2. 2 FITS Confidential
Administration Modules
Communicate
Transform
Engage
Common Modeling platform
Architecture Modules
Alerts Workflows Reports Dashboards Portals
Social
Collaboration
Gap Analysis Planning Assessment
Common
Platform
Capabilities
Archimate Zachman UML BPMN SOA Micros-services
1
IT Business
Management
2
Business Process
Analysis
3
Information
System
4
IT Architecture
5
IT Portfolio
Management
6
Integrated Risk
Management
7
Audit
Unified Meta Model
Strategy Business Data Application Infrastructure Security
8 9
Power Studio Power Supervisor
Mega – Platform Components
Artificial Intelligence
Visual
Intelligence
Predictive
Intelligence
3. 3 FITS Confidential
HOPEX IT Business Management allows you to describe company strategy in depth at each level
of the organization and evaluate its alignment with the business initiatives. The modules also
provides the ability to define, assess and plan business capabilities and to develop and manage
the strategic initiative portfolio of the organization
Align to strategic goals
• Capture your company’s
strategy including
objectives and tactics.
• Define transformation
stages and then plan
business capabilities
required for each stage.
Improve IT Strategic Planning
• Build an IT strategic
roadmap by connecting
applications and projects
to planned business
capabilities.
• Assess the impact of
change on the existing IT
landscape and quickly
adjust as needed.
Focus Investments on strategic
projects
• Prioritize future
investments and IT
projects based on strategic
alignment.
Plan:
• Capture vision, objectives, strategy, and
tactics
• Map business capabilities and functionalities
• Create value streams
• Build strategic roadmap
Optimize:
• Automatically collect IT assets
• Build a data glossary as central
documentation for IT projects
• Rationalize IT portfolio (apps, technology)
• Create, share dashboards and ID cards of
applications, technology and data
Transform:
• Identify IT transformation projects
• Perform what-if analysis using transformation
scenarios
• Prioritize projects based on strategic
alignment
• Turn ideas into projects aligned to business
outcomes
• Define mission, vision, goals
and strategy for the whole
enterprise
• Define objectives and
tactics for each
transformation stage
• Value streams define the
stages necessary to satisfy
customers.
• Link business capabilities to
each stage of the value stream.
• If capabilities are missing,
identify the actions required to
develop or acquire new
business capabilities (build vs
partner)
• Map applications to
business capabilities in
business capability maps
• Multiple criteria
rendering are available
thanks to user-defined
icons and color coding
• View how applications use the
data of a data dictionary
• Connect applications and data
through data stores.
• Perform impact analysis to
understand the impact of
an asset on the business
and IT landscape
• Prioritize projects based on
assessment such as strategic
alignment, deliverables and
impacted capabilities
IT Business Management
4. 4 FITS Confidential
Improve business efficiency
• Model, analyze and
standardize your business
processes to improve
business efficiency and
support new business models
Deliver Superior Customer
Experience
• Map customer journeys to
design optimal processes and
deliver superior customer
experience
Ensure Compliance with
Policies and Regulations
• Maintain business process
models in a single repository,
identify areas of concerns,
and improve operations to
drive compliance initiatives
Improve:
• Model your business process groups and
their associated organizational processes
• Develop organizational process maps and
assign participants
• Develop organizational models
• Assign business processes to portfolios and
assess processes based on custom criteria
Delight:
• Design customer journey per persona
• Define pain points and customer
expectations
• Map journey steps to related touchpoints
from the operating model
• Assess customer journey steps by channel
and define action plans
Mitigate:
• Define, classify and assess risks
• Map risks to their related operating model
components
• Define risk mitigation strategies
• Define internal controls
• Evaluate effectiveness of controls and
calculate residual risks
• Describes main business
processes
• Describes a sequence of
operations and participants
• Assigns participants to
organizational units of the
company.
