Tackling the legacy application challenge

Macro 4
31 Jan 202219:28

Summary

TLDRThis webinar, hosted by Macro4, addresses the challenges of managing data security in legacy applications. It highlights the risks of non-compliance with regulations like GDPR, the incompatibility with modern security mechanisms, and the lack of security patches. The discussion includes strategies for identifying at-risk applications, the importance of data security, and a case study on successfully decommissioning a legacy application in the financial sector. The session also explores the role of Columbus, Macro4's solution for secure data management and migration, emphasizing the benefits of consolidating data into a single, secure repository.

Takeaways

  • πŸ”’ Data Security is Crucial: Legacy applications may pose a security risk to businesses due to outdated security measures that could be non-compliant with regulations like GDPR.
  • πŸ“ˆ Webinar Series: This is the first of three webinars focusing on managing data in legacy applications, covering compliance, business risk, and increasing business efficiency.
  • 🚫 Incompatibility with Modern Security: Legacy applications might be incompatible with modern security mechanisms such as multi-factor authentication (MFA).
  • πŸ›‘οΈ Patching Vulnerabilities: Older applications may lack available patches to fix security vulnerabilities or have slower rollouts due to lower priority.
  • πŸ“š Importance of Data Security: Data security is distinct from application security and involves ensuring the protection of sensitive personal identifiable information (PII).
  • 🏦 Case Study Insight: A successful legacy application decommissioning process in the financial sector highlighted the benefits of moving to a more secure system like Columbus.
  • πŸ” Identify Risky Applications: The first step in managing legacy applications is identifying those that do not meet current security requirements.
  • πŸ—‘οΈ Decommissioning Strategy: Consider whether data should be migrated, deleted, or archived when planning to decommission legacy applications.
  • πŸ”— Link with Existing Security: Columbus can integrate with existing security infrastructures like Active Directory to maintain consistent access controls.
  • 🌐 Cloud Migration Considerations: Moving legacy applications to the cloud does not inherently resolve security issues; instead, use secure solutions like Columbus for cloud migration.
  • πŸ“ˆ Long-Term Data Repository: Columbus offers a safe, long-term repository for data with ongoing development support and the ability to meet regulatory compliance.

Q & A

  • What is the main focus of the webinar series presented by Macro4?

    -The webinar series focuses on the challenges of managing data in legacy applications, covering topics such as data security, compliance and business risk, and increasing business efficiency through decommissioning legacy applications.

  • Why can older legacy applications pose a risk to a business?

    -Older legacy applications can pose a risk due to potential lack of security, non-compliance with regulations like GDPR, incompatibility with modern security mechanisms such as multi-factor authentication, and slow or unavailable patches for security vulnerabilities.

  • What is the importance of data security in the context of legacy applications?

    -Data security is crucial because it protects sensitive personal identifiable information (PII) and business-critical data from unauthorized access and breaches, ensuring compliance with regulations and minimizing business risk.

  • How does the lack of multi-factor authentication (MFA) in legacy applications impact security?

    -The absence of MFA in legacy applications can make them more vulnerable to unauthorized access, as it lacks an additional layer of security that verifies the user's identity through multiple means.

  • What is the role of Macro4 in helping organizations manage legacy application data?

    -Macro4 assists organizations by providing a secure repository for legacy application data, helping to identify and decommission legacy applications that pose security risks, and ensuring that data remains accessible and compliant with regulations.

  • Can you provide an example of a successful legacy application decommissioning process?

    -The case study of a large UK banking organization that acquired a competitor and had duplicate systems is an example. Macro4 helped them migrate the previous year's financials into their financial package and decommission the old system, providing enhanced security controls and data management.

  • What are some of the key questions an organization should ask when assessing the security of their legacy applications?

    -Key questions include whether the data is secure in existing applications, the ability to enforce security policies, providing secure access to data in unsupported legacy applications, and the capability to control access levels to sensitive data.

  • How can an organization make a business case for moving data from legacy applications to a secure solution?

    -A business case can be made by identifying the risks associated with legacy applications, demonstrating the benefits of improved data security and compliance, and showing the potential for cost savings and increased efficiency.

