Skip to content

6 Hidden Costs of Sticking with On-Prem Infrastructure

For most IT managers, making purchase decisions is a delicate balancing act that requires careful consideration. 

Project managers often find themselves grappling with several questions before pulling the trigger: Is this the best solution for us right now and long term? What is thetotal cost of ownership (TCO)? And how can we best project its return on investment (ROI)? 

Of course, everyone wants to get the best value for their money. Such considerations become even more relevant when you realize IT purchases often come with hidden costs. 

This post will examine six expenses hidden “under the hood” of IT products and services. We’ll also explore factors worth considering to avoid buyer’s remorse.

JumpCloud

Reduce Your Organization’s IT Sprawl

Exchange disparate point solutions for a full-scale IT management platform to unify your environment.

Factors That Influence IT Total Cost of Ownership

TCO is a metric that analyzes the financial impact of a purchase decision. It identifies all of the costs associated with owning and using a product or service over its lifetime. 

TCO includes direct and indirect costs, such as acquisition, installation, operation, support, and disposal costs. TCO analysis is instrumental when evaluating high-value systems with a long lifespan and ongoing costs, such as security systems or workspace collaboration tools.

In recent times, IT managers have needed to calculate the TCO of running on-site systems versus that of cloud-based ones. As evidenced by a Microsoft Insight, they’ve often found that cloud-based infrastructure is less expensive than their on-premise counterparts.

Let’s examine the six elements that contribute to both model’s TCO:

1. Infrastructure Equipment

Large server room illuminated by overhead lights

Operating an on-prem infrastructure often means incurring higher costs compared to cloud-based solutions. The expenses associated with acquiring and maintaining servers, storage devices, and networking equipment can be substantial. 

Not only do these costs include initial investments, but they also involve ongoing expenses for maintenance, even if some equipment remains underutilized.

For instance, Company X may choose to operate an on-prem infrastructure, sparing no expense in acquiring the required equipment. For some time, its data needs would be less than its data capacity. Yet, Company X would continue to expend costs for maintaining both the functioning and non-functioning servers.

Not to mention that when the organization’s data needs eventually exceed its capacity, it will need to invest in acquiring more servers and integrating them with the existing system.

Cloud alternatives offer a more economical option as organizations only pay for what they use. They also don’t need to worry about acquiring and maintaining expensive hardware other than networking equipment.

Better still, cloud-based solutions are more scalable than on-premise options, making them cost-effective and more flexible than on-premise solutions.
While some IT admins often cite security concerns over cloud-based solutions, a Gartner study indicated that at least 60% fewer security issues will occur in public cloud service workloads than in traditional data centers.

2. Data Center/Hosting Costs

Person with overlapping gears

Data collected and used by organizations has to be stored somewhere. On-prem solutions demand physical space, either on-site or in leased commercial data centers. Scaling the on-premise infrastructure to accommodate business growth can lead to further costs, as additional hardware and resources need to be purchased and integrated. 

For instance, if Company X chooses to operate an on-prem infrastructure, it would need to expend resources to get floor space either on-site or in leased areas in a commercial data center.

There are also ongoing expenses related to power consumption and regular maintenance. Throw in more variable costs of physical security, HVAC systems, and backup solutions, and you can see how the organization pays significantly more than the sticker price long term.

3. Software and Tooling

Organizations often rely on a variety of software solutions to address different needs within their IT infrastructure. However, managing a diverse set of individual software applications can lead to significant cost implications.

In an on-prem environment, each software tool typically requires separate licensing, maintenance, and support costs. As the number of individual software solutions grows, so does the cumulative cost of ownership. 

Additionally, integrating and managing these disparate tools can become complex and time-consuming, requiring skilled IT staff and potentially leading to higher labor costs.

For example, Company X, running on-prem infrastructure, may invest in mobile device management (MDM), single sign-on (SSO), file sharing, and password management software individually. In contrast, Company Y may invest in a cloud operator integrating some of these technologies into its offerings.

In the long run, Company Y is likely to enjoy more services than Company X while benefiting from the integrated ecosystem that the cloud vendor offers from a single dashboard, and with fewer costs too.

4. Employee Devices

Employee sitting at desk with a computer

Whether operating cloud infrastructure or an on-premise one, employees need to use company-provided or employee-owned devices.

From smartphones to laptops and everything in between, employee-owned devices, or bring your own devices (BYOD), have become ubiquitous in the modern workplace.

While this trend has led to increased flexibility and reduced costs as organizations spend less on acquiring work devices, it can increase costs in other areas.

For example, if employees use their own devices for work purposes, the organization may need to purchase additional licenses for some software applications.

Furthermore, devices of different platforms like Android, iOS, etc., need to be configured to work with the organization’s network and security settings, which can add to increased MDM costs.