• Design improved processes
and Automatically
highlights differences
• Describes company
organization (structures,
departments, functions,
people etc.) and external
organization (clients,
customers, partners)
• Automatically build
diagrams from a table
entry
• Improves user efficiency
and helps save time
• Allows users to focus on
the process itself instead
of spending time to
design it
• Enable users to assess
processes through
questionnaires, and standard
and custom criteria such as
execution (design, knowledge,
IT support) and performance
(business value, efficiency and
risks)
• Manage end-to-end
customer experience, map
and rank touchpoints in
order to identify where to
optimize/invest first
• Link touchpoints to
organization’s internal
processes, and check how
internal processes support
the customer journey
• Enables user to include risks
and controls in process
models
• Contextualize risk by linking it
to the different operating
model components to
improve analysis and design
of mitigation strategies
Business Process Analysis
With Business Process Analysis, analysts can document, assess and analyse their operating model
including organization structure, functions, people roles and responsibilities, processes, risks,
policies and procedures and compliance requirements based on internal and international
standards.
5. 5 FITS Confidential
Get Visibility Into Your Data
• Build and leverage a data
dictionary and a business
glossary to improve business
efficiency and ensure
everybody shares a common
understanding
Ensure Data Integrity and
Lineage
• Map data lineage and view
how data is transformed
• Understand data usage by
linking data to applications
and processes
• Assess data quality using the
six dimensions of data quality
• Analyze impact of change
Demonstrate Data Compliance
• Assign data governance roles
• Upload and describe
regulations or policy chapters
and articles
• Define the business rules
related to articles
• Tie rules to business
processes to ensure their
enforcement
Model:
• Build your data glossary to unify data
definition based on business terminology
• Model your conceptual and logical data
models
• Reverse engineer your physical data models
• Map your data entities to business domains
• Generate data reference model based on
business domains with data criteria overlay
Explore:
• Define data lineage across internal and
external applications
• Explore data flows and auto-generate data
lineage views
• Explore the relationship between business
concept and a technical data automatically
Enforce:
• Categorize your data entities
• Assess your data entities based on specific set
of criteria in line with the applicable
regulatory requirements
• Evaluate data compliance state based on
applicable data regulatory requirements
• Based on data dictionary, a
full working Business
Glossary can be initialized
• Enrich glossary concept
includes definitions,
pictures and synonyms
• Share the glossary across
the organization
• Describe the transformations
that happen to the data
including:
• Applications and
technologies for external
systems.
• Data origin, processing
type, control
measurement and
subject.
• Different types of flows
• Understand how a business
concept and a technical
data are tied each other
• View how applications use
the data of a data
dictionary
• Connect applications and
data through data stores.
• Understand where data is
used in processes to
improve compliance
• Assess data quality under the
six dimensions of data quality
including Completeness,
Uniqueness, Timeliness,
Consistency, Validation and
Accuracy.
• Categorize data as sensitive or
golden.
• Evaluate data compliance
requirements
• Includes all entities, their
relationships and attributes.
• Understand data
requirements to achieve
business objectives
• Map data by business domains
• Gives a comprehensive view on
data per business domain to
improve decision making
• Assign data criteria such as
data category (sensitive and
golden data) to the business
domains
Information Architecture
HOPEX Information Architecture provides the timely, in-depth information that enterprise
information managers and business architects need to manage knowledge and data as an
enterprise asset. With our solution, stakeholders can make collaborative, well-informed decisions
about information usage across the various functions of your organization.
6. 6 FITS Confidential
Get a Clear Picture of Your IT
Systems
• Map applications and
technologies, and how
they interact with one
another to identify
efficiencies and avoid
disruptions
Tackle Continuous Business
Changes
• Keep current with agile
developments and design
future IT systems. Ensure
that your IT stays ahead of
the needs of the business
Speed up Application
Deployments
• Precisely describe how
technical components of an
application can be deployed
to avoid potential pitfalls
Describe:
• Define your applications’ environment
scenarios to depicts external context
• Define your applications’ structural views to
describe your applications construct
• Develop your application workflow models
to express the logical sequence of execution
Align:
• Define your application functionalities
• Map your applications to business
capabilities to understand and evaluate
business X IT alignment
• Auto-generate your business capability x
functionality map to explore how IT is
supporting the business
Deploy:
• Define your application technology
components and their relationships
• Depict your applications’ technical
deployment and infrastructures
• Ensure optimal technology usage and
deployment infrastructure
• An environment
architecture diagram
represents the main
exchanges between
applications
• Enables user to depict the
same application in
multiple scenarios
• Describes all flows between
applications and interfaces
• Map applications to
capabilities in business
capability maps
• Map applications to
functionalities in
functionality maps
• Grouping Functionalities by
capability helps identify
business needs and identify
overlaps.
