PivotPoint's Scalable + Secure Agile Architecture™ approach prioritizes cybersecurity concerns throughout the Agile lifecycle, starting by capturing cyber requirements and triaging cyber assets …
Fallbrook, CA (PRWEB) October 21, 2014
PivotPoint Technology Corp., the Custom Model-Based Solutions™ company, today announced it is expanding its training services to include Scalable + Secure Agile Architecture™ (S²A² ™) training and certification. The new hands-on S²A² training is aimed at clients who want the speed and flexibility of Agile and Lean development methods, but also need to better balance enterprise architecture functionality with non-functional "-ilities," such as scalability and cybersecurity.
The Scalable + Secure Agile Architecture training can be tailored for popular Agile and Lean development methods (Scrum is the default), mainstream visual modeling languages (UML™, OMG SysML™), and leading visual modeling tools. The hands-on S²A² training includes frequent Q&A and practice sessions, and blends learning modules from PivotPoint's Agile Modeling, Agile Architecture, and Cybersecurity Modeling & Simulation training courses. The learning modules teach principles and best practices for precisely specifying the following: Agile + Cyber Requirements Engineering; Service-Oriented Analysis & Design (SOAD); Service-Oriented Architecture (SOA) and Cloud Architecture (IaaS, PaaS, SaaS, RESTful Web Services); Network Architecture; and Cybersecurity Architecture.
The new training will feature CyberML™ (Cyber Modeling Language™) as its visual architecture modeling language for specifying distributed software-intensive systems that are scalable and secure. CyberML is essentially a framework of UML 2 compatible model libraries that are based on a AgileML™ (Agile Modeling Language™) kernel. More specifically, CyberML consists of three layered stacks: Cybersecurity model libraries; AgileML model libraries; and an AgileML kernel, which is defined as a small, pragmatic subset of UML 2 diagrams and constructs that is suitable for Agile and Lean development methods. CyberML's scalability is derived from AgileML's emphasis on recursive design techniques that can specify systems of arbitrary complexity (e.g., subsystems, systems, systems-of-systems). Its security capabilities are derived from its Cybersecurity model libraries, which support the precise specification of cyber assets and cybersecurity features, such as TCP/IP protocols, routers/switches, firewalls, encryption/decryption devices, Intrusion Detection/Protection Systems (IDS/IPS), and Unified Threat Management (UTM) devices.
Both CyberML and AgileML are designed by Cris Kobryn, PivotPoint's Founder and CEO, who is an internationally recognized visual modeling language expert known for successfully leading the UML 1, UML 2, and SysML design teams. Both modeling languages are designed to be straightforward to implement in popular UML and SysML compliant tools that support the standard UML Profile (customization) mechanism. Current visual modeling tools supported include Sparx Enterprise Architect™ and MagicDraw™; other modeling tools are available on request.
"As cyber attacks on enterprises increase in frequency and ferocity, Agile architects and developers are flailing and failing to juggle enterprise architecture functionality, scalability, and cybersecurity tradeoffs," said Cris Kobryn, Founder and CEO of PivotPoint Technology. "Unfortunately, many Agile developers are so overwhelmed by tough functionality vs. scalability tradeoffs during Agile sprints that they frequently neglect cybersecurity concerns until late in the Agile lifecycle. Consequently, they perpetuate the vicious cycle of trying to patch flaws in static perimeter-based cyber defenses (e.g., firewalls, antivirus software) faster than cyber hackers can exploit new vulnerabilities. Recent cyber data breaches at Target, eBay, JPMorgan Chase, Home Depot, Kmart, and elsewhere indicate that cyber hackers and criminals are outthinking and outfighting the cyber defenders.
"If we want to break this vicious cycle of patching-and-breaching we need to address cybersecurity concerns earlier and more aggressively in the Agile lifecycle. We also need to expand the scope of cybersecurity from patching the 'hard shells' of static perimeter-based cyber defenses to include protecting the 'soft underbellies' of internal systems, such as unencrypted and unprotected 'crown jewel' cyber assets (e.g., client data, intellectual property). PivotPoint's Scalable + Secure Agile Architecture™ (S²A² ™) approach prioritizes cybersecurity concerns throughout the Agile lifecycle, starting by capturing cyber requirements and triaging cyber assets, then systematically tracking the effectiveness of cybersecurity solutions through each Agile sprint or iteration. As a result, S²A² techniques can help migrate static perimeter-base cyber defenses to more dynamic and aggressive cyber countermeasures, consistent with the evolving Moving Target Defense concept."
PivotPoint supports Training Performance Certification for Scalable + Secure Agile Architecture training. PivotPoint will provide Training Performance Certificates for students who successfully complete all practice exercises and a final performance exam under the supervision of a PivotPoint expert Instructor, who will evaluate the overall quality of their work. Students who seek Training Performance Certification must coordinate with PivotPoint when they order and schedule their training.
The Scalable + Secure Agile Architecture training is available immediately and can be delivered both onsite and online. All training can be followed up with comprehensive Consulting and Coaching services, also delivered onsite and online, to address specific team and project needs.
Custom Model-Based Solutions, Scalable + Secure Agile Architecture, AgileML, Agile Modeling Language, CyberML and Cybersecurity Modeling Language are trademarks of PivotPoint Technology Corp. UML and OMG SysML are trademarks of the Object Management Group. Enterprise Architect is a trademark of Sparx Systems Pty Ltd. Magicdraw is a trademark of No Magic, Inc. All other trademarks are the property of their respective owners.