Crawley, UK, June 26, 2018 – 89 per cent of IT decision makers in UK enterprises admit they are keeping old or legacy applications alive just to keep the historical data accessible, according to a new study. They recognize, however, that retaining these obsolete systems leaves businesses more open to security threats (87 per cent), and eats up resources that could be more productively used to support digital transformation (93 per cent).
The research, commissioned by Macro 4, a division of UNICOM® Global, questioned 100 IT decision makers in UK enterprises about the challenges associated with retiring (decommissioning) obsolete legacy applications and the problems of running them indefinitely on ‘life support’ solely to access historical data. The findings of the research are documented in a Macro 4 report, ‘Application decommissioning: the universal IT challenge’.
“It’s normal for IT applications to outlive their usefulness and be replaced by more modern systems. However, the original apps often hold valuable data that’s still needed by the business for operational reasons – such as responding to customer inquiries – or for compliance or business intelligence,” explains Jim Allum, Director, Commercial and Technical at Macro 4, which provides services and technology to help companies decommission their legacy applications.
That is why IT teams end up keeping old systems running, despite the business risks and costs of doing so, says Jim Allum: “Businesses can’t afford to lose access to all that data so they just keep the old applications on ‘life support’, which causes a lot of problems. Old systems are typically harder to fix when they go wrong, harder to keep secure, and cost more to support – that’s if you can find people with the right legacy skills.
“It creates a huge burden, especially where companies are running dozens or even hundreds of legacy applications – which is surprisingly common.”
One of the chief problems of keeping the aging systems running is related to security, as the research highlights. 87 per cent of the IT decision makers in the survey sample agree (55 per cent strongly agree)¹ that legacy applications on older operating systems are more vulnerable to security threats. At the same time, 82 per cent recognize that old or legacy systems are rarely compatible with modern security and authentication methods.
“On older systems some security vulnerabilities are harder – or even impossible – to resolve. If available at all, patches for new threats could be delayed because legacy apps are considered less of a priority,” says Jim Allum. “As legacy applications pre-date the latest security innovations there is a clear security risk to having a lot of legacy within your application portfolio.”
A related issue is compliance, with 84 per cent of the sample agreeing that on old/legacy applications it is harder to accurately track and control access to sensitive data in line with stricter data privacy regulations such as the General Data Protection Regulation (GDPR).
Overall, 93 per cent of the IT decision makers questioned acknowledge that supporting legacy applications to keep data accessible ties up IT resources that could be better employed on digital transformation or other strategic activities. 90 per cent feel that it is often difficult integrating legacy systems with newer applications that may have been introduced as part of digital transformation.
“Legacy applications don’t just divert resources away from digital transformation; they are also a practical barrier to achieving it,” says Jim Allum. “Problems integrating aging systems with new applications mean you end up with silos of data, which makes it that much harder to create a seamless digital experience.”
When asked why businesses continue to keep obsolete applications running instead of decommissioning them and moving the data elsewhere, the survey respondents point to a number of challenges, including:
“They feel it is too difficult to move the data somewhere else while keeping it easily accessible” (54 per cent)
“Business users are resistant to getting rid of their old applications” (39 per cent)
“They don’t always have the right in-house skills to retire/decommission applications” (32 per cent)
“Lack of time” (32 per cent)
“They are worried that if they move the data they will no longer meet their compliance obligations” (32 per cent)
“Decommissioning/retiring applications is considered too risky in case of data loss” (30 per cent)
“Lack of budget” (30 per cent)
Summarizing the overall findings, Jim Allum argues that enterprises should adopt a programmatic approach to decommissioning in order to address the legacy problem more effectively:
“Enterprise IT leaders are facing a universal set of problems caused by legacy systems, yet there is still inertia around getting decommissioning initiatives off the ground. Difficulties moving the data off legacy applications are cited as the number one challenge. Compliance, data integrity and resistance from business users are the other major considerations highlighted.
“It’s therefore important to manage the end of life process carefully, just like any other stage of the application lifecycle. You should aim to move the data away from obsolete applications and into a content repository where business users can continue to access it, so that the original application can be retired. At the same time you should adopt a repeatable decommissioning process that will work for any legacy application you choose to retire.
Finally, make sure that your new repository can keep the decommissioned data safe, secure and compliant – and is easy for businesspeople to use so it gains their acceptance.”
To view the full survey results, download Macro 4’s report, ‘Application decommissioning: the universal IT challenge’ from: www.macro4.com.
¹Survey respondents were shown a series of statements and asked if they ‘strongly agree’, ‘somewhat agree’, ’somewhat disagree’, ’strongly disagree’ or ‘don’t know’. The survey results are displayed in full in the report: www.macro4.com.
+44 (0)7940 584161
Macro 4, a division of UNICOM Global, develops software solutions that accelerate business transformation. Macro 4’s cross-platform enterprise information management solutions make it easy for companies to go digital, personalize customer communications and unlock the value of their corporate content. Macro 4 solutions for DevOps, session management and performance optimization are used by many of the world’s largest enterprises to modernize their mainframe applications and development processes.
UNICOM Global consists of more than fifty (50) corporate entities encompassing a wide range of businesses across all geographic regions. With its corporate headquarters in Los Angeles, California, to offices in Illinois, Kentucky, Florida, Massachusetts, Maryland, Minnesota, New Hampshire, North Carolina, New Jersey, Texas and Virginia, throughout EMEA in the UK, Ireland, Germany, France, Italy, Spain, Denmark, Belgium, Switzerland and the UAE, and across Asia/Pacific with locations in Japan, China, India, Australia, Korea, Thailand, Taiwan and the Philippines.
UNICOM Global offers deep in-house resources and flexible IT solutions to our partners worldwide. UNICOM Global focuses on acquiring and integrating mature and growing mid-cap NASDAQ, London Stock Exchange AIM and German publically-traded companies in technology, financing, IT, real estate, and business services. Please visit our websites for additional information about the services, products and solutions that UNICOM Global offers:
UNICOM Global - Assets, capital and investment management
UNICOM Systems - IBM Mainframe software products
UNICOM Government (formerly NASDAQ: GTSI) - Government IT solutions
UNICOM Engineering (formerly NASDAQ: NEI) Appliance platform
UNICOM Science and Technology Parks
UNICOM Technology Park – Innovation Labs in Virginia
UNICOM Science and Technology Park – Innovation Labs in New Jersey
UNICOM Capital - Business and Financial Services
USRobotics - Data communications products
Memeo - Enterprise-grade Secure File Sharing for the Cloud
Firetide - Wireless technology solutions for security and transportation
DETEC - Document composition products
SoftLanding Systems - IBM i software products
Macro 4 (formerly LONDON: MAO) - Document Management products
illustro - z/OS and z/VSE software products
iET Solutions - ITIL® ITSM software products
Eden - Mergers & Acquisitions, Business & Financial Services, and Real Estate
CICS.com - Hardware, Software, Outsourcing and Professional Services
All trademarks referenced herein are trademarks of their respective companies.