• Describes one possible
configuration of the
deployment of an
application
• Describes how the different
application technical areas
are connected to each
other and the technologies
and communication
protocols they use.
• Describes the servers,
workstations, network and
exchange protocols.
• Communication Channels
show physical connections
between IT infrastructure
objects.
• Interactions show exchanges
of information between
processes hosted on
infrastructure devices.
• Provides a structural view of
the Application System
Environment.
• It shows all the objects and
communication paths that
must exist in order for the
scenarios to work.
• Use Service Oriented
Architecture to provide
detailed description of
application interactions
• Describe workflows and
sequences of tasks performed
by applications
• Tasks can be assigned to
participants that represent
applications, IT services or org-
units (for interactive tasks).
IT Architecture
HOPEX IT Architecture provides IT Architects with an IT asset view, and helps them consolidate
and update a consistent picture of applications and the technical infrastructure. It shows gaps in
services, redundancies, the resources supporting different processes, and how the architecture
aligns with business goals.
7. 7 FITS Confidential
Get visibility into IT landscape
• Build a complete inventory of
your IT assets including
applications, technology and
data by automatically collecting
data
• Get insight into the fitness of
your IT landscape through
dashboards and ID cards of
applications, technology and
data.
Reduce Cost
• Quickly identify the
applications to eliminate or
modernize using a
collaborative approach
• Clearly understand the impact
of removing an application
Mitigate Technology Risks
• Get visibility into technology
lifecycles and manage technology
obsolescence
• Define approved or unapproved
technologies based on IT policy
• View the impact of an obsolete or
unapproved technology to
applications and business
capabilities.
Inventory:
• Collect your application information
• Define your application functional and
financial context
• Capture your application business
environment
• Define your application lifecycle
• Collect your application data related
information
Rationalize:
• Group your applications into portfolios
• Define your portfolio assessment criteria
and weights
• Plan and execute application assessment
campaigns
• Auto-generate application rationalization
recommendations
• Monitor rationalization execution
Resolve:
• Define your technology catalog
• Capture your technology lifecycle
• Define your company technology standards
and
• Auto-identify technology conflicts based on
application and technology lifecycle evolution
• Describe business areas
supported by applications
• Get a comprehensive view of
the functional scope of an
application
• Define Application and
Technology Lifecycle as well
as deployment timeline
• Launch campaigns to
business and IT owners to
assess business value,
functional support, and
technical efficiency
• View application
assessments including
Business Value,
Functional Support and
Technical Efficiency
• Recommends actions on
applications (Renovate,
Maintain, Enhance..)
based on assessment
criteria
• Shows application
portfolio evolution over
time integrating
application lifecycle
• Decide the technologies that
comply with the IT policy rules
• Ensure that development
teams don’t use rogue
technologies that jeopardize
IT Solutions
• Detect application conflict
periods due to obsolete
underlying technologies
• List all underlying technology
components used in
applications
• Provides enhanced monitoring
of technologies lifecycle,
Obsolescence and Compliance
• Categorize your
technologies by domain
and View technology state
• Describe application input
and output data flows
• Includes one or many
business data items within
the same Application flow
• Define the data used by
each application
• Set how the application
processes data
IT Portfolio Management
HOPEX IT Portfolio Management solution makes it easy to streamline your IT assets, optimize
costs, and improve flexibility. It uses a three-step methodology to help you take an inventory and
perform a comprehensive assessment of your IT assets, and then develop and manage any
necessary transformation plans.
8. 8 FITS Confidential
Manage:
• Collect your risk information
• Contextualize your risk information by
connecting it to surrounding organizational
components
• Plan and execute risk assessment campaigns
• Consolidate risk assessment results and
calculate net risk value
Control:
• Define risk mitigation strategies
• Design internal control activities required
to implement the selected mitigation
strategy with the control execution steps
• Conduct periodical control execution
assessments to evaluate controls’
effectiveness and compute residual risk
Comply:
• Define regulatory requirements (internal and
external)
• Define regulatory requirements
• Contextualize regulatory requirements and
specify related implementation components
• Conduct periodical compliance assessment
campaigns and define associated corrective
actions
Integrated Risk Management
HOPEX IRM uniquely leverages information managed by IT, Business or Privacy compliance to better
understand risk context and their impact on the business. Combined with other HOPEX solutions,
companies can effectively manage risks globally, ensuring employees share a common understanding of
the enterprise assets, processes and technologies while ensuring data privacy compliance.
