Sunday, 8 Feb 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Innovations > What will it take to solve end-of-life software issues?
Innovations

What will it take to solve end-of-life software issues?

Last updated: October 8, 2025 2:51 pm
Published October 8, 2025
Share
end-of-life software
SHARE

Matt Middleton-Leal, Managing Director EMEA North and South, Qualys, discusses the challenges of changing end-of-life software program and find out how to handle these points.

You may not realize it, however outdated software program surrounds us day-after-day. The oldest software program merchandise nonetheless used right now are the SABRE airline reserving system and the IRS Particular person Grasp File and Enterprise Grasp File tax document techniques, based on the Guinness World Information listing for software in steady use.

These software program techniques have been designed and launched within the early Sixties. But, whereas these purposes would possibly nonetheless be operating and doing the job for which they have been created, there’s a wealth of different software program on the market that can be outdated and probably harmful.

Older software program techniques are nonetheless in use

Software program that’s not supported or equipped with safety updates is termed ‘finish of life’. The best-profile instance right here is the Microsoft Home windows working system, the place variations are changed, and older ones are not supported and don’t obtain updates.

In line with StatCounter, Home windows 11 and Home windows 10 are essentially the most extensively used techniques, at 53.3% and 42.9%, respectively. Nevertheless, older techniques are nonetheless in use, with Home windows 8 (circa 1% in whole), Home windows 7 (2%), and even Home windows XP (0.44%) nonetheless represented. XP went finish of life in April 2014; but, a couple of installations nonetheless maintain out throughout the worldwide desktop set up base.

Home windows 10 will get its personal end-of-life date on 14 October 2025 – for an OS that when had greater than one billion devices put in, that degree of change is a big endeavor

However why does this end-of-life software program nonetheless get used? Why aren’t all of us shifting to the most recent and most safe software program as normal? Ideally, this could happen. Nevertheless, for some tasks, the unique developer has gone bankrupt or ceased offering updates.

See also  Bain & Company issues AI guide for CEOs, opens Singapore hub

For others, firms don’t need to pay for newer variations when their older techniques work simply wonderful. In some circumstances, the software program can’t be up to date – any change would break the enterprise course of, and the fee to rebuild that software is much larger than the income it will create. In others, these purposes have simply been forgotten about.

Managing end-of-life software program: What ought to you recognize

Regardless of the purpose, that class of software program represents a threat. In line with our research, almost half (48%) of the problems on the CISA Recognized Exploited Vulnerabilities record are present in outdated and unsupported software program, whereas 20% of important belongings have software program put in that features end-of-support software program with recognized points rated as ‘excessive’ or ‘important’.

Managing this software program entails a security-focused method to asset administration, which incorporates realizing what belongings you have got, who throughout the organisation is chargeable for every asset or software program within the enterprise, and what dangers that software program would possibly pose. This element shouldn’t be sometimes a part of a conventional IT Asset Administration device, but it’s the key to prioritisation of remediation.

For all of your software program, contemplate monitoring the standing over time of these installations throughout their lifecycle, from normal availability by means of to end-of-life or end-of-support standing. Inside this, you must also put together a report on any belongings that can attain end-of-life standing within the subsequent six or twelve months, permitting ample time for migration planning or upgrades.

For software program that reaches end-of-life/end-of-support standing with out being changed, there’s usually a purpose. On the subject of the price of implementing adjustments, guarantee that you’ve a documented enterprise case and the corresponding implementation finances determine obtainable.

Alongside this, you possibly can monitor the Worth at Threat to the enterprise from that end-of-life software program, capturing how a lot any potential downtime or cyber incident would characterize to the enterprise over time. You possibly can then use this Worth at Threat determine to find out if and when the price of migration is decrease than the potential threat of sustaining the established order.

See also  9 SOC 2 compliance software to look out for in 2024

Challenges of shutting down end-of-life software program

The largest problem right here is with important purposes, the place revenues are instantly tied to the service operating. For the enterprise, turning off these techniques will encounter extra resistance as a result of any downtime represents misplaced income.

The chance of misplaced income is larger than the potential influence, so no adjustments are made. That is itself a threat. But firms will contemplate different comparable single factors of failure and plan forward for them – take a very precious worker chargeable for product design, or the CEO, for instance. Dropping them would characterize a severe influence on the enterprise, so they’ll sometimes make use of key particular person insurance coverage to mitigate that threat for components past the organisation’s management.

