to effect the users data. Sage it muli-tier architecture which mean that the functions of the application are stored separately when updates or changes are needed it have to update across the functions of the application.…

    • 486 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Triton Multi-INT

    • 505 Words
    • 3 Pages

    I am a little concern about the bidding or proposal against RMF effort. There is tremendous work need to be done for the RMF compliance that leading to an ATO. Without the ATO, even your system is built with the state-of-the-art technology, you are not allow to operate in the field. I do not see that importance reflect on the proposal. I am not sure whether Triton Multi-INT (or the Triton baseline) is a program of record that needs an ATO or it only needs to be RMF compliance.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Federal Information Security Management (FISMA) was set up by the United States government for cyber security purposes such as to increase the level of security of software applications, systems and databases. As stated by (Kim, n.d.), “When FISMA was enacted, its purpose was to ensure that federal agencies secure the information contained in the non-defense information systems of the Unites States government”. To protect the systems and data it is important to have a security plan developed for not just federal agencies but also for the government contractors and organizations affiliated with the information. According to (Kim, n.d.), “These grades have trended slightly upward in recent years, with the grades from 2005 through 2007 being…

    • 166 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    GreatThinker GFC, one of the numerous federal agencies in Washington DC that has to adopt those minimum set of security controls developed by National Institute of Standards and Technology (NIST) to protect their information and information systems. The NIST developed the Federal Information Processing Standard (FIPS) 200, containing minimum security requirements for Federal Information and Information Systems, specifies the minimum security requirements for federal information and information systems in seventeen security-related areas. Federal agencies must meet the minimum security requirements defined in FIPS 200 through the use of the security controls in NIST Special Publication 800-53, Recommended Security Controls for Federal Information…

    • 120 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Currently, this sector is dominated by Windows operating systems, and servers by UNIX operating systems or Linux. 3. Enterprise and other software applications: used to interconnect the organisation’s already existing application systems. This would consist SAP, PeopleSoft, Oracle, etc. 4. Data management and storage: all the data acquired must also be stored and this is taken care by the organisation’s storage devices such as SANs, which connect multiple storage devices on dedicated high-speed networks.…

    • 266 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The Federal Information Security Management Act also known as FISMA is United States federal law enactment established to ensure government data, operations and resources against regular or man-made dangers are protected. FISMA was created in 2002 Electronic Government Act of 2002 before cybersecurity became such a vast problem. Modifications were made to FISMA law and renamed Federal Information Security Modernization Act of 2014. The cybersecurity market is continuously expanding as the society rely upon the development and utilization of information technology systems. Within recent years, there has been an increase in the number security risks and data breaches.…

    • 240 Words
    • 1 Pages
    Improved Essays
  • Great Essays

    Fda Case Study

    • 1215 Words
    • 5 Pages

    1.1 Background The mission of the FDA Office of Financial Management (OFM), Division of Financial System Support (DFSS) is to coordinate the management of FDA’s financial system of record Unified Financial Management System (UFMS) with Health and Human Services (HHS) and the other HHS Operating Divisions (OpDivs) who currently use UFMS. UFMS is the HHS department wide financial system of record. The HHS Financial Enterprise System Management (FESM) organization is responsible for managing the global UFMS. DFSS ensures that the functionalities within UFMS meets FDA’s business needs and processes, any changes proposed by other OpDivs or HHS are communicated to our end users and that it does not break our internal financial business processes.…

    • 1215 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    DHS Missions

    • 648 Words
    • 3 Pages

    As we continue through the 21st century there are numerous missions that the DHS encourages to anticipate terrorist acts, secure the wellbeing of our country, and to save our opportunity and thriving. There are an extensive variety of missions that the division oversees, for example, anticipating terrorism and improving security, overseeing U.S. outskirts, controlling movement laws, securing the internet, and guaranteeing calamity versatility. Our central goal is to organize a far reaching and strong office to battle demonstrations of fear, react in an auspicious way to calamities and to secure the U.S. against acts that are completed to annihilate us. In counteracting terrorism and improving security the office considers this the most astounding…

    • 648 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Security Works, Inc. has just been awarded a high priority, high visibility contract/project that will require us to develop and maintain a proper DoD security policy that is required to meet DoD standards for delivery of the technology services. Upon winning this high demand contract with the DoD, Security Works, Inc. is now obligated to meet all government standards that the U.S. Air Force Cyber Security Center or AFCSC enforces. Other guidelines within this contract that have to be followed in order for Security Works, Inc. to stay compliant to all laws and security measures falls under the Federal Information Security Management Act (FISMA). FISMA is United States legislation that defines a comprehensive framework to protect government…

    • 1874 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    They all have different applications and processes from all subsidiaries that are based in its region, and this solution can integrate them together. Therefore, it will be easier to maximize the performance of the integrated system in the business processes, including the functionality, ERP, and e-business applications. After the systems work out, the systems can be phased out and transferred to the regional ERP. This will benefit these three because the time will be reduced and the process will be so much easier than doing them one by one. Also, it is easier for the regional subsystems to integrate all applications since the systems can be customized automated and integrated with custom applications and e-business solutions.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Collaboration Challenges

    • 998 Words
    • 4 Pages

    Collaboration offers an effective approach for organizations to resolve complex problems, maximize resources and improve innovation. However, the organization must establish the conditions for collaboration to be successful and use a deliberate approach to collaborating with other, external stakeholder organizations. This paper identifies a few historical challenges that the Department of Defense and other federal agencies faced in the past, how those organizations sought to overcome those challenges, and how these solutions can apply to other public organizations. Historical Challenges Communication and operational synchronization within the Department of Defense are two particularly notable historical challenges. During the conflict in Vietnam…

    • 998 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Organizational architecture for any organization is the framework that defines the organization structure. This includes how the company is designed such as the decision rights within the company. Additionally, the architecture also provides insight into how the organization rewards their employees and provides evaluation on the employee’s performance. In comparison, organizational culture refers to how the organization is organized, the employees are managed, and how the rewards are provided. The culture of the organization helps to define a company customs and rituals.…

    • 204 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The goal of the model was to show how seven elements of the company could be aligned to achieve effectiveness: i. structure ii. strategy iii. skills iv. staff members v. style vi. systems vii.…

    • 754 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    It involves business process spanning in the entire value chain like supply chain management, electronic purchasing, automatically process the orders and customer service and also enable the company to cooperate with their business partners. Due to the increased competitiveness in the hypermarket industry. With the implementation…

    • 1456 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    In reengineering, structure created around cross functional core processes. Self-directed teams form the basis of performance and design of the organization. Owners of the process have the responsibility of core process. Employees area given tools and authority to make decision central to team performance. Culture is open and based on trust.…

    • 1197 Words
    • 5 Pages
    Improved Essays