  • What is the significance of integrating a SAML capable ID management solution with Columbus for enhanced security?

    -Integrating a SAML capable ID management solution with Columbus allows for the implementation of multi-factor authentication, combining the security strengths of both systems to provide a more robust defense against unauthorized access.

  • Can access to different applications within Columbus be restricted based on user roles or groups?

    -Yes, Columbus can link with existing Active Directory groups, allowing for role-based access control to different applications within the system, mirroring the access controls of the legacy applications being decommissioned.

  • What are the benefits of moving legacy applications into Columbus and then to the cloud?

    -Moving legacy applications into Columbus and then to the cloud centralizes data management, enhances security through modern security practices, reduces reliance on scarce IT skills for maintenance, and helps in retiring applications while reducing business risk.

Outlines

00:00

πŸ”’ Introduction to Legacy Application Security Webinar

The webinar, hosted by Phil Oldfield and Sam Dicks from Macro4, opens with an introduction and housekeeping notes, including the use of the Q&A section and the recording of the session. The speakers outline a series of three webinars focusing on managing data in legacy applications, with the current session dedicated to data security challenges. Key issues discussed include the risks older applications pose due to potential non-compliance with regulations like GDPR, incompatibility with modern security mechanisms such as multi-factor authentication (MFA), and the slow rollout of security patches. The session aims to identify security-risk applications, emphasize the importance of data security, present a financial user case, and provide tips on decommissioning legacy applications.

05:02

🚨 Addressing Legacy Application Security and Data Privacy Concerns

This paragraph delves into the importance of managing data security in legacy applications, highlighting the need for granular security and access controls to protect business-critical information. The discussion includes the necessity of data privacy features to limit exposure to sensitive personal identifiable information (PII) under GDPR. The speakers stress the importance of evaluating the security of existing applications, the ability to enforce security policies, and the challenges of providing secure access to data. They propose consolidating data from multiple applications into a single secure repository to streamline access and decommission old applications, thereby reducing business and security risks.

10:04

πŸ“ˆ Case Study: Decommissioning Legacy Applications in the Financial Sector

The speakers present a case study of a large UK banking organization that used Columbus, a Macro4 solution, to decommission a legacy application following an acquisition. The organization aimed to migrate financial data and decommission the old system due to its lack of security controls and inability to manage sensitive data effectively. Columbus provided the necessary security controls, data redaction based on role-based access, and lifecycle management, integrating with the organization's existing security infrastructure. This successful project led to cost savings and improved data security, prompting the organization to consider decommissioning other legacy applications.

15:04

πŸ›  Strategies for Tackling Legacy Application Challenges

The paragraph outlines strategies for addressing the challenges of legacy applications, starting with identifying static data applications that are prime for decommissioning. It suggests considering data needs, whether to migrate, delete, or archive data, and how it will be accessed and used in the future. The business case for moving data to a secure repository is emphasized, with the goal of achieving granular access levels and regulatory compliance. Macro4's role in helping customers with their legacy application challenges is highlighted, including its experience, technology, and ongoing development roadmap, which provides a long-term data repository solution that can be integrated with cloud migration strategies.

❓ Q&A Session: Decommissioning and Security in the Cloud

The final paragraph covers the Q&A session where participants inquire about decommissioning in the cloud and the integration of multi-factor authentication (MFA) with Columbus. The speakers clarify that moving legacy applications to the cloud does not eliminate inherent security risks but emphasizes that Columbus can provide the necessary data and application security for cloud environments. They also explain how Columbus can integrate with SAML-capable ID management solutions to implement MFA, enhancing overall security. Additionally, they address the ability to restrict access to different applications within Columbus by leveraging existing Active Directory groups, ensuring a seamless transition of access controls.

Mindmap

Keywords

πŸ’‘Webinar

A webinar is an online seminar or workshop that is conducted over the internet. In the context of this video, the webinar is focused on discussing the challenges of managing data in legacy applications, particularly in relation to data security. The script mentions that this is the first of three webinars on this topic, indicating a series designed to educate and inform viewers on best practices and solutions.