Even with techniques which can be deemed ‘mission important’, there are sometimes gaps that you would be able to reap the benefits of to implement adjustments. For instance, one producer resisted adjustments to its techniques that ran manufacturing strains; nonetheless, they did have a interval throughout which shift adjustments would happen, and the strains would come to a halt for a short while.

By exploiting this deliberate downtime and implementing the change regularly, the IT crew have been capable of replace techniques and preserve productiveness. There are, due to this fact, methods to plan forward and scale back that threat.

Overcoming obstacles

What occurs when you possibly can’t simply exchange that software program? Typical safety for these techniques contains air-gapping and operating on unconnected networks, whereas software firewalls and different safety techniques can be utilized to restrict interplay to recognized and trusted gadgets.

In these circumstances, understanding potential misconfigurations or strategies to entry the system will likely be important to forestall potential assaults and search options to patching. Deploying the potential to eradicate threat by deploying these countermeasures will likely be a significant cog in your layered defence technique.

See also  UK turbocharges science and technology with £86bn funding

For companies, end-of-life software program might appear to be one other safety expense, and when important finances constraints are in place, safety points will be simpler to miss. To deal with this, it is best to quantify the extent of that influence in a kind that’s straightforward for the enterprise to grasp – when it comes to cash. The enterprise already mitigates different dangers on this method, so you possibly can apply the identical method.

Alongside this, there’s the broader influence. Whereas an assault on an asset rated as non-critical may be restricted to that particular machine or piece of software program, the chances are it might have an effect on the broader community or be used as a place to begin for lateral motion.

Whereas the enterprise will perceive the danger that exists when techniques are compromised, framing it when it comes to financial influence will make it simpler to acquire help from enterprise management.

The way forward for software program alternative: Lowering dependency to plan forward

All software program has a lifecycle. Even techniques chargeable for managing flight bookings or tax returns will ultimately get replaced.

The problem is find out how to keep away from stepping into conditions the place the enterprise is so depending on anyone piece of software program that the considered turning it off is itself a threat. Fairly than being beholden to this software program, you possibly can assist the enterprise perceive the challenges, the potential influence, after which plan forward.

Utilizing Worth at Threat to calculate the financial influence makes it simpler to argue from a place of power in enterprise phrases, moderately than relying solely on technological reasoning.

Source link

TAGGED: endoflife, issues, software, solve
Share This Article
Twitter Email Copy Link Print
Previous Article LumaDock Launches VPS for Web Hosting - With Dedicated Resources LumaDock Launches VPS for Web Hosting – With Dedicated Resources
Next Article Lantronix targets edge AI bottlenecks with no-code orchestration platform Lantronix targets edge AI bottlenecks with no-code orchestration platform
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Ryanair’s CEO Unveils Growth Strategy and Tech Advances in Fireside Chat

In a latest fireplace chat, Ryanair's progress technique and technological developments have been mentioned. The…

June 7, 2024

Bybit Advances Regulatory Compliance, Temporarily Adjusts EEA Operations

Dubai, United Arab Emirates, December thirteenth, 2024, Chainwire Bybit, the world’s second-largest cryptocurrency trade by…

December 13, 2024

Arrcus Raises $30M in Funding

Arrcus, a San Jose, CA-based hyperscale networking software program firm, raised $30M in funding. The…

July 21, 2024

Evolve Business Group Receives Multi-Million-Pound Investment from BGF

Evolve Business Group, a Wigan, UK-based firm which focuses on end-to-end managed community and IT…

August 5, 2024

Kenya Secures Funding for Major Data Center Infrastructure Project | DCN

(The Star, Kenya) -- The Kenyan government has secured a $4.48 billion (Sh682,496,192,000 billion) deal…

January 26, 2024

You Might Also Like

How JHC is integrating HPC, AI, and quantum
Innovations

How JSC is integrating HPC, AI, and quantum

By saad
printed electronics
Innovations

How Tampere Uni’s printed electronics forge a sustainable future

By saad
DiDAX: Innovating DNA-based data applications
Innovations

DiDAX: Innovating DNA-based data applications

By saad
Where energy challenges meet AI solutions
Innovations

Where energy challenges meet AI solutions

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.