1 (866) 866-2320 Straight Talks Events Blog

Expert Insights and Best Practices for IT Operations | Evolven Blog


T+1 Transaction Timeline From 1976 to May 2024 and beyond.

As the deadline for the SEC’s T+1 initiative approaches on May 28th, 2024, IT departments are facing the challenge of making sure their systems are up to date and ready for the demands of T+1 transactions. The T+1 initiative is a move to shorten the trade settlement cycle from the current two-day, T+2, to a one-day,  T+1. This is a major change for the industry, requiring that systems support the completion and settlement of transactions within 24 hours, and also scale to the increased demand enabled by the faster settlement time. And in this case - there really isn’t a Plan B or hope for a postponement. The consensus of the industry is that just like with the year 2000, a back-out of T+1 functionality is not an option.  Any problems will need to be addressed by the applicable firm(s) prior to the deadline, or be subject to fines and associated damages. The industry is moving forward with T+1 settlement on May 28th, 2024  - whether you are ready or not.


5 Top Reasons Configuration is A Risky Business

The complexity and rapid evolution of IT systems have made configuration a challenging and risky business for enterprises. Misconfiguration or improper configuration changes can expose organizations to cybersecurity threats, compliance violations, and reputational damage. In this blog post, we will discuss the five reasons why configuration is a top challenge for IT teams globally. To mitigate these configuration risks, organizations must leverage configuration risk intelligence, which involves gathering, analyzing, and using information about IT configuration state and changes to identify potential risks and vulnerabilities proactively. With configuration risk intelligence, enterprises can prioritize security controls, inform risk management decisions, communicate risks to stakeholders, and improve their overall security posture.


ISO27001 and Best Practices for Preparing for Audit

ISO 27001 is an international standard that outlines best practices for information security management systems (ISMS). IT professionals must ensure their organizations comply with this standard to safeguard sensitive data, reduce security risks, and demonstrate their commitment to security.


Scoring A Risky Business

Configuration is a Risky Business

A young Tom Cruise led the cast in the 1983 “Risky Business” movie. Portraying a teen looking for fun at home while his parents were away, he quickly let the situation get out of hand resulting in exactly what you would expect--absolute mayhem.  Perhaps only outdone and outscored in risk by Ferris Bueller, Tom’s unauthorized changes to the rules set by his parents created a very risky misadventure for him, his friends, and his parents.  As this was movie land, the impacts of their misconfigured weekend were resolved, and the stories were reconciled, all before two hours were up.  If only…


Expert Interview: From Reactive to Proactive Configuration Awareness With Four-Dimensional Observability

Every organization should know the importance of digital transformation. But do they understand how important observability is to make the digital transformation happen?

More importantly, do they understand that managing configuration change is the missing ingredient in most vendors’ concept of observability, which is the secret to agile organizations?


It’s 10 pm, Do You Know Where Your Configuration Assets Are?

In the late 1960s, the catchphrase, “It's 10 pm, Do You Know Where Your Children Are?” was delivered across TV sets nationwide (in the US) reminding parents to keep their children safe in a time of rapid change, civil unrest, and turmoil. Today, there’s plenty of change, and unrest (and sometimes even turmoil) in Information Technology (IT) Infrastructure and Operations (I&O) teams as they transform into agile cultures embracing DevOps, DevSecOps, and Platform Engineering. But instead of “children” they need to protect, it is an entity referred to as “configuration”.


Prevent Misconfigurations in the Cloud: Walking Between the Raindrops

Three key takeaways:

  • Enterprises are undergoing digital transformation. Business demands based on financial pressures necessitate this revolution. This new perspective drives the teams responsible for developing and maintaining IT infrastructure to embrace the inevitable, become more agile and better manage change
  • Enterprise IT infrastructure configurations are numerous, complex, and fraught with risk. The rapidity and frequency of configuration change, and the context and content of those changes all contribute to making managing configuration change one of the most challenging problems for infrastructure and operations teams to regularly deal with in today’s hybrid or multi-cloud deployments
  • There is a solution to better understand your infrastructural complexity and configuration state: four-dimensional (4D) observability. Observability has become a common claim for vendors who focus on the symptoms of problems once they have already occurred, using telemetry from traces, logs, and metrics. However, this can be drastically improved upon by increasing the scope of monitoring to provide early detection of granular configuration changes and the risk they may impose on stability, security or compliance.

Recognizing New Configuration Risks Introduced by Digital Transformation

Three key takeaways:

  • Digital transformation, while an essential initiative for enterprises, brings its share of challenges. From process and decision-making transitions to the dynamic state of its complex cloud environments, organizations need to be prepared to face these issues head-on.
  • Decentralization of decision making driven by an agile DevOps approach may lead to departure from traditional ITIL processes and the weakening of risk controls. An automated risk gateway powered by AI-based Evolven Configuration Risk Intelligence helps to balance control and speed, identifying and mitigating risks prior to production.
  • Evolven’s Configuration Risk Intelligence solution provides the visibility needed to shift from old environments to new ones. Incidents happen fast in the cloud, so knowing the state of an environment is essential: Armed with ongoing insights, Evolven’s technology tracks the specific configuration changes at the root of performance and availability issues.

Infrastructure as Code (IaC) And Its Impact on Configuration

Infrastructure as a Code for DevOps has been gaining a lot of traction among tech companies around the world. According to Sheila Gulati, managing director of Tola Capital, it’s the need of the hour. Its flexibility of use for any type of cloud workload or architecture has made it indispensable for modern cloud businesses.

However, the skill required for implementation is itself uncommon. Trained engineers to design the software infrastructure needed are scarce. At the same time, this favors opportunities for Infrastructure as Code (IaC) startups to offer solutions to customers.

So, what is IaC and how does  it impact how configuration of your infrastructure is handled?

Let’s find out. 


CMDB: Lost in the Clouds

“…But now they only block the sun They rain and they snow on everyone So many things I would have done But clouds got in my way…” -Both Sides Now, by Joni Mitchell

“Clouds do most definitely get in the way…” that is if you are trying to operate IT environments in the cloud exactly as you did in the datacenter. That approach is generally referred to as “lift and shift”. You will not automatically capture the advantages in agility and scale that a cloud-based architecture could provide. As a result, your expectations for improvement may end up “lost in the clouds…”