How to Prepare for Your Next Network War Room Debate - Part 1
October 23, 2018

Jay Botelho
LiveAction

Share this

The term "war room" comes from military: a place to strategize and debate. Over the years this concept has been heavily adopted by others, from NFL teams drafting the next star player to software developers rushing to fix code flaws. Given the broad management challenges associated with network operations, it's no surprise that war rooms have become commonplace in IT. Rolling out a new ERP system? To the war room for team collaboration and planning. Critical financial service just crashed? The war room is the place to be for some dramatic finger pointing and lightning-fast problem resolution.

For anyone that's been in a war room, there's no denying that it can be an intense place. Depending on what side of the table you're on it can be teeming with confidence and dominance, or veiled in defensiveness and uncertainty. Teams go to the war room to win. But, the ideal outcome is a solid plan or solution designed to deliver the best outcome while utilizing the least resources.

What are some of the key triggers that drive IT teams into the war room and how can you prepare yourself to contribute in a positive way?

Most war room sessions are either project-focused or response-focused. For example, project-focused war room triggers could be an infrastructure migration for software-defined networks or a shift to a hybrid cloud environment. Other possible triggers include large digital transformation initiatives that require major applications rollouts, such as a 100 percent commitment to going paperless through digitization and immediate access to electronic records, or a major ERP consolidation after a corporate merger.

On the response side, the pool of triggers can be vast. For example:

■ A major network or service outage. Imagine your hosted infrastructure provider goes down – yes, this has even happened to AWS.

■ A security incident or potential intrusion. For example, imagine getting a call from the FBI saying that a recent nationwide investigation into credit card fraud has turned up your company as the common denominator.

■ Investigating a serious security breach, such as one that exploited a known vulnerability that you failed to patch, and resulted in tens of millions of records stolen.

Imagine what the war room was like when Equifax was breached back in 2017. Or, when Salesforce had its major cloud outage in 2016, or when Slack experiences continual service outages. What about GDPR? Imagine the war room planning sessions that occurred as the deadline crept closer and closer. That's one you probably don't need to imagine; it's likely you lived through it.

Whether proactive or reactive in nature, war room sessions fundamentally come down to problem solving. But the ultimate goal is to eliminate these sessions altogether. Teams work hard to find problems before they impact the network. It's often called creating a "standard of visibility." They use solutions and tools that offer full system monitoring and visibility (NPMD), with stored data for historical reference; regular and disciplined penetration testing to catch misconfigurations, vulnerabilities and more; cyber security systems to detect hacks and vulnerabilities; and full network packet capture for troubleshooting network problems in real-time.

Read How to Prepare for Your Next Network War Room Debate - Part 2, offering tips on how to win in the war room.

Jay Botelho is Director of Engineering at LiveAction
Share this

The Latest

April 01, 2020

The role of the CIO is evolving with more of a focus on revenue and strategy, according to the 2019 Global CIO Survey from Logicalis ...

March 31, 2020

Organizations face major infrastructure and security challenges in supporting multi-cloud and edge deployments, according to new global survey conducted by Propeller Insights for Volterra ...

March 30, 2020

Developers spend roughly 17.3 hours each week debugging, refactoring and modifying bad code — valuable time that could be spent writing more code, shipping better products and innovating. The bottom line? Nearly $300B (US) in lost developer productivity every year ...

March 26, 2020

While remote work policies have been gaining steam for the better part of the past decade across the enterprise space — driven in large part by more agile and scalable, cloud-delivered business solutions — recent events have pushed adoption into overdrive ...

March 25, 2020

Time-critical, unplanned work caused by IT disruptions continues to plague enterprises around the world, leading to lost revenue, significant employee morale problems and missed opportunities to innovate, according to the State of Unplanned Work Report 2020, conducted by Dimensional Research for PagerDuty ...

March 24, 2020

In today's iterative world, development teams care a lot more about how apps are running. There's a demand for fixing actionable items. Developers want to know exactly what's broken, what to fix right now, and what can wait. They want to know, "Do we build or fix?" This trade-off between building new features versus fixing bugs is one of the key factors behind the adoption of Application Stability management tools ...

March 23, 2020

With the rise of mobile apps and iterative development releases, Application Stability has answered the widespread need to monitor applications in a new way, shifting the focus from servers and networks to the customer experience. The emergence of Application Stability has caused some consternation for diehard APM fans. However, these two solutions embody very distinct monitoring focuses, which leads me to believe there's room for both tools, as well as different teams for both ...

March 19, 2020

The 2019 State of E-Commerce Infrastructure Report, from Webscale, analyzes findings from a comprehensive survey of more than 450 ecommerce professionals regarding how their online stores performed during the 2019 holiday season. Some key insights from the report include ...

March 18, 2020

Robinhood is a unicorn startup that has been disrupting the way by which many millennials have been investing and managing their money for the past few years. For Robinhood, the burden of proof was to show that they can provide an infrastructure that is as scalable, reliable and secure as that of major banks who have been developing their trading infrastructure for the last quarter-century. That promise fell flat last week, when the market volatility brought about a set of edge cases that brought Robinhood's trading app to its knees ...

March 17, 2020

Application backend monitoring is the key to acquiring visibility across the enterprise's application stack, from the application layer and underlying infrastructure to third-party API services, web servers and databases, be they on-premises, in a public or private cloud, or in a hybrid model. By tracking and reporting performance in real time, IT teams can ensure applications perform at peak efficiency — and guarantee a seamless customer experience. How can IT operations teams improve application backend monitoring? By embracing artificial intelligence for operations — AIOps ...