πŸ’‘Legacy Applications

Legacy applications refer to older computer programs or systems that are still in use but may lack modern features or compatibility. In the video, legacy applications are a central concern due to their potential security risks, such as being non-compliant with regulations like GDPR or lacking support for modern security mechanisms like multi-factor authentication.

πŸ’‘Data Security

Data security involves protecting stored or transmitted information from unauthorized access, use, disclosure, disruption, modification, or destruction. The video emphasizes the importance of data security, especially in the context of legacy applications, which may not have the necessary safeguards to protect sensitive information.

πŸ’‘Compliance

Compliance in this context means adhering to laws, regulations, standards, or policies. The script specifically mentions GDPR, which is a regulation that requires businesses to protect the personal data and privacy of EU citizens. Legacy applications may not be designed to comply with such regulations, posing a risk to businesses.

πŸ’‘Multi-factor Authentication (MFA)

MFA is a security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction. The video points out that legacy applications may not be compatible with MFA, which is a modern security measure to prevent unauthorized access.

πŸ’‘Decommissioning

Decommissioning refers to the process of retiring or phasing out a system or application from use. The video discusses the decommissioning of legacy applications as a strategy to mitigate security risks, by moving data to a more secure system like Columbus and then safely retiring the old application.

πŸ’‘Business Continuity

Business continuity is the capability of an organization to continue delivering products or services at acceptable predefined levels following a disruptive incident. The script mentions maintaining business continuity while transitioning away from legacy applications, ensuring that access to necessary data is not disrupted.

πŸ’‘Columbus

Columbus, as mentioned in the script, is a solution offered by Macro4 that can help manage the data from legacy applications in a more secure and compliant manner. It is positioned as a modern alternative that can provide the necessary security controls and data management capabilities that legacy applications lack.

πŸ’‘Regulatory Compliance

Regulatory compliance is the adherence to specific laws, regulations, and guidelines set forth by regulatory bodies. The script discusses the importance of regulatory compliance, particularly in relation to data security and the handling of personal identifiable information (PII), which is a key concern under regulations like GDPR.

πŸ’‘Data Retention Policies

Data retention policies are rules or guidelines that specify how long data should be kept and when it should be deleted. The video script raises the question of whether legacy applications can enforce data retention policies required for regulatory compliance, highlighting a potential gap in security and compliance.

πŸ’‘Cloud Migration

Cloud migration refers to the process of moving computing resources, data, or applications from on-premises hardware to a cloud computing provider. The script mentions cloud migration as a potential solution for legacy application issues, but also cautions that simply moving an application to the cloud does not resolve inherent security flaws within the application itself.

Highlights

Introduction to the webinar on managing data in legacy applications, focusing on data security.

The importance of addressing legacy application security due to potential non-compliance with regulations like GDPR.

Challenges of legacy applications including incompatibility with modern security mechanisms such as multi-factor authentication.

The risk of slower security patch deployment for legacy applications due to lower priority.

The necessity of maintaining business continuity while addressing legacy application security.

Differentiating between data security and application security in the context of legacy systems.

A real-world case study of a financial organization in the UK that successfully decommissioned a legacy application.

How Columbus, a software solution, provided enhanced security controls and data management post-decommissioning.

The role of granular security and access controls in protecting sensitive data.

The impact of data privacy features on limiting exposure to personal identifiable information (PII) under GDPR.

Questions to ask when evaluating the security of legacy applications within an IT landscape.

The process of identifying static data in legacy applications as candidates for decommissioning.

Making a business case for moving data to a secure repository while considering future data usage.

Macro 4's role in helping customers with legacy application decommissioning and data security.

The integration of Columbus with SAML capable ID management solutions for multi-factor authentication.

How to restrict access to applications within Columbus using existing Active Directory groups.

Final takeaways emphasizing the identification of legacy applications and the move to secure solutions.

Upcoming webinar on tackling data challenges of legacy applications, focusing on compliance and business risk.

Closing remarks and thanks for participation in the webinar.