Fortunately, there are many ways to reduce the TCO of employee devices. One is to select the right mix of devices for your workforce carefully.

Another is to invest in cloud-vendor solutions like JumpCloud that provide mobile device management (MDM) and security solutions that streamline support and security operations.

As an example, consider two IT companies, ABC and XYZ:

ABC operates a BYOD policy and utilizes the services of a cloud operator that offers security and MDM capabilities across different device platforms. On the other hand, XYZ provides employees with company devices and operates on-site infrastructure while acquiring disparate security and MDM solutions.

Company ABC is likely to operate well on a lower budget than Company XYZ, which spends more on different cost headings.

5. Support, Labor, and Personnel

On-premise IT equipment is not particularly plug, play, and forget. They require constant monitoring and maintenance that is distinct from their day-to-day use. Hence, organizations need to hire new staff or train existing personnel to support their systems and keep them in good shape.

Ultimately, this increases the TCO of the system as organizations need to pay more salaries and training fees. The time spent in maintaining this infrastructure also amounts to cost as the IT staff could have put the time to other purposes.

By contrast, cloud-based infrastructures don’t require extensive maintenance, and they often include support services as part of their package.

Computers connected through a cloud-based infrastructure

6. Data Onboarding and Migration

Data onboarding and migration from on-premise infrastructure to a cloud-based platform can be disruptive to business operations. This is due to systems being taken temporarily offline for the transfer to take place. The longer the migration process takes, the more costly the downtime becomes. 

Data validation and quality assurance efforts during the migration can require additional resources, such as specialized tools, adding to the overall migration costs.

However, cloud-based solutions are often more reliable in the long term. They also offer better uptime than on-premise infrastructure.

The increased uptime is because these solutions are not reliant on a single point of failure. In other words, if one component of the system goes down, the others can pick up the slack.

This redundancy ensures that businesses can remain operational even in an unforeseen outage. Moreover, cloud providers often have experts dedicated to guaranteeing that their systems are always up and running.

Hence, the minor hiccups encountered during migration to a cloud platform would amount to a lower TCO and a small price to avoid the costly downtime attendant with on-prem infrastructure.

Overcome Sunken Costs by Embracing the Future

It’s understandable to feel hesitant about leaving behind on-prem equipment, especially when you have already invested substantial resources into building and maintaining it. 

However, clinging to outdated infrastructure solely due to past investments may lead to even greater challenges and expenses in the long run. As on-premi equipment ages over time, it becomes more susceptible to maintenance issues, inefficiencies, and reduced performance. 

The cost of maintaining aging infrastructure can quickly escalate, eroding any perceived benefits of sticking with familiar but obsolete systems.

While the transition to the cloud may seem daunting, it’s  a strategic move that will ultimately drive down costs and improve efficiency. Waiting too long to make this shift can exacerbate the challenges posed by aging on-premise equipment. 

Reduce IT Costs with Tool Consolidation 

If you’re still operating on-premise, it’s time to embrace the future and migrate to the cloud while consolidating your IT tools. Understand your total cost of ownership (TCO) better, reduce IT expenses, and embrace the future of IT with JumpCloud.

JumpCloud provides you with access to a comprehensive IT platform, enabling you to centrally manage and secure identities, devices, and the resources your people access every day. With JumpCloud’s tool consolidation capabilities, bid farewell to redundant systems and welcome a streamlined, cost-effective cloud-based solution.

Explore JumpCloud’s array of features at your own pace, from user identity management to device control and resource access. Each step of your tool consolidation journey will lead you to enhanced efficiencies and reduced costs.

Ready to experience the benefits firsthand? Sign up today to start your free trial of the JumpCloud Directory Platform.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About JumpCloud
At JumpCloud, our mission is to build a world-class cloud directory. Not just the evolution of Active Directory to the cloud, but a reinvention of how modern IT teams get work done. The JumpCloud Directory Platform is a directory for your users, their IT resources, your fleet of devices, and the secure connections between them with full control, security, and visibility.

Scale Computing’s Jeff Ready, Scott Mann Recognized on CRN’s 2023 Top 100 Executives List

INDIANAPOLIS – July 31, 2023 – Scale Computing, the market leader in edge computing, virtualization, and hyperconverged solutions, today announced that CRN®, a brand of The Channel Company, has named Jeff Ready, CEO and co-founder, and Scott Mann, global channel chief, to its exclusive 2023 Top 100 Executives list.

CRN’s Top 100 Executives list acknowledges the tech visionaries who are setting the pace for the rest of the IT industry. The list honors executives impacting the IT channel across four subcategories: the 25 Most Influential Executives, Top 25 Channel Sales Leaders, Top 25 Innovators, and Top 25 Disruptors. Ready was named to the Top 25 Innovators subcategory, while Mann was named to the Top 25 Channel Sales Leaders subcategory.

