Please Note: The TDSi Offices will be closed for Christmas from 14:00 on Tuesday 24th December, reopening in the New Year on Thursday 2nd January 2025.

  • Home
  • >
  • News
  • >
  • How to Ensure Legacy Systems Don’t Become a Curse?

22/08/2019

How to Ensure Legacy Systems Don’t Become a Curse?

Author: Francesca Meyrick

How to Ensure Legacy Systems Don’t Become a Curse?

When you use the word ‘legacy’ it can conjure up all sorts of images – from something important and positive being passed down generations (such as a business or tradition) to a more negative idea of bad practice continuing through habitual use. Overall, the word ‘legacy’ is neutral – it depends on the circumstances and subject involved for a good or bad outcome.

Much the same is true in the security sector. We often refer to ‘Legacy Systems’ and simply mean components that have been passed on from previous security operators or networks or components in the system that is based on older or non-current technology – whether they are good or bad is highly subjective. However, these legacy elements do require careful consideration when it comes to ensuring security systems are totally fit for purpose.

Inherited Equipment

The electronic security industry is not a new one anymore – access control companies like TDSi have been around since the early 1980s (we started in 1982 and many others were established during the 1980s and 1990s as technology advanced rapidly).

In more recent years the security industry has gone from an analogue world to a digital one, which has brought many advantages in terms of usability and reliability. The analogue world did have some advantages though, for example, it was full of closed protocols and was very easy to secure and difficult to crack.

Integrated systems and the advent of IP solutions over a decade ago, have allowed more and more integration, which is, of course, a good thing. It allows us to generate more data and use data mining to look at the relationship between data sets – which hitherto we were unable to realistically analyse in granular detail before.

This integration includes many pre-integration systems and there are a lot of legacy systems out there that are now being brought into the IP world. For example, this is often the case with specialised detection systems or those in places that are difficult to access for upgrades (such as a nuclear plant or dangerous chemicals facility for example).

Ensuring Parity

When systems or installations are being upgraded and improved, it’s very important for IP security to be considered in detail. This means understanding any inherent vulnerabilities from all the components, but especially the legacy systems. This is further complicated when they are installed at several sites and networked through a centralised security system.

Often this knowledge is not in the domain of the end-user, despite using these older systems for some time. However, it should be within the domain of the security installers and maintainers. Unfortunately, with technology development moving so quickly, some installers may simply not be 100% up to speed with the latest threats or their potential impact on older technology.

Expert Overview

When it comes to including and (just as vitally) securing legacy systems within a modern mix of technology, it is vital there is a proper understanding of the wider picture. There is a big role here for consultants to play in evaluating legacy systems, providing advice to end-users and maintainers on what needs to be done to bring these elements into a modern, cyber-secure world.

There are many ways to ensure the security of legacy systems, it could be adding specific firewall-type barriers between them and core security data systems, and it may involve storing their data at the edge of the network and securely collecting it separately. This can compromise some of the integration benefits and cause potential issues, but the security of the whole network needs to take precedence over the benefits of individual legacy components.

Combining Old & New

The inclusion of legacy systems can bring considerable benefits for security operators. They give flexibility to the installation design and they often bring benefits in the case of specialist components. Inevitably there is also often a considerable cost benefit involved with re-using older equipment and environmental advantages to recycling components.

The main issue is that many of these systems were produced without the knowledge of modern highly connected networks and simply don’t have the inbuilt protection we have come to expect today.

This certainly doesn’t mean legacy equipment must automatically be consigned to the scrapheap, but it does mean careful consideration is needed to ensure it provides a true positive legacy rather than a potentially dangerous one.

Other News

TDSi will be Accompanied by Vitaprotech Group Sister Companies at Intersec 2025 in Dubai

04/12/2024

TDSi will be Accompanied by Vitaprotech Group Sister Companies at Intersec 2025 in Dubai

TDSi are pleased to announce they will be joining forces with fellow Vitaprotech Group companies Harper Chalice, PRYSM, and Hirsch for its forthcoming appearance at…

Read more
John Davies – Thank you from all at TDSi

28/11/2024

John Davies – Thank you from all at TDSi

As many in the industry may already be aware, TDSi Managing Director John Davies has announced that he will retire from his role at TDSi…

Read more
GARDiS Installer Training Courses Now Available in Coventry

08/11/2024

GARDiS Installer Training Courses Now Available in Coventry

TDSi are now delivering FREE Installer Training at fellow Vitaprotech Group company Harper Chalice’s newly refurbished Security Hub and Training Facility in Coventry. This new…

Read more

Newsletter