Improve Risk visibility
• Collect your risks
• Assess your risks
• Define your risk mitigation
strategies
Strengthen Controls
• Design your controls
• Define control execution steps
• Assess your controls
• Define action plans
• Compute residual risk
• Manage incidents and corrective
actions
Enhance Compliance
• Define your regulatory
frameworks
• Define your compliance
requirements
• Assess your compliance
effectiveness
• Define your compliance action
plans
• Create a new Risk, capture all
relevant information and set
Risk Target & treatment
method.
• Define the context of a Risk
by specifying which
Processes, Entities,
Applications and Business
Lines are affected.
• Contributors can declare a
new Incident from their
dedicated Interface and
provide all the relevant
information.
• Contextualize the Incident
by specifying the
materialized Risk, the
failing Control and other
information
• Define applicable
frameworks
• Create framework
requirements
• Specify what parts of the
Organization have to
comply with the
Requirement
• Assess effectiveness of
implemented Controls
• Carry out analysis such as Risk
Trend or Risk Reduction.
• Define and monitor KRIs
• Track KRIs performance
through indicator status,
measurement freshness, and
time to failure
• prepare and launch an
assessment campaign to
automatically send out risk
assessment questionnaires
• Risks can be assessed in all
their possible contexts with
new assessment templates
• Create & define Controls and
describe how the Control is to
be implemented (processes), by
whom (entities) and what
(applications).
• specify control methods and
corresponding execution steps.
• Several Control execution steps
can be created
• prepare & launch automated
Control execution campaigns
9. 9 FITS Confidential
Ensure Audit Effectiveness
• develop a consolidated schedule
for all audit plans
• Ensure best fit assignment of
auditors based on skills and
availability
• Ensure consistency of audit
activities using audit checklist
templates
Improve Audit Efficiency
• ensure online access to audit
background information
• Capture in real time all audit
findings
• Define recommendations
• Generate consolidated audit
report
Govern Audit Action Plans
• Convert recommendations into
action plans
• Enable real time monitoring and
follow up
• Ensure audit trail for all
corrective actions
• Improve accountability though
visibility of progress of audit
action plans
Plan:
• Define your audit list
• Schedule your audits based on importance
and effort
• Assign your audit team based on skills and
availability
• Prepare your audit check list or copy it from
an existing template
Execute:
• Receive audit assignment
• Access audit background information
during audit execution
• Capture findings against audit checklist and
define recommendations
• Consolidate audit team findings and
generate audit report
Follow up:
• Convert recommendations into audit action
plans
• Assign action plan owners
• Track action plan execution
Audit
HOPEX Audit allows you to manage your Internal Audit activities , manage your Auditors and
generate work programs/activity plans automatically. It helps you capture all background
information relevant to an activity as well as generate checklists for your Auditors. It also allows
you to document Findings, issue Recommendations, and launch follow-up Audits.
• build a Work program for the
Audits they are assigned to.
• Each Activity can have
Workpapers and any
background information
necessary for the Auditor to
carry out his/her tasks.
• If an Audit is recurrent,
Auditors can « cloning » an
already existing Audit’s Work
program
• The Lead Auditor can
consolidate and approve
the audit results.
• the Lead Auditor can
produce a draft Audit
Report and submit to the
Audit Director.
• The Audit Report presents
all Information relevant to
the Stakeholders.
• Recommendation
Owners can define
Action Plans to
implement
Recommendations and
assign them to the right
Action Owners
• Recommendation Owners can
follow-up on Action Plans
• Contributors can provide
progress updates and monitor
their Actions.
• Audit Activities are sent to the
Auditors they have been
assigned to.
• Auditors can then complete
the Activity and any Test
Sheets he/she has been given
to fill.
