How to Prepare for Your Next Network War Room Debate - Part 1
October 23, 2018

Jay Botelho
LiveAction

Share this

The term "war room" comes from military: a place to strategize and debate. Over the years this concept has been heavily adopted by others, from NFL teams drafting the next star player to software developers rushing to fix code flaws. Given the broad management challenges associated with network operations, it's no surprise that war rooms have become commonplace in IT. Rolling out a new ERP system? To the war room for team collaboration and planning. Critical financial service just crashed? The war room is the place to be for some dramatic finger pointing and lightning-fast problem resolution.

For anyone that's been in a war room, there's no denying that it can be an intense place. Depending on what side of the table you're on it can be teeming with confidence and dominance, or veiled in defensiveness and uncertainty. Teams go to the war room to win. But, the ideal outcome is a solid plan or solution designed to deliver the best outcome while utilizing the least resources.

What are some of the key triggers that drive IT teams into the war room and how can you prepare yourself to contribute in a positive way?

Most war room sessions are either project-focused or response-focused. For example, project-focused war room triggers could be an infrastructure migration for software-defined networks or a shift to a hybrid cloud environment. Other possible triggers include large digital transformation initiatives that require major applications rollouts, such as a 100 percent commitment to going paperless through digitization and immediate access to electronic records, or a major ERP consolidation after a corporate merger.

On the response side, the pool of triggers can be vast. For example:

■ A major network or service outage. Imagine your hosted infrastructure provider goes down – yes, this has even happened to AWS.

■ A security incident or potential intrusion. For example, imagine getting a call from the FBI saying that a recent nationwide investigation into credit card fraud has turned up your company as the common denominator.

■ Investigating a serious security breach, such as one that exploited a known vulnerability that you failed to patch, and resulted in tens of millions of records stolen.

Imagine what the war room was like when Equifax was breached back in 2017. Or, when Salesforce had its major cloud outage in 2016, or when Slack experiences continual service outages. What about GDPR? Imagine the war room planning sessions that occurred as the deadline crept closer and closer. That's one you probably don't need to imagine; it's likely you lived through it.

Whether proactive or reactive in nature, war room sessions fundamentally come down to problem solving. But the ultimate goal is to eliminate these sessions altogether. Teams work hard to find problems before they impact the network. It's often called creating a "standard of visibility." They use solutions and tools that offer full system monitoring and visibility (NPMD), with stored data for historical reference; regular and disciplined penetration testing to catch misconfigurations, vulnerabilities and more; cyber security systems to detect hacks and vulnerabilities; and full network packet capture for troubleshooting network problems in real-time.

Read How to Prepare for Your Next Network War Room Debate - Part 2, offering tips on how to win in the war room.

Jay Botelho is Director of Engineering at LiveAction
Share this

The Latest

March 21, 2019

Achieving audit compliance within your IT ecosystem can be an iterative process, and it doesn't have to be compressed into the five days before the audit is due. Following is a four-step process I use to guide clients through the process of preparing for and successfully completing IT audits ...

March 20, 2019

Network performance issues come in all shapes and sizes, and can require vast amounts of time and resources to solve. Here are three examples of painful network performance issues you're likely to encounter this year, and how NPMD solutions can help you overcome them ...

March 19, 2019

"Scale up" versus "scale out" doesn't just apply to hardware investments, it also has an impact on product features. "Scale up" promotes buying the feature set you think you need now, then adding "feature modules" and licenses as you discover additional feature requirements are needed. Often as networks grow in size they also grow in complexity ...

March 18, 2019

Network Packet Brokers play a critical role in gaining visibility into new complex networks. They deliver the packet data and information IT and security teams need to identify problems, recognize security issues, and ensure overall network performance. However, not all Packet Brokers are created equal when it comes to scalability. Simply "scaling up" your network infrastructure at every growth point is a more complex and more expensive endeavor over time. Let's explore three ways the "scale up" approach to infrastructure growth impedes NetOps and security professionals (and the business as a whole) ...

March 15, 2019

Loyal users are the key to your service desk's success. Happy users want to use your services and they recommend your services in the organization. It takes time and effort to exceed user expectations, but doing so means keeping the promises we make to our users and being careful not to do too much without careful consideration for what's best for the organization and users ...

March 14, 2019

What's the difference between user satisfaction and user loyalty? How can you measure whether your users are satisfied and will keep buying from you? How much effort should you make to offer your users the ultimate experience? If you're a service provider, what matters in the end is whether users will keep coming back to you and will stay loyal ...

March 13, 2019

What if I said that a 95% reduction in the amount of IT noise, 99% reduction in ticket volume and 99% L1 resolution rate are not only possible, but that some of the largest, most complex enterprises in the world see these metrics in their environments every day, thanks to Artificial Intelligence (AI) and Machine Learning (ML)? Would you dismiss that as belonging to the realm of science fiction? ...

March 12, 2019
As a consumer, when you order products online, how do you expect them to get delivered? Some key requirements are: the product must arrive on time, well-packed, and ultimately must give you an easy gateway to return it if it is not as per your expectations. All this has been made possible via a single application. But what if this application doesn't function the way you want or cracks down mid-way, or probably leaks off information about you to some potential hackers? Technical uncertainty and digital chaos are the two double-edged swords dangling over this billion-dollar ecommerce market. Can Quality Assurance and Software Testing save application developers from this endless juggle? ...
March 11, 2019

Of those surveyed, 96% of organizations have a digital transformation strategy, with 57% approaching it as an enterprise-wide priority, with a clear emphasis on speed of business, costs, risk, and customer satisfaction, according to IDC’s Aligning IT Strategies and Business Expectations for Digital Transformation Success, sponsored by EasyVista ...

March 08, 2019

One of my ongoing areas of focus is analytics, AIOps, and the intersection with AI and machine learning more broadly. Within this space, sad to say, semantic confusion surrounding just what these terms mean echoes the confusions surrounding ITSM ...