Transcripts

play00:00

good afternoon everyone and welcome to

play00:01

our webinar

play00:02

my name is phil oldfield i'm a client

play00:04

services consultant at macro4 hi good

play00:07

afternoon i'm sam dicks i'm also client

play00:09

service consultant here at macro4

play00:11

a couple of housekeeping points for you

play00:14

down the bottom of the screen there's a

play00:15

q a section so if you do want to put

play00:17

some questions into us please use that

play00:19

and just so you know we are recording

play00:20

the session

play00:22

yeah that's right um this is the first

play00:24

of three webinars uh that we have for

play00:26

you

play00:27

all around the challenges of managing

play00:29

data in your legacy applications

play00:32

so the following two webinars uh the

play00:35

first of those is around compliance and

play00:37

business risk and the final webinar of

play00:39

the series is uh increasing business

play00:42

efficiency and that includes saving time

play00:44

and money so look out for those two

play00:47

but today's webinar uh this one you've

play00:48

signed up for today uh is all around

play00:51

data security

play00:52

uh and that's the steps ostensibly the

play00:54

issues associated with having data and

play00:57

information stored in your legacy

play00:59

applications

play01:01

i've got a few key issues for you some

play01:03

of which you may know already

play01:04

but

play01:05

the first of those being that older

play01:07

legacy applications the security of

play01:09

these applications or indeed lack of

play01:13

can be a risk to your business

play01:15

these legacy applications they may not

play01:17

be compliant with regulations such as

play01:20

the gdpr

play01:21

and that in itself provides or causes

play01:24

that security and that business risk

play01:27

that i mentioned just before

play01:30

the legacy applications as well may be

play01:32

incompatible with modern uh security

play01:35

mechanisms and i'm talking about things

play01:36

like mfa or multi-factor authentication

play01:40

there

play01:41

and also

play01:42

finally

play01:43

patches uh to fix security

play01:45

vulnerabilities these may not be

play01:47

available for for your older legacy

play01:50

applications or indeed if they are

play01:52

available then um they may be rolled out

play01:55

um sort of slower because they're seen

play01:57

as a sort of a lower priority

play02:00

so in summary then uh there's lots of

play02:03

reasons why you should look to uh to get

play02:05

rid of those legacy applications

play02:08

but you need to also

play02:10

remember to maintain that business

play02:12

continuity uh by providing access to the

play02:15

data that underpins those applications

play02:18

and that's really where macro four come

play02:20

in

play02:21

absolutely thanks phil so today um we're

play02:24

going to be talking about how to

play02:25

identify those applications that are

play02:27

putting you at security risk those

play02:29

legacy applications

play02:30

uh the importance of data security

play02:32

because data security is separate from

play02:34

application security itself

play02:36

i'll be talking about a finance user

play02:38

case with one of my customers that i've

play02:39

been dealing with for quite a while that

play02:41

we did a successful legacy application

play02:43

decommissioning

play02:45

process with

play02:46

and then we'll be providing some tips

play02:48

around tackling the decommissioning

play02:49

challenge itself

play02:52

that's right um so we're going to kick

play02:54

off today with a quote from somebody you

play02:56

may have heard of called kevin mitnick

play02:59

now kevin is a self-styled and

play03:01

self-titled world's most famous hacker

play03:03

he's written several books on the

play03:05

subject but now uh happy to say he's a

play03:07

computer security consultant

play03:10

anyway kevin says companies spend

play03:12

millions of dollars on firewalls

play03:14

encryption and secure access devices and

play03:17

it's money wasted none of these measures

play03:20

address the weakest link in the security

play03:22

chain

play03:23

and we're saying that that weakest link

play03:25

could be your legacy applications yeah

play03:27

absolutely phil

play03:29

and when we think about the items you've

play03:31

got to consider around that application

play03:34

security there's many items and you may

play03:36

be talking about some of these for

play03:38

example

play03:39

can your legacy applications enforce the

play03:42

data retention policies that are

play03:43

required for regulation compliance think

play03:45

about gdpr yes it's three years ago i

play03:48

think it was three years ago which i

play03:49

don't know where that time has gone

play03:52

but but

play03:53

those legacy applications you've got the

play03:54

security in them and the audit

play03:56

capabilities

play03:57

was probably designed and set up many

play03:59