• Auditors can follow their audit
check list on the system
• They can document any
Findings and write the
corresponding
Recommendations
• Use audit everywhere mobile
app to perform your audits
online
10. 10 FITS Confidential
HOPEX Power Studio provides admin users and configuration experts with the ability to customize the entire system to enable your
organization’s enterprise architecture practices and standards. The power studio allows you to customize your metamodel structure,
RTF reports, publisher portal, workflows, and various diagrams.
Reports Configuration
• Study the reporting
requirements and make sure
the required metamodel
configuration is in place.
• Use RTF descriptors to feed
the data into your report.
• Include diagrams, catalogues,
and matrices into your RTF
reports as needed.
Publisher Configuration
• Study the publisher portal
requirements and make sure the
required metamodel configuration
is in place.
• Use HTML descriptors to feed the
data into your portal.
• Leverage MEGA’s accelerator
template to bootstrap your
configuration.
• Include Diagrams, Catalogues,
Matrices, Dashboards, and other
outcomes in your publisher portal
• Give portal access to your
organization members without
any extra licenses.
Workflow
Configuration
• Use MEGA’s easy diagram
modeler to configure your
workflow.
• Assign the action
performers, state
transitions, and special
events.
• Write various scripts to
execute actions, make
calculations, lock objects,
and send automated
notifications.
Diagram Customization
• Use MEGA’s out-of-the box
TOGAF and Archimate stencils
as a baseline for your
diagrams.
• Configure the various diagram
stencils to include/exclude
objects as needed.
• Customize the diagram and
object look and feel to fit the
organization’s brand identity.
• Automatically set any
object’s shape based on
specific attributes.
Power Studio
Metamodel
Configuration
• Configure you metamodel,
classes, attributes, and
relationships.
• Use the available configuration
as your base to leverage the
out-of-the box functionality.
-Batch Process-
-Batch Node-
Owned Batch Node
1 Batch Node Owner
Batch Sequence Name
Batch Sequence
Owned Batch Sequence
1
Batch Behavior
1
Predecessor
Next Sequence
-Composite c lassifier-
-Classifier Component-
1
Successor
Previous Sequence
-Batch Call-
-Feature Type-
1 Called Batch Process
Batch Call
-Library Element-
-Feature Type-
System Process
System Process
Batch Realization
1
{Base Type}
Realized System Process
{Composite Realization}
System Process Batch Realization
{Owned Realization}
Owned System Process Realization
1
{Realizer Composite}
Realizer Batch Process
-Composite Realization-
-Property Owner-
{Owned Batch Node}
Owned Batch Call
{Batch Node Owner}
Batch Call Owner
-Element in Diagram- -Desc ribed Element-
-Requirement-driven Element-
-Requirement-driven Element-
11. 11 FITS Confidential
HOPEX Power Supervisor provides power users with the necessary functionality to maintain the MEGA repository. It is the essential
tool set required for administrators to efficiently and effectively manage role-based access rights and permissions, confidentiality
areas, repository backups and management tasks scheduling and other administration features.
• Use or expand on the out-
of-the box MEGA user
profiles to conform with the
required access rights.
• Create new user profiles
from scratch or copy an
existing user profile.
• Define the access
permissions on the module,
diagram, object, page, and
attribute level.
User Access Rights
Management
• Backup and restore the
MEGA application database
to easily backtrack any
changes or errors.
• Choose and select
particular blocks of your
configuration to publish to
production with minimal
conflicts and issues.
Database Backups
• Enable LDAP authentication
using MEGA’s out-of-the
box adapter.
• Choose which users can
access the system via LDAP
and who can access using
MEGA native
authentication.
LDAP Integration
• Keep a watchful eye on the
application usage by
monitoring the currently
authenticated users and
the content they are
working on.
• Maintain an audit log of
the user access and change
history to easily track and
debug system errors.