Despite the past year’s challenging global economic environment, Ready led Scale Computing to increased sales and profitability, driven by its edge computing software platform, original equipment manufacturer (OEM) and channel partnerships, and the launch of SC//Fleet Manager with Zero-Touch Provisioning and Secure Link, the first cloud-hosted monitoring and management tool built for hyperconverged edge computing infrastructure at scale. Over the past year, Mann led the global channel team and continuously worked to improve the Scale Computing MSP program, while increasing revenue and average selling price (ASP) per partner.

“Innovation infiltrates everything we do at Scale Computing, from our highly reliable, scalable, and easy-to-manage solutions to our partner and customer relationships. We constantly seek to leverage that innovation to solve customer problems,” said Ready. “Scale Computing continues to be a leader in the emerging edge computing space and we’re very proud of the innovations we’ve made in the technology, products, and partnerships that help us work with enterprises of all sizes, all around the world, today.”

The annual Top 100 Executives list honors the passionate and hard-working technology executives who are supporting, growing, and redefining the IT channel. The executives named to the list have demonstrated their commitment to the channel and proved themselves as exemplary leaders through their innovative channel-focused strategies and initiatives.

“We’ve had tremendous success in the Scale Computing Partner Community over the past year with SC//Fleet Manager and it’s exciting to see how our end customers find more value and success with both our technology and their valued advisors in the channel partner community. I’m thrilled to be named on CRN’s 2023 Top 100 Executives list and look forward to continuing to lead and grow Scale Computing’s channel efforts worldwide,” said Mann.

“It is the bold and decisive who continue to dominate our annual list in the technology world.” said Blaine Raddon, CEO of The Channel Company. “Those featured on our CRN 2023 Top 100 Executives list demonstrate perpetual commitment to business growth, partner success, and IT innovation and aren’t afraid to push boundaries – even in a time of economic uncertainty.”

The Top 100 Executives list will be featured in the August 2023 issue of CRN Magazine and online at www.CRN.com/Top100. For more information on Scale Computing’s Partner Community, please visit https://www.scalecomputing.com/partners.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

Introduction to Docker: Revolutionary technology for intrepid developers

Put on your seatbelts, intrepid developers! In this era of technology trends and digital-first strategies, organizations are jumping on board the microservices train with Docker containers.

What is Docker? 

Well, it’s like a magic box that wraps your app with everything it needs to actually work, like a file system, tools, and even a roadmap to reach multiple platforms.

It’s like your software has its own travel-ready backpack!

Microservices: the new superhero team of programming

Today, developers are using Docker to build microservices, which are like the Avengers of the software world.

These microservices are small pieces of code that work together to perform specific tasks. For example, imagine a pizza chain that uses microservices to take orders, process payments, and coordinate deliveries across the country. It’s like having a league of pizza-efficient superheroes working together!

The star role of docker engine and his gang

When we talk about Docker, we can’t help but mention Docker Engine, the leader of this container gang.

Docker Engine is responsible for building and running the containers. But before you can do that, you need a Docker file.

Think of it as the script of a movie that defines everything necessary for the image of the container to come to life. Once you have the Docker File, you may build the container image, which is like the main actor running in the Docker engine.

Docker Compose and Docker Swarm: The adventure companions of Docker

The fun doesn’t end there!

Docker offers more adventure companions, such as Docker Compose and Docker Swarm. Docker Compose allows you to define and run applications in containers, like the movie director who coordinates all the scenes.

And then there is Docker Swarm, which converts a group of Docker servers into one, as if merging the Power Rangers to form a megazord. It’s every director’s dream to have a united team ready for action!

Docker Hub feast and Open Container Initiative (OCI) party

But wait, we’re not going to stop our analogies, there’s even more! Docker Hub is like a developer food buffet, filled with containerized microservices ready to be devoured.

Do you need a web server? A database? You’ll find a bit of everything here!

It’s like a party where all the main services are invited. In addition, Docker has created the Open Container Initiative to ensure that the packaging format is universal and open. It’s like ensuring that all guests follow the rules of etiquette.

AWS ECS: Amazon’s Container Management Service to the rescue!

If you are playing in the world of Amazon Web Services, you have at your disposal Amazon EC2 Container Service (ECS), which is a highly scalable and safe container management service.

With ECS, you can easily deploy and manage your microservices in Docker containers in the Amazon cloud. Imagine having a team of assistants take care of all the infrastructure and logistics, while you focus on developing and deploying your containerized applications.

Dare to build your own microservices architecture with Docker!

Now that you know the basics of Docker, microservices, and associated tools, it’s time to venture out and build your own microservices architecture with Docker.

Remember that microservices allow you to split your application into separate components, making it easy to scale and maintain.

With Docker, you can package and deploy each microservice in a container, taking full advantage of the flexibility and portability this technology offers.

Get ready for a new way to develop apps!