years before gdpr as well as other

play04:01

compliance so can it meet those those

play04:03

compliant areas

play04:05

in addition can you

play04:07

ensure you know who has accessed the

play04:09

application you know have you got full

play04:11

auditing about who is looking at what

play04:13

who's performing what functions within

play04:14

the application which is uh could be an

play04:17

issue for you

play04:18

and then further is the old security

play04:21

good enough bit of a teaser here no it

play04:23

probably won't be you know can it link

play04:25

into things like active directory for

play04:27

example

play04:28

um can you have granular security i

play04:31

doubt it

play04:33

further um cloud migration we speak with

play04:35

customers all the time and you see this

play04:37

sort of um these topics within the um

play04:40

the periodicals um cloud migrations

play04:44

moving data center

play04:45

into the cloud or moving applications

play04:47

into the cloud

play04:49

at the end of the day if you just move

play04:50

an application the security security

play04:53

issue that is contained within the code

play04:55

all you're doing is moving that to the

play04:57

cloud the security issue still exists so

play04:59

cloud migration won't necessarily fix

play05:02

those older security issues

play05:04

and then lastly if you are on premise

play05:07

what about physical security if somebody

play05:09

actually got access to your server room

play05:11

pulled the disk out of a server

play05:13

is your data that you're storing

play05:15

encrypted at rest

play05:16

probably not that sort of technology

play05:18

wasn't in use those number of years ago

play05:20

when these legs applications were around

play05:22

so some things to think about

play05:25

absolutely thanks sam

play05:26

uh in terms of managing your

play05:28

data security then

play05:30

excuse me

play05:31

uh when looking for sort of more robust

play05:33

solutions for managing uh legacy

play05:36

application data

play05:37

it's important that they provide that

play05:39

granular security and and level of

play05:41

access controls because that provides

play05:44

the high level of

play05:46

high level of protection for that data

play05:48

which could also be uh business

play05:50

information and is usually critical

play05:51

anyway

play05:52

in terms of data privacy features then

play05:54

this is these are the sort of things

play05:56

that you need to be looking at because

play05:58

these help to limit the exposure to

play06:00

sensitive personal identifiable

play06:02

information or pii which is easier to

play06:04

say yeah that's something under gdpr

play06:06

it's not just the organization but it's

play06:08

individuals that can get in in trouble

play06:10

with the um the commission's office yeah

play06:12

if that sort of personal sense of

play06:14

information gets out absolutely

play06:16

uh and i guess to summarize then so

play06:18

without the functionality that we've

play06:20

just been talking about there the

play06:21

security of the data and the systems

play06:23

themselves is compromised

play06:27

so thinking about your it landscape then

play06:29

in terms of the data security there's a

play06:31

number of questions that you need to be

play06:33

asking yourself about your legacy estate

play06:36

uh first of those being is your data

play06:38

secure in your existing applications

play06:40

because as we know an aging system uh it

play06:43

puts the data at risk of security

play06:45

threats um that there are obviously a

play06:47

number of those that that exist

play06:50

um

play06:51

are you struggling to enforce security

play06:53

policies around that data

play06:56

can you provide secure access to your

play06:58

data uh in your unsupported legacy

play07:01

application possibly not

play07:04

and do you want to move

play07:06

the data from those multiple uh

play07:09

applications to a single secure place

play07:11

and decom and therefore be able to

play07:13

decommission that old application i

play07:15

think that's where we're all trying to

play07:16

get to there and that that again is

play07:18

macro four's kind of recommendation

play07:21

uh can you control access levels to that

play07:24

data we've talked about sensitive data

play07:26

is that sensitive data being managed

play07:28

appropriately

play07:30

and if the answer is is no to any of the

play07:32

the questions we we just mentioned there

play07:35

that leaves those applications uh

play07:37

although the applications that we're

play07:39

dealing with leave your organization at

play07:41

risk and

play07:42

potentially you can fall foul of um

play07:45

regulations such as uh the gdpr

play07:49

absolutely

play07:51

so thanks phil there's information

play07:52

around a security which is subtly

play07:54

different from some of the security

play07:56

issues that an application may have

play07:58

and hopefully that's helpful

play08:00