Transaction Management
• Create your environment
• Specify the location where the
DB will be created
• Create the repository
associated with the
environment to store your
information
• Schedule periodic DB backups
Environment &
Repository
Management
Power Supervisor
12. 12 FITS Confidential
Visual Intelligence
Automatically construct relationships-
based environment graph view showing all
meta classes connected to a specific object
with the ability to filter the relationships
displayed
Automatically construct multi-level
relationship tree views with the ability to
expend and collapse the different nodes
Develop connected tabular views between
related metaclasses to list relationships
information for the specific object type you
want to analyze
Environment Graph Dendrograms 360 Matrix Timeline
Auto construct timeline views from date
attributes captured on the metaclasses
13. 13 FITS Confidential
Predictive Intelligence
Automatically build time based predictive model for the impact of target
architecture and transformation roadmap on business capabilities
Automatically predict technology obsolescence conflict based on
application lifecycle and technology lifecycle
14. 14 FITS Confidential
MEGA Use Cases
Analyze
1.1
Baseline Architecture
1
2.1
Business Continuity Management
Manage
2.2
Data Glossary Management
2.3
Policy / Contract Management
2.4
Quality Management
2
4.1
Strategic Planning
4.2
Performance Management
Plan
4
6.2
Demand Management
6.1
Architecture Transformation Planning
Transform
6
5.1
Application Portfolio
Rationalization
5.3
Technology
Obsolescence
5.2
Business Process
Excellence
5.4
IT Service Costing
Optimize
5.5
Cloud Transformation
5
5.6
Process Mining
7.1
Solution Implementation Governance
7.3
Project Change Management
Implement
7.2
Software Development
7
7.4
Process Automation
3.3
Data Governance & Compliance
3.1
Governance, Risk, & Compliance
Control
3
3.2
Audit Management
MEGA comes with a library of use cases to enable the deployment of enterprise architecture in support of different scenarios.
The common aspect across all use cases, is the use of the enterprise information to drive the adoption of those different
practices. MEGA not only provides the modeling conventions to support each of those domains, but also enables specialized
functionality and reporting in addition to automating underlying processes using advanced workflow capabilities
15. 15 FITS Confidential
Uses Cases Playbooks
Understand the key
challenges
Business Drivers
• Key Stakeholders
• Business Challenges
• Benefits
Define the sequence of
activities necessary to
complete the use case
Methodology
• Methodology phases
• Methodology steps
Define the list of business
outcomes required to
support the use case
Business Outcomes
• Data collection
requirements
• Usage and benefit
• Data collection
requirements
Each use case comes with the following three key components necessary to implement the specific capabilities required for each
scenario:
16. 16 FITS Confidential
User Types License Types
Perpetual Licenses
Permanent licenses paid once and use on ongoing basis. An
annual maintenance cost of 21% is due to ensure upgrade
and support. Licenses will continue to work even if AMC is
not paid
On Premise Subscription Licenses
Licenses are rented on annual basis. The licenses are
installed on local machine provided by the client. The rental
is inclusive of annual maintenance cost. When subscription
period expires, the system will not be accessible anymore.
SaaS Subscription Licenses
Licenses are rented on annual basis. The licenses are
installed on a rented infrastructure included in the
subscription fees. When subscription period expires, the
system will not be accessible anymore.
Access Type
• Enter and maintain information
• Develop and update diagrams
• Collaborate
• Participate in workflows
• Navigate Repository
• Generate reports
• View dashboards
• Enter and maintain specific
information
• Collaborate
• Participate in workflows
• Navigate repository
• Generate reports
• View dashboards
• Navigate repository
• Generate reports
• View dashboards
Super User Contributor Viewer
Named Users
Client can define a limited
number of users as per license
quantity. Access is granted for
those specific users by name.
Concurrent Users
Client can define as many users
as they want but access is
limited to any defined users up
to the license quantity.
MEGA License Structures
17. PHONE & EMAIL
info@fits.consulting
+971 4 3903503
www.FITS.Consulting
HQ ADDRESS
Dubai Internet City
Building #17, Office G60
P.O. BOX 500628
Dubai, UAE
SOCIAL MEDIA
LinkedIn: FITS Consulting
Hank
you
P R O B L E M . S O L V E D .
F I T S C O N S U L T I N G
MANAGING PARTNER (UAE &
GCC)
Mike Merdinian
Mobile: +971 55 4284084
Mike.Merdinian@fits.consulting
MANAGING PARTNER (KSA &
GCC)
Abdallah El Kadi
Mobile: +966 56 1125098
Abdallah.Kadi@fits.consulting