5 Ways to Approach Your Legacy IT Systems

When you hear the term “legacy” used in the media, it’s usually used to compliment someone who is a trailblazer or pioneer. However, in the IT world it is nearly always used to describe a problem system, typified by high costs to substitute, upgrade or integrate with, and seemingly impossible to replace (mainframe computing anyone?). In other words, this system may have significant value but it is holding the business back. To avoid this pitfall, rather than making tactical decision-making creating an investment sinkhole, what is needed is an IT strategy with a detailed technology roadmap.  By lifting the company view from immediate (tactical) to longer term (strategic) is the game changer, however, realistically it is a combination of the tactical and strategic solutions. Let’s take a look at the various ways to deal with legacy IT systems: Band-Aid Approach Putting a workaround in place is often tempting when costs start to go through the roof.  This sometimes starts out as a short-term exercise only to end up as a permanent solution.  Manage this approach closely. Pro: Short term it achieves the business goals Extends the investment of the system Con: May need specialised skills (and they are usually expensive) The pain drags on, especially for the staff who use the systems Putting off the inevitable may end with a large cost later. Complement with Cloud If possible offload as much functionality to a cloud service.   For example, using O365 for email services, however, delay the move to OneDrive and continue to use your local file server.  Moving file stores can be complicated, with user and system touch points that need to be considered. Pro: Reduces the dependency on the system over time Phased approach has less immediate impact on the business operations Con: Complicates the environment Extends the time frame to exit the legacy system Ringfence and Air-Gap Place the system in its own self-contained environment such as using virtualization technologies, moving to a dedicated network, or use a platform such as Citrix XenApp.  A common example of this approach is when vendor support has expired and no further security patches will be released.  Ringfencing will contain potential virus outbreaks that may be targeting older systems, mitigating the impact. Pro: Buys more time to get a strategic solution in place Extends the investment of the system Con: Adds complexity to the environment Only a short term solution Build Replacement in Parallel If you have the resources, then this approach is one to consider.  Building in parallel mitigates risk to the business and allows for proper end to end testing before being introduced. Pro: Less disruption to business, where the old system continues to service the business until the new is built, tested and readied A structured and clean approach Does not add complexities to the environment Shorter times to implement, teams can focus on the project of delivering the new system Con: Costly to operate 2 systems at the same time Infrastructure capacity needs to be considered carefully Data migration may be complicated and lengthy adding to the cost and impacting schedule Step change has more impact on operational staff Phased Approach These days this is often labelled the agile approach and does align nicely with the Agile project management methodology.  That said, the phased approach can be implemented via a number of project methodologies. Pro: Spread the costs over time The business realises the benefits from each phase and does not need to wait until the end of the entire project Gradual introduction gives staff time to adjust to the new processes Con: Longer implementation times Project complexity increases Whichever approach you go for, the main aim is to avoid creating technical debt, in other words – the additional future costs created from a shortcut or poor decision made today. Starboard IT have extensive experience in managing legacy systems and have implemented all approaches listed in this article.  We would love to talk Starboard IT have extensive experience in managing legacy systems and have implemented all approaches listed in this article.  We would love to talk through your particular legacy systems and discuss the best way forward. If you’re looking for consultancy services on your company’s security policy, contact Starboard IT to find out what we can do for you.
Scroll to Top