so i'd like to now talk about a case

play08:02

study with one of our

play08:04

customers in the financial world very

play08:06

large organization in the uk

play08:09

banking industry

play08:11

been a long-term user of columbus and

play08:13

we've been helping them maximize the

play08:15

potential of their investment within

play08:16

columbus itself using it in different

play08:18

areas

play08:19

and this particular organization

play08:21

went through an acquisition of one of

play08:23

their competitors and left for them with

play08:25

duplicate systems they had a

play08:27

strategic system already that the our

play08:29

customer had and then the the acquired

play08:32

company also had a similar financial

play08:34

system

play08:35

and it was that that we were

play08:37

concentrating on and the the company

play08:39

were talking about moving all of the

play08:41

data and that was quite a large data

play08:42

migration project and what we said to

play08:44

them was well look it's easier to move

play08:46

just the previous year's financials into

play08:48

your financial package and then we can

play08:50

decommission and they looked at that

play08:52

said okay talk to us more we went

play08:54

through the process with them

play08:56

um

play08:57

and

play08:58

you know

play08:58

eventually we got to a decommissioning

play09:00

project

play09:01

and columbus was able to with the data

play09:03

in columbus it was able to provide the

play09:06

security controls rather if i put my

play09:08

teeth in the security controls that the

play09:10

old acquired app couldn't provide

play09:13

because it was that much older

play09:15

uh in addition

play09:16

we were able to provide management of

play09:18

sensitive data and phil's mentioned with

play09:20

gdpr around personal sensitive

play09:21

information so columbus was able to

play09:23

provide redaction of of personal

play09:25

sensitive data on a role-based access uh

play09:28

information life cycle management

play09:30

and then tying in with the the

play09:33

organization's existing security

play09:35

controls so the groups that already

play09:36

existed were able to map into those and

play09:38

give access to this staff that were

play09:40

already there within the different

play09:42

departments and as i mentioned the

play09:44

redaction was able to tie into that so

play09:46

different people had access to different

play09:48

unredacted data

play09:50

and all in all it was a great success

play09:51

for this organization they're able to

play09:53

save money on the date of migration

play09:55

they were able to provide security

play09:57

controls around the data that they they

play09:59

kept outside of the core application and

play10:01

all in all it led them to be able to

play10:03

look at legs application decommissioning

play10:05

for their own internal applications

play10:08

absolutely excuse me yeah thanks sam

play10:11

it's always good to get a real world

play10:12

example especially with the legacy

play10:14

application decommissioning projects

play10:17

okay so moving on we've talked someone

play10:19

i've talked a little bit about uh some

play10:20

of the challenges associated with

play10:22

managing legacy applications but but how

play10:25

do you tackle those challenges

play10:27

well first off you want to identify

play10:30

applications that uh have um

play10:33

underpinning them static data and that's

play10:35

non-live data because those are the the

play10:38

prime candidates for decommissioning

play10:41

so some of these may be duplicate

play10:43

applications and that is multiple

play10:46

instances of the same application that

play10:48

exist within the business some of those

play10:50

can be uh overlapping applications and

play10:52

that is uh that they provide the same

play10:55

business function um but they are you

play10:57

know different applications like we were

play10:59

just talking about really absolutely uh

play11:02

and that in itself could lead to certain

play11:04

inefficiencies within the the it

play11:06

business

play11:07

and then finally you have any

play11:09

non-essential applications and this is

play11:11

where you're probably looking at keeping

play11:13

the data but you don't necessarily need

play11:15

the application itself

play11:17

okay and once you've done that then so

play11:19

consider the data and this is the data

play11:21

that underpins those applications if you

play11:23

remember so does that data

play11:26

you know does it need to be migrated

play11:28

could uh that data just be deleted you

play11:30

know is it needed any longer um and also

play11:33

um you know if it is needed then then

play11:36

does it need to be archived

play11:39

that data uh how is it currently uh

play11:42

accessed by the business uh and indeed

play11:44

other applications within the business

play11:47

and also how is it going to be used

play11:49

going forwards

play11:50

by the business

play11:52

