Spotting Signs Your IT is Out of Date

Focus on the four primary levels of evaluation

The evolution of IT technology is advancing at breakneck speed. This evolution not only keeps the IT department in a constant state of change, but also dramatically changes the way the overall business must adapt to stay competitive.

IT technologies have rapidly morphed, including the way users consume them. Companies that hesitate to adapt will quickly fall from market leaders to laggards depending how effectively they embrace digital transformation.

But how does a leader know if the company is leading or lagging, and if its IT is out of date? While there are numerous ways to evaluate, let us focus on four primary levels, including infrastructure, applications, mobility and workplace IT.

Infrastructure

When we talk about infrastructure, first thoughts typically go to the cloud. The cloud, in essence, is a change of paradigm, not a technological change. Your company, in the past, purchased servers typically housed in your own data center. This model was based on periodic capital investments.

The maintenance might have been done by internal or external teams. Depending on a company’s approach, there was often an operational expense to support the data center too. The challenge is data centers can become outdated quickly, and you must maintain ongoing hardware investments to maintain effectivity.

If you have not already, an evaluation of completely moving to an operational model in the cloud should be conducted. Oftentimes, companies are forced to do so because some aspects of their infrastructure and applications require the cloud.

Keeping a data center on your company’s premises is a clear sign of outdated IT and not using the cloud at all is another one.

Applications

You probably have a combination of commercial off-the-shelf (COTS) business and legacy applications as well as some developed ad-hoc for your business (bespoke applications). When we talk about COT, there are two signs your systems are outdated. First, the version you use is no longer supported by the vendor, and there is not an easy way to upgrade the version.

This situation, sooner or later, will trigger tough decisions that will require an important, and potentially significant, investment. When we talk about bespoke applications, an important sign of obsolescence is when the technology used to develop your application is not used anymore in new applications and it is hard to find developers to maintain them.

The final point to mention here is licensing. Licensing models are moving more to SaaS (Software as a Service) where you pay for the whole package including software and hosting. If most of the applications you have follow an old licensing model, this might mean you are not moving at the right pace and need to rethink your applications strategy.

Applications versions, licensing models and technology used in your development will guide you on how outdated your applications ecosystem is.

Mobility

With mobility, we refer to how employees or customers can interact with the company via mobile devices. This is typically the area of greatest obsolescence in companies. In the most common failings, your employees are not able to manage their work from their mobile devices or your customers are not able to access your website in a mobile friendly way. Consumer use of mobile has overtaken the use of desktops to access services. Businesses must adapt instead of relying on laptop use.

If mobile is not a core part of your IT strategy, this means your IT has been outdated for a while already and you should define a strategy to catch up.

Workplace IT

The last, but not least, indicator of outdated IT we want to highlight is workplace IT. This addresses desktop PCs, laptops, mobile phones and workspace applications like email, telephony, video/audioconferencing, etc.

It is well understood you need a plan to renew your devices, which is usually every three years for mobile phones depending on your specific needs. You also need to have your operating system up to date to run modern applications. If you do not have an update plan, it’s a sign that the workplace is outdated. Another clear sign is if you use a hosted email system instead of a cloud system or if you still use old telephony devices instead of IP ones.

For a non-IT company, IT is becoming a service rather than a duty that the company itself manages. That can sometimes feel uncomfortable and perceived as a loss of control. But it really means IT is managed by highly specialized companies so your company can focus on your own business and customers, surely much more exciting than IT itself.

This article originally appeared in the November/December 2019 issue of Security Today.

Featured

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • Midtown Manhattan Shooting Kills 4, Including NYPD Officer

    Four people were killed, including a NYPD officer, in a midtown Manhattan shooting on Monday. That’s according to CNN. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.