Administrator 08/10/2019
4 Tips to Combat Network Siloes

The evolution of IT network silos mirrors the development of IT networks over the last thirty years or so. Back in the day, networks were constructed on a hub and spoke model. The data centre providing IT advice and support lay at the centre, and a well-defined network edge was where the business units operating the applications sat.

Having each application area on a separate spoke tended to create islands of technology, isolating departments, business units and even regional offices.  As a result, they began to paddle their own canoes and sought and implemented solutions without the input of central IT.

When it came time to create a single centrally managed IT network, the IT professionals charged with this task found it to be technologically and often politically very difficult to do.

They found that systems were incompatible, users were unhappy, and local IT support groups needed to be terminated or integrated into central IT, often with great resistance from both sides.  Suppliers of equipment and support services of the systems that were replaced had to be fired, leading to all sorts of legal and support issues.

Overall, a time consuming, complex and expensive exercise.   And we are about to do it again when we move to the cloud.

One of the big issues is network silos of applications and data.  What are they and how can we avoid them? Here are four suggestions.

Network Silos

Network Silos

Network professionals consider it a point in an IT network where applications and data are held but kept ring-fenced from other areas of the network. They usually consider it a bad thing since free flow of data around an IT Network is considered to be of vital importance.   However, segregation of that application and its data may be necessary for operational, perhaps security, reasons.

Silo Avoidance

There is an old management dictum, “If you can’t see it, you can’t manage it”.  If Central IT don’t know about a network application, then they can’t manage or control it.  The danger is that it can easily fall within a departmental budget to source and implement an IT solution, leading to the creation of a silo.

  • Stay Close to the Users

    Stay Close to the Users

    IT must ensure that it is close enough to the  users to reassure them that they are listening to their concerns and addressing their immediate and longer-term issues.  This is often the establishment of a departmental support group and a senior IT person dedicated to supporting that department.

  • Intelligence


    IT must have good control over its own network and applications environment to notice very quickly that a rogue application has been added, or a new independent network has been installed.   It is obvious when for example, and this has happened, a second DHCP server is attached to the network, but some additions are less obvious.

    IT support staff who move among the user community must have eyes open for any changes to the IT environment that they have not initiated, for example new PCs, installation of new network equipment or cables.

    Another way of discovery is to ensure that any new IT equipment must be approved by IT, even if the purchase request is submitted to a procurement department.

  • The Carrot

    The Carrot

    As noted above, silos are often created because departments feel that their needs are not being met by Central IT.  It is all very well, as suggested above, to have IT people focussed on the department, but if there is no improvement in service delivery to the department, then this will be perceived as mere window dressing and the silo will appear anyway.

    IT must therefore deliver.  The carrot is to include the departmental needs as budgeted elements of the IT Strategic plan, with clear short-term and longer-term benefits, and actually deliver them.

  • The Stick

    The Stick

    This is not a good option, since it will certainly lead to problems.  IT must make sure that it is corporate policy to forbid the installation of any new systems and networks, and the attachment of any equipment to the corporate network unless is made or approved by Central IT.   This is also good for network security.

Hopefully these suggestions will provide food for thought and will lead to the detection, removal and prevention of silos.

Leave a comment.

Your email address will not be published. Required fields are marked*