so once you've done that make the

play11:54

business case to move that data to a

play11:56

secure repository

play11:58

and that will hopefully well your secure

play12:00

repository your new target repository

play12:02

will be able to impose that sort of

play12:05

granular level access levels to the data

play12:09

but also and this is an important one

play12:11

business users uh can access that data

play12:13

but in a format that makes sense to them

play12:15

i think

play12:16

you know there's no good giving some end

play12:17

users um sql queries to run if they

play12:20

don't understand

play12:21

you know how to do that absolutely you

play12:23

know it's got to be appropriate to the

play12:24

business user themself

play12:26

um make sure that uh you'll be able to

play12:28

make sure that data conforms to those um

play12:32

regulations those regulatory compliance

play12:35

including as we keep mentioning the gdpr

play12:38

but also then uh

play12:40

this will allow you not to be reliant on

play12:43

those scarce i.t skills to support and

play12:46

maintain those legacy applications and

play12:48

that's always um

play12:49

gives it departments a certain headache

play12:51

but all of that all in all should allow

play12:54

you to understand the costs associated

play12:56

with them with your it landscape a lot

play12:59

better yeah

play13:00

okay absolutely

play13:02

so how can we help then we've talked

play13:04

about

play13:05

our use case that's fair enough with one

play13:06

of the customers we've given you some

play13:08

guidance around data security

play13:10

application security building a business

play13:12

case well how can we at macro 4 help

play13:14

especially if you're an existing

play13:16

customer with columbus well first of all

play13:18

we have a great deal of experience

play13:20

plus our columns technology means we can

play13:22

help

play13:24

the columbus solution design

play13:26

in addition to tackling the challenges

play13:28

you've got

play13:29

plus our ongoing development roadmap

play13:32

means you've got a safe long-term

play13:33

repository for your data

play13:36

and our solution includes processes that

play13:38

we've developed over many years with

play13:39

different platforms that we're

play13:40

decommissioning from different

play13:42

applications you name it we can pretty

play13:44

much

play13:45

do that for you know we can help you

play13:46

decommission

play13:48

plus uh phil mentioned this a few

play13:50

moments ago getting those multiple

play13:52

applications into one secure place it's

play13:55

very important and we'll be talking more

play13:57

about that in the last webinar about

play13:59

efficiencies for business processes of

play14:01

being able to access data in one place

play14:03

this is more than one reason for that

play14:06

and then a key point really you've got

play14:09

to make sure that that data is

play14:11

accessible to support the business

play14:12

process there's no point as phil says

play14:14

running an sql query when you're going

play14:17

the user is going to come the customer's

play14:18

going to come in it's mr smith here can

play14:20

i have um access to my document well

play14:23

you know why am i running an sql query

play14:25

for that if it's indeed if the data's

play14:27

indexed against the business use it

play14:30

helps

play14:32

in addition we can ensure your security

play14:34

levels are met we can meet the data

play14:36

compliance and as well as

play14:38

doing that reducing business risk it's

play14:41

all about business risk

play14:43

cloud migration

play14:45

you can take multiple applications put

play14:47

them into columbus move columbus into

play14:49

the cloud you're reducing the amount of

play14:52

risk that you're taking forward for each

play14:53

one of those applications into the cloud

play14:55

and all in all we can help you retire

play14:57

those applications or indeed just an

play14:59

application

play15:00

reducing your risk and saving you money

play15:03

absolutely

play15:05

right we've got to the stage now where

play15:06

we're going to dive into some of the

play15:08

questions it's the q a

play15:10

section um so

play15:12

let's just have a look if you just mind

play15:14

me for a minute i'm just having a look

play15:16

uh here it does look like we've had a

play15:18

couple of questions come in so i'm going

play15:20

to dive straight in so first question

play15:22

here is from shan he says you mentioned

play15:26

about decommissioning in the cloud could

play15:28

you expand further on that well sam

play15:30

you've just been talking about that

play15:31

literally just now so i'm going to throw

play15:33

that over the fence to you okay yes shan

play15:35

so thanks for your question um

play15:37

hopefully

play15:38

i've just answered that but i'll go back

play15:40

to my point um

play15:42

i made earlier in the presentation which

play15:44

is

play15:45

just think about the security issues

