Opening the Gates to the Digital War Room - What is it Now, and What is it Likely to Become?
March 27, 2018

Dennis Drogseth
EMA

Share this

EMA has just completed research titled, Unifying IT for Digital War Room Performance. The research was partly inspired by current debates about the role of the "War Room" and how it is or is not evolving. Some seem lost in fantasy — "the war room will absolutely disappear." Whereas for others, basic incident handling is just emerging and having a more defined and effective war room team remains a hope for the distant future.

The Industry Debate

As with so much in our industry, a lot of this debate depends on meaning and definition — or in this case how you do or don't define "war room." War rooms are often defined as disastrous assemblages of finger-pointing adults caught up with siloed versions of "the truth" — all at least as interested in proving that their teams are not guilty, as they are in actually solving the problem at hand.

Our goal was to find out how teams are being formed and optimized to handle major incidents and problems that require cross-domain insights

However, for our research we took a much more open-ended approach. Our goal was to find out how teams are being formed and optimized to handle major incidents and problems that require cross-domain insights. This included, by the way, proactive cross-domain teams for managing issues before they become the IT equivalent of life-threatening. Our war rooms could be either physical or virtual. Highly automated or not. Made up of consistent, well-defined teams, or not. But what made them war rooms was the need for collaborative decision making across silos, and the need for urgency in taking effective action.

War Room Processes

Throughout the research, EMA examined the most critical processes logically relevant to war room performance. These included:

Initial awareness — alerting the relevant stakeholders that something is, or about to be, a problem

Response team engagement — making sure relevant stakeholders have an informed context for working together to resolve the problem

Triage and diagnostics — finding out what's really wrong in clear service-impact context

Remediation — actually fixing problem, ideally with inbuilt levels of automation to support the fix

Validation — ensuring that the "fix" really is a fix

Ideally, also, a history has been kept so that IT can move to prevent the problem in the future, or at least bring it to ever speedier resolution. We asked respondents about this in the context of auditing war room performance.

The War Room's Multiple Dimensions

We also looked at cloud to see if public and private cloud initiatives were making things easier or harder in the war room and why. (What we saw is a little bit of both.)

And then there's DevOps and agile. One of the industry hallucinations seems to be that DevOps and agile are making the war room disappear. What we found is just the opposite in the vast majority of cases (well over 80%). We looked, as well, at how development is working as an integrated part of the digital war room phenomenon, and the impact of in-house applications on war room processes.

And then of course there's security. Or maybe security should come first. In fact, security incident and event management (SIEM) was right at the top of digital war room technology priorities along with advanced IT analytics. The growing need to handshake between operations, security and ITSM teams in the digital war room was evident throughout our data.

Looking at all of the above, you might say that incidents and problems are increasingly non-denominational in how they occur. In other words, digital war rooms are no longer (if they ever were) just about operations in a vacuum.

Technologies, Metrics and Success

As mentioned above, analytics and security were the big winners when we looked at digital war room technology priorities. In fact, the top-ranking five were:

1. Advanced IT analytics or AIOps

2. SIEM

3. Security threat intelligence analysis

4. Endpoint instrumentation and analytics

5. IT process automation

The top two technical metrics were performance latencies and end user experience management.

And the top three obstacles to digital war room success were security-related issues, inconsistent data, and data fragmentation.

In Summary

Overall, we saw that the digital war room is becoming more not less important, growing in size, becoming more proactive and fundamentally more strategic.

To get a lot more insight, please watch my on-demand EMA webinar.

Read my next blog, Organization and Process (Or Lack Thereof) in the Digital War Room

Dennis Drogseth is VP at Enterprise Management Associates (EMA)
Share this

The Latest

August 21, 2018

High availability's (HA) primary objective has historically been focused on ensuring continuous operations and performance. HA was built on a foundation of redundancy and failover technologies and methodologies to ensure business continuity in the event of workload spikes, planned maintenance, and unplanned downtime. Today, HA methodologies have been superseded by intelligent workload routing automation (i.e., intelligent availability), in that data and their processing are consistently directed to the proper place at the right time ...

August 20, 2018

You need insight to maximize performance — not inefficient troubleshooting, longer time to resolution, and an overall lack of application intelligence. Steps 5 through 10 will help you maximize the performance of your applications and underlying network infrastructure ...

August 17, 2018

As a Network Operations professional, you know how hard it is to ensure optimal network performance when you’re unsure of how end-user devices, application code, and infrastructure affect performance. Identifying your important applications and prioritizing their performance is more difficult than ever, especially when much of an organization’s web-based traffic appears the same to the network. You need insight to maximize performance — not inefficient troubleshooting, longer time to resolution, and an overall lack of application intelligence. But you can stay ahead. Follow these 10 steps to maximize the performance of your applications and underlying network infrastructure ...

August 16, 2018

IT organizations are constantly trying to optimize operations and troubleshooting activities and for good reason. Let's look at one example for the medical industry. Networked applications, such as electronic medical records (EMR), are vital for hospitals to provide outstanding service to their patients and physicians. However, a networking team can often not be aware of slow response times on the remotely hosted EMR application until a physician or someone else calls in to complain ...

August 15, 2018

In 2014, AWS Lambda introduced serverless architecture. Since then, many other cloud providers have developed serverless options. What’s behind this rapid growth? ...

August 14, 2018

This question is really two questions. The first would be: What's really going on in terms of a confusion of terms? — as we wrestle with AIOps, IT Operational Analytics, big data, AI bots, machine learning, and more generically stated "AI platforms" (… and the list is far from complete). The second might be phrased as: What's really going on in terms of real-world advanced IT analytics deployments — where are they succeeding, and where are they not? This blog will look at both questions as a way of introducing EMA's newest research with data ...

August 13, 2018

Consumers will now trade app convenience for security, according to a study commissioned by F5 Networks, The Curve of Convenience – The Trade-Off between Security and Convenience ...

August 10, 2018

Gartner unveiled the CX Pyramid, a new methodology to test organizations’ customer journeys and forge more powerful experiences that deliver greater customer loyalty and brand advocacy ...

August 09, 2018

Nearly half (48 percent) of consumers report that they currently use, or have used in the past, services of organizations that were involved in a publicly disclosed data breach and, of those, 48 percent have stopped using the services of an organization because of a breach, according to Global State of Digital Trust Survey and Index 2018, a new report from CA Technologies ...

August 08, 2018

Here's the problem: IT teams are in the dark. The only information they have available to them is based on what users decide to tell them about through calls to the help desk ...