Implementation Plan – SABSA

Reading Time: 7 minutesStatus: Final Blueprint Author: Shahab Al Yamin Chawdhury Organization: Principal Architect & Consultant Group Research Date: July 28, 2024 Location: Dhaka, Bangladesh Version: 1.0 1. Executive Summary The Sherwood Applied Business Security Architecture (SABSA) is a foundational, open-standard methodology for Read More …

Enterprise Product – ECM Product Comparison

Reading Time: 4 minutesThe management of enterprise content has evolved from a back-office archival function into a strategic driver of digital transformation. The market has shifted from traditional, monolithic Enterprise Content Management (ECM) systems to flexible Content Services Platforms (CSPs), and now to the era of Intelligent Content Automation.

Application Modernization – Understanding Business Requirements, Rules & Their Roles

Reading Time: 4 minutesStatus: Final Blueprint Author: Shahab Al Yamin Chawdhury Organization: Principal Architect & Consultant Group Research Date: July 26, 2024 Version: 1.0 1. The Strategic Imperative for Modernization Application modernization is a critical business initiative to update legacy software, aligning it Read More …

Auditor Became CISSP – Never Performed in Projects & in IS Development, Would You Hire Him for Your Infrastructure Platform Management? Can or Should that Knowledge Gap be Admissible?

Reading Time: 6 minutesStatus: Final Blueprint (Summary) Author: Shahab Al Yamin Chawdhury Organization: Principal Architect & Consultant Group Research Date: June 1, 2024 Location: Dhaka, Bangladesh Version: 1.0 1. The Core Dilemma: Assessor vs. Builder Mindset We are observing worldwide adoption on CISSP Read More …

Critically Define the Role of a Principal Architect

Reading Time: 4 minutesStatus: Final Blueprint Author: Shahab Al Yamin Chawdhury Organization: Principal Architect & Consultant Group Research Date: March 2, 2022 Location: Dhaka, Bangladesh Version: 1.0 1. Executive Summary: The Strategic Linchpin The modern Principal Architect has evolved beyond a purely technical Read More …

Critically Define the Role of a Cybersecurity Architect

Reading Time: 4 minutesStatus: Final Blueprint Summary Author: Shahab Al Yamin Chawdhury Organization: Principal Architect & Consultant Group Research Date: March 1, 2022 Location: Dhaka, Bangladesh Version: 1.0 Part I: Foundational Blueprint Defining the Modern Architect: Beyond the Job Description The Cybersecurity Architect Read More …

OSS & BSS Requirements in the Enterprise Applications

Reading Time: 4 minutes1. Executive Summary This document outlines a comprehensive blueprint for Operations Support Systems (OSS) and Business Support Systems (BSS) requirements within modern enterprise applications. Traditionally the domain of telecommunications, the principles of OSS and BSS are now critical for any Read More …

Why You Should NOT Build Your Enterprise Application with Laravel & MySQL

Reading Time: 4 minutesStatus: Final Blueprint Author: Shahab Al Yamin Chawdhury Organization: Principal Architect & Consultant Group Research Date: July 21, 2025 Location: Dhaka, Bangladesh Version: 1.0 1. Executive Summary 2. Deep Dive: Laravel-Specific Concerns for Enterprise Use 3. Deep Dive: MySQL-Specific Concerns Read More …

Telemetry is Heating up in Enterprise BI, How Are You Preparing for it?

Reading Time: 6 minutesStatus: Final Blueprint Author: Shahab Al Yamin Chawdhury Organization: Principal Architect & Consultant Group Research Date: July 22, 2024 Location: Dhaka, Bangladesh Version: 1.0 Executive Summary The enterprise Business Intelligence (BI) landscape is undergoing a seismic shift, driven by the Read More …

Multicloud Security – Make it More Effective

Reading Time: 4 minutesTable of Contents 1. Executive Summary Enterprises embracing two or more public clouds face unique security challenges: inconsistent controls, blind spots, and operational complexity. This report outlines a holistic architecture—spanning network fabric, resilient application platforms, identity-centric access, client-specific handling, and Read More …

Supercharge Your Security: A Modern Approach with Zero Trust

Reading Time: 2 minutesImage source: Security Adoption Resources | Microsoft Learn Traditional security models that rely on a fortified perimeter are no longer enough. With the rise of remote work, cloud applications, and increasingly sophisticated cyber threats, organizations need a more dynamic and Read More …