play15:47

that exist within those those static

play15:49

application or applications

play15:51

those issues those those business and

play15:53

security risks are going to move forward

play15:55

into the cloud themselves you know it's

play15:56

not gonna

play15:59

you're not removing that security risk

play16:02

by putting that data into columbus

play16:04

then columbus provides you with the data

play16:06

security and application security you

play16:08

need and that's taken forward into the

play16:11

cloud so hopefully that's answered your

play16:12

question

play16:14

um

play16:15

whilst i've got the microphone so to

play16:16

speak uh alan thanks for your question

play16:18

alan thanks for joining us um

play16:21

we're looking at mfa solutions so phil

play16:23

you mentioned mfa earlier i'm glad we

play16:24

said that earlier so multi-factor

play16:25

authentication solutions

play16:27

um how could we use this with columbus

play16:29

well phil you mentioned it can you

play16:31

answer that yes sure thanks sam uh yeah

play16:34

so uh basically columbus can be

play16:36

integrated with a saml capable id

play16:38

management solution

play16:40

and what that does is that combines the

play16:43

security strengths of of the columbus

play16:45

software of columbus

play16:47

with

play16:48

the id management solution itself and

play16:50

it's the id management solution that

play16:52

provides the multi-factor authentication

play16:55

and then obviously as just mentioned you

play16:57

combine that with the security elements

play16:59

of the columbus our columbus technology

play17:02

uh and i hope that sort of answers that

play17:04

part of the question for you

play17:06

okay um there is another one more

play17:09

thankfully he's just been typing now we

play17:10

can see that coming off whilst we're

play17:12

talking thank you yeah so luis says uh

play17:14

if we have multiple applications in

play17:16

columbus can we restrict access to who

play17:19

has access to each application i think i

play17:22

know the answer to that one sam but i'm

play17:23

going to and this one to you

play17:25

question hot potato isn't it um

play17:28

so luis again great question thank you

play17:30

we mentioned active directory earlier or

play17:32

linking in with with organizations

play17:34

existing security in this case in our

play17:36

experience in the uk active directory is

play17:38

the prime one um if you've got active

play17:41

directory group set up for the existing

play17:42

application that you want to

play17:44

decommission well columbus can link into

play17:46

those existing active direct groups and

play17:48

give you the same access within the or

play17:50

within the data that you had before so

play17:53

yeah it's pretty much mirrored mirrored

play17:55

there so yeah hopefully that answers

play17:56

your question i'm just checking there's

play17:58

no more questions that we've seen

play18:00

coming in so

play18:01

let's carry on phil

play18:03

okay so yeah we are kind of getting to

play18:05

the the

play18:06

latter stages of the uh the webinar for

play18:08

you but i have got a number of takeaways

play18:10

that i'd like you to well take away with

play18:12

you i suppose

play18:13

so the first of those being that

play18:16

what you want to be doing if you're

play18:17

looking at decommissioning applications

play18:18

is identify those

play18:21

legacy applications that don't meet your

play18:24

current security requirements

play18:26

that's the all-important one

play18:28

and then consider how the business is

play18:30

using that data but also importantly how

play18:33

they want to use that data going forward

play18:35

in the future

play18:37

and once you've done that make the

play18:39

business case to move that data to a

play18:42

secure solution where you can benefit

play18:43

from all the technologies that we've

play18:45

we've covered here

play18:47

and if you're migrating to the cloud

play18:50

don't move all of those static legacy

play18:52

applications migrate them into columbus

play18:55

and run columbus within your cloud

play18:58

instead

play18:59

absolutely

play19:00

well thanks phil for wrapping that up

play19:01

for us um watch out for information on

play19:04

our second um webinar in the series of

play19:07

three

play19:08

where we're looking at tackling the data

play19:10

challenges of legacy applications and

play19:12

that's going to be around compliance and

play19:13

business risk and that's going to be in

play19:14

february

play19:15

uh it leaves me to say thank you very

play19:17

much for your attendance and your

play19:18

questions your participation

play19:20

have a good rest of the day and

play19:23

it's goodbye from me

play19:24

and it's goodbye from him thank you

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
Data SecurityLegacy AppsWebinarDecommissioningComplianceGDPRMulti-factor AuthCloud MigrationIT RiskData ManagementSecurity Best Practices