IT Downtime Is Growing As Digital Transformation Speeds Up

In the race to keep up with rapid industry changes, businesses and brands are increasingly moving processes and deliverables online. Meanwhile, company executives across a wide range of departments are increasingly being tasked with digital transformation initiatives.

While this usually involves moving the company tech stack from on-premises to the cloud, it’s so much more than that. It’s a journey to drive fundamental changes in how your company operates, and how it delivers value to its customers and employees alike, by leveraging new technologies and offering up-to-date solutions and innovation. 
 
Of course, with this push to be “of the moment” comes the trend to release quicker and iterate faster, so that the results of smaller changes can be tested, feedback gathered, and built upon. For example, applications now are being developed with agile methodologies, involving weekly release cycles, or even continuous deployment multiple times a day, which helps current applications deploy and scale quicker too.  

Future-proofing IT Systems   

While this looks great on the surface, the IT infrastructure must be in a state where it can enable this speed - and so often it isn’t. A glance at national headlines shows that high-profile outages and brownouts are increasingly common, and no organisation is exempt.

Add to that a shortage of IT professionals with cloud and hybrid experience, and it means modernisation initiatives may initially cause more outages and headaches than time-savings.  
 
In a recent survey commissioned by LogicMonitor an incredible 97% of 600 global IT professionals said they had experienced an IT brownout in the past three years, and 94% had an outage in the same time, with an average of 15 outages and 19 brownouts every three years.

Tellingly, over half (51%) said they had seen an increase in these outages since the start of the pandemic in March 2020. 
 
In a further report, 300 IT leaders were asked what they felt was causing the increase in downtime. Opinions vary, but nearly 64% of IT executives (Vice President title or above) believe mobile computing, cloud, hybrid environments, AI, digital transformation, edge computing and IoT are making brownouts and outages more common, rather than having no impact or making them less common. But how do we stem the flow? 

Visibility Is Key 

Unsurprisingly, 75% said downtime prevention starts with performing preventative maintenance, whereas reducing downtime once it has occurred, comes down to proactive monitoring (74%). That means knowing how your whole stack runs, being able to spot trends that lead to a problem, as well as reviewing system logs quickly and easily during and after a blip. 
 
Unfortunately, reducing downtime is easier said than done. Further steps are required in your IT transformation – namely, the unification of enterprise monitoring and observability tools. After all, it’s hard to be agile if you’re running 50 different monitoring systems. Here are a few questions to consider when trying to determine how much visibility you have into your organisation’s tech stack: 

 

  • Does the ITOps team have the ability to monitor the full IT environment - from infrastructure to networks, clouds, applications, APIs and devices?
  • Can you see how applications are performing in any environment - including containers?
  • Are you able to quickly find the total number of applications your organisation has deployed and their independencies?
  • Is your ITOps team consistently able to see an issue before a user reports it?

Automating application deployment into multiple monitoring systems is the opposite of agility. Whereas, having a single program for unified observability gives CIOs a valuable status overview that helps them to understand quickly any changes that need to be made to nip problems in the bud. 
 
As the rapid pace of digital transformation - made even more imperative by the lingering pandemic - continues to be driven forward, organisations cannot afford to experience downtime. However, by embracing technology that allows for observability across their entire IT infrastructure, organisations can mitigate the risk of downtime and quickly resolve issues as and when they do occur. 
 
Matt Tuson is EMEA General Manager at LogicMonitor

You Might Alo Read: 

Under A Watchful Eye - Unified Observability:

 

« Critical Infrastructure: A Flashing Beacon For Cybercrime
From AI to ESG: Key Security Technology Trends Of 2023 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Mellanox Technologies

Mellanox Technologies

Mellanox Technologies is a leading supplier of end-to-end Ethernet and InfiniBand intelligent interconnect solutions and services for servers, storage, and hyper-converged infrastructure.

GovCERT.CZ

GovCERT.CZ

GovCERT.CZ is the Government Computer Emergency Response Team of the Czech Republic.

Kualitatem

Kualitatem

Kualitatem Inc. is an independent software testing and information systems auditing company

PhishLine

PhishLine

PhishLine helps Information Security Professionals meet and overcome the increasing challenges associated with social engineering and phishing.

Cienaga Systems

Cienaga Systems

Cienaga Systems is a leader in autonomous cyber threat hunting technology.

Thinkst Applied Research

Thinkst Applied Research

Thinkst is an Applied Research company with a deep focus on information security.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

Cyber Threat Alliance

Cyber Threat Alliance

CTA is working to improve cybersecurity of our digital ecosystem by enabling near real-time cyber threat information sharing among companies and organizations in the cybersecurity field.

GoCyber

GoCyber

GoCyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

HITRUST Alliance

HITRUST Alliance

HITRUST provides widely-adopted common risk and compliance management frameworks, related assessment and assurance methodologies.

AiCULUS

AiCULUS

AiCULUS is a global technology company that specializes in API security and Risk Management products.

Lancera

Lancera

Lancera provides growth accelerating Software Development, Web Presence and Cybersecurity Solutions with a focus on customer happiness.

Harvey Nash

Harvey Nash

Harvey Nash is a leading global provider of talent and technology solutions.

Endure Secure

Endure Secure

Endure Secure is a managed cyber security & information security consultancy. Our passion for IS and our understanding of the threat landscape is reflected in the services that we provide.

CloudGuard

CloudGuard

CloudGuard is an AI-driven XDR platform that helps organisations to proactively detect and automatically remediate threats in real-time.

Deepware

Deepware

Deepware is an emerging AI research company dedicated to exploring the potential of GenAI in both generation and detection.