Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
Bill Grant
Know
What
Changed
Evolven's game changing technology
pinpoints true root cause, decreasing MTTR
and helps avoid undesired changes
2 | Evolven Proprietary & Confidential
AGENDA
• Five Types of Undesired changes
• And How to Avoid them
• How Blending Actual Changes with IT Data
Slashes MTTR
• Demo
• Q&A
3 | Evolven Proprietary & Confidential
AGENDA
• Five Types of Undesired changes
• And How to Avoid them
• How Blending Actual Changes with IT Data
Slashes MTTR
• Demo
• Q&A
4 | Evolven Proprietary & Confidential
FIVE TYPES OF UNDESIRED CHANGE
• Unauthorized
• Actual changes, tracked by Evolven, with no corresponding change
ticket
• Manual
• Changes which are not automated are even more likely to be incorrectly
applied
• Inconsistent
• Inconsistent = unpredictable; eliminate the inconsistencies
• High-Risk
• By identifying all changes and prioritizing the highest risk changes you
can minimize downtime with minimal effort
• Out-of-Policy
• Some configurations are mandatory; identifying when these contracts
are broken are important for stable and secure environments
5 | Evolven Proprietary & Confidential
EVOLVEN CAPTURES ACTUAL CHANGES
Database Administrator
• Hardware: CPU, Memory, Disk, Network, Mounts, Bios, etc.
• Software: Installed Components/Products, OS Level,
Patches, Updates, Virtualization
• Other Config: Users, Groups, ulimits, Daemons, Services,
Registered DLL’s/.Net
• Instance Configuration: Buffer sizes, Replication, Memory,
Packet Size, Locks, Timeouts, Retention Periods
• Schema Configuration: Tables, Views, Indexes, Stored
Procs, Triggers
• (Optional) Table Config Data
• Application Configuration Files (Parsed and Prioritized)
• Application Files: WAR, JAR, EXE, DLL, etc.
System Administrator
Application Administrator
Network Engineer • Device Configuration: Routers, Load Balancers, Storage, Etc.
6 | Evolven Proprietary & Confidential
Windows HP-UX
WHAT DOES EVOLVEN DISCOVER?
IBM AIX
Oracle Solaris
Linux CentOS
Linux Red Hat
Linux Red Hat
Fedora
Linux SUSE
Operating Systems
Wizard-based custom application support
New application support in minutes
Custom Applications
HTTP Servers
Apache Microsoft IIS IBM HTTP Server
Active Directory
Microsoft Active
Directory Open LDAP
Sun Java System
Directory
Others
Documentum SharePoint Tibco BPM
Apache Tomcat IBM WebSphere JBoss
Pivotal-tc
Jetty Oracle WebLogic webMethods
Application Servers
Oracle
DB2 MySQL
Sybase
Microsoft
SQLServer
Databases
Windows Components
Microsoft
COM/DCOM .NET Framework Windows Cluster
Virtualization
VMWare vCenter Citrix XenApp Microsoft Terminal
Server
IBM WebSphere
Message Broker
IBM WebSphere
MQ
Oracle Tuxedo
IBM WebSphere
ICS
Microsoft Exchange
Messaging
Apache MQ
7 | Evolven Proprietary & Confidential
Symptoms
Changes
IT Context
APM
Log
Service Desk
Deployment
CMDB
Config | Capacity | Data | Code | Workload
BSM
UCMDB
* Can’t find your IT operations tool? No problem. Evolven easily integrates with 3rd party tools.
BLENDED DATA FEEDS
8 | Evolven Proprietary & Confidential
ALL RELEVANT DATA SOURCES
Changes
The true root-causes.
Collected directly by Evolven
• Deployment Automation – infra and application changes,
updates, releases
• Service Desk – change requests, service requests,
incidents etc.
• CMDB – dependencies, topology etc.
IT Context Provides context to the activities
carried/intended to be carried in IT.
Collected through integrations.
Symptoms
Indicate undesirable conditions
in the system behavior and
health.
Collected through integrations.
9 | Evolven Proprietary & Confidential
UNAUTHORIZED CHANGES
• Evolven detects actual changes with no
corresponding change ticket
• Alert for immediate action;
• Report to ensure process is adhered to in the
future
10 | Evolven Proprietary & Confidential
MANUAL CHANGES
• Evolven detects change windows which do
not have affiliated automation
• Inspect manual changes
11 | Evolven Proprietary & Confidential
INCONSISTENT CHANGES
• Evolven detects changes which are
inconsistent with similar systems, which are
of greater concern
12 | Evolven Proprietary & Confidential
HIGH RISK CHANGES
• Evolven Determines Risk of change
• High Risk – Immediate Action
• Medium Risk – Report On (Visibility)
• Low Risk – Ignore
13 | Evolven Proprietary & Confidential
OUT-OF-POLICY CHANGES
• Evolven detects configurations which breaks
policies defined by users - the “knowns”
• Alert on changes which break compliance for
immediate remediation
14 | Evolven Proprietary & Confidential
AGENDA
• Five Types of Undesired changes
• And How to Avoid them
• How Blending Actual Changes with IT Data
Slashes MTTR
• Demo
• Q&A
15 | Evolven Proprietary & Confidential
LEVERAGE EARLY DETECTION OF THE TRUE
ROOT CAUSE TO SLASH RCA TIME
Time
Risk
Fix
RCA
Change
Incident
resolved
Evolven tracks,
correlates and
analyzes changes
to slash RCA time
Change
detected Alert Incident
Change correlated
and risk analyzed
Incident
Resolved
Fix
16 | Evolven Proprietary & Confidential
DON’T WAIT FOR INCIDENTS TO HAPPEN,
PREVENT THEM
Time
Risk
Fix
RCA
Change
Incident
resolved
Evolven tracks and analyzes changes as
they happen to prevent incidents (instead
of waiting for symptoms alert to show)
Incident
Prevented
Fix Analysis
Risk
detected Incident
Alert
17 | Evolven Proprietary & Confidential
AGENDA
• Five Types of Undesired changes
• And How to Avoid them
• How Blending Actual Changes with IT Data
Slashes MTTR
• Demo
• Q&A
18 | Evolven Proprietary & Confidential
AGENDA
• Five Types of Undesired changes
• And How to Avoid them
• How Blending Actual Changes with IT Data
Slashes MTTR
• Demo
• Q&A
19 | Evolven Proprietary & Confidential
NEXT STEPS
• Call/Email us for a Demo
• sales@evolven
• 888-841-5578
• Have a question for Bill?
• 917-202-9936