Spotting Signs Your IT is Out of Date

Focus on the four primary levels of evaluation

The evolution of IT technology is advancing at breakneck speed. This evolution not only keeps the IT department in a constant state of change, but also dramatically changes the way the overall business must adapt to stay competitive.

IT technologies have rapidly morphed, including the way users consume them. Companies that hesitate to adapt will quickly fall from market leaders to laggards depending how effectively they embrace digital transformation.

But how does a leader know if the company is leading or lagging, and if its IT is out of date? While there are numerous ways to evaluate, let us focus on four primary levels, including infrastructure, applications, mobility and workplace IT.

Infrastructure

When we talk about infrastructure, first thoughts typically go to the cloud. The cloud, in essence, is a change of paradigm, not a technological change. Your company, in the past, purchased servers typically housed in your own data center. This model was based on periodic capital investments.

The maintenance might have been done by internal or external teams. Depending on a company’s approach, there was often an operational expense to support the data center too. The challenge is data centers can become outdated quickly, and you must maintain ongoing hardware investments to maintain effectivity.

If you have not already, an evaluation of completely moving to an operational model in the cloud should be conducted. Oftentimes, companies are forced to do so because some aspects of their infrastructure and applications require the cloud.

Keeping a data center on your company’s premises is a clear sign of outdated IT and not using the cloud at all is another one.

Applications

You probably have a combination of commercial off-the-shelf (COTS) business and legacy applications as well as some developed ad-hoc for your business (bespoke applications). When we talk about COT, there are two signs your systems are outdated. First, the version you use is no longer supported by the vendor, and there is not an easy way to upgrade the version.

This situation, sooner or later, will trigger tough decisions that will require an important, and potentially significant, investment. When we talk about bespoke applications, an important sign of obsolescence is when the technology used to develop your application is not used anymore in new applications and it is hard to find developers to maintain them.

The final point to mention here is licensing. Licensing models are moving more to SaaS (Software as a Service) where you pay for the whole package including software and hosting. If most of the applications you have follow an old licensing model, this might mean you are not moving at the right pace and need to rethink your applications strategy.

Applications versions, licensing models and technology used in your development will guide you on how outdated your applications ecosystem is.

Mobility

With mobility, we refer to how employees or customers can interact with the company via mobile devices. This is typically the area of greatest obsolescence in companies. In the most common failings, your employees are not able to manage their work from their mobile devices or your customers are not able to access your website in a mobile friendly way. Consumer use of mobile has overtaken the use of desktops to access services. Businesses must adapt instead of relying on laptop use.

If mobile is not a core part of your IT strategy, this means your IT has been outdated for a while already and you should define a strategy to catch up.

Workplace IT

The last, but not least, indicator of outdated IT we want to highlight is workplace IT. This addresses desktop PCs, laptops, mobile phones and workspace applications like email, telephony, video/audioconferencing, etc.

It is well understood you need a plan to renew your devices, which is usually every three years for mobile phones depending on your specific needs. You also need to have your operating system up to date to run modern applications. If you do not have an update plan, it’s a sign that the workplace is outdated. Another clear sign is if you use a hosted email system instead of a cloud system or if you still use old telephony devices instead of IP ones.

For a non-IT company, IT is becoming a service rather than a duty that the company itself manages. That can sometimes feel uncomfortable and perceived as a loss of control. But it really means IT is managed by highly specialized companies so your company can focus on your own business and customers, surely much more exciting than IT itself.

This article originally appeared in the November/December 2019 issue of Security Today.

Featured

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

Featured Cybersecurity

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3