Docker and microservices are revolutionizing the way we develop and deploy applications.

With their modular approach, scalability, and portability, this combination has become a popular choice for many organizations.

Whether you’re building a complex enterprise application or a simple web application, consider adopting a microservices architecture with Docker to take advantage of the benefits it offers.

It’s time to take the leap and discover the exciting world of containerized applications!

Once you have built your microservices architecture with Docker, new possibilities will open up for your application development.

Here are some additional ideas for you to consider:

  • Container orchestration: In addition to Docker, there are tools like Kubernetes and Docker Swarm that allow you to efficiently orchestrate and manage your containers in production.
    These tools will help you scale your services, distribute the workload, and make sure your apps are always available.
  • Continuous Implementation (CI) and Continuous Delivery (CD): With Docker, you can easily integrate your microservices into a CI/CD workflow.
    This means you can automate the process of building, testing, and deploying your containers, streamlining the development lifecycle and allowing you to launch new features faster.
  • Monitoring and logging: As your applications grow in complexity and scale, it’s critical to have monitoring and logging tools in place to maintain good performance and troubleshoot issues.
    Tools like Prometheus, Grafana, and ELK Stack are very popular in the Docker ecosystem and will help you monitor and analyze the performance of your containers and microservices.
  • Security: When using Docker containers, it is important to keep security best practices in mind.
    Make sure to apply patches and updates regularly, use reliable and secure images, and consider using vulnerability scanning tools to identify potential issues in your container images.

Conclusions

Docker and microservices are ever-evolving technologies, and there’s always more to discover. Keep learning about new tools and approaches, participate in communities and conferences, and stay on top of the latest trends. The world of containers and microservices is full of exciting and challenging opportunities!

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Azure Active Directory renamed Microsoft Entra ID

What this Azure AD name change means and 6 reasons for backup

In the ever-evolving landscape of technology, we often witness transformations that impact the apps and services we rely on daily. One such transformation is happening today: Microsoft has just announced that Azure Active Directory (Azure AD) is now named Microsoft Entra ID.

While the name may be different, there are no changes to the actual product; Entra ID continues to be Microsoft’s identity and access management service that enables your employees access to external resources, such as Microsoft 365, the Azure portal, and thousands of other SaaS applications. The essence and value that Entra ID provides remains unchanged. Regardless of the name, it still needs to be backed up. 

With the introduction of cloud computing, the edge of a network no longer exists, and the latest hacking techniques rely on compromising identity first. As a prime target for hackers, Azure AD — now Entra ID — sees 50 million password attacks per day, which amounted to attacks on almost 10% of the 550 million Entra ID users in 2022. According to Microsoft’s VP of Identity Security, Alex Weinert, Entra ID accounts are also 50 times more likely to be compromised than consumer Microsoft accounts.

What is Entra ID? And what’s the relationship between Entra ID and Microsoft 365?

Microsoft 365 uses Entra ID to manage user identities behind the scenes. Simply put, Entra ID is the brain to the Microsoft 365 body. It’s the control plane that allows access, gives orders, and makes sure Microsoft 365 runs well via policies and configurations.

Loss of access to Entra ID can result from a variety of mishaps, such as bad actors hacking your Entra ID and locking you out or an authorized user deleting a policy or admin accounts. If users can’t access their identities because their identities can’t get authorized in Entra ID, they’re not able to use their Microsoft 365 applications. If users can’t access anything, they can’t work, which grinds operations to a halt while the issue is addressed.

Do I need to back up Entra ID?

According to Microsoft, protecting identity systems such as Entra ID is the number one priority for any business — more important than protecting human life — as it ensures you and your users can maintain access to critical applications and systems.

Whether you’re an admin at a major company or launching a startup, protecting user identities is crucial to ensure business continuity. If anything messes up your Entra ID tenant configurations, you could lose access to important data and apps instantly.
Whether you’re an admin at a major company or launching a startup, protecting user identities is crucial to ensure business continuity. If anything messes up your Entra ID tenant configurations, you could lose access to important data and apps instantly.

What are the potential impacts of losing access to Entra ID

Recently, a company got locked out of all their Microsoft services due to faulty conditional access policies in Entra ID (formerly Azure AD). As a result, the admins were unable to log in to Microsoft and the unavailability of Microsoft portals prevented the company from registering a support ticket to report and resolve the issue. One can only imagine how long it took to resolve and get back to normal operation.

Here’s another example of the importance of Entra ID: A Carlsbad company suffered losses of more than $500,000, endured three full days of downtime, and invested six months in rebuilding after a disgruntled former employee deleted more than 1200 of the company’s Microsoft 365 user accounts.

In April 2023, Microsoft detected attacks on hybrid AD environments too. In this example, a “nation-state attacker” entered a network, compromised on-prem AD, used that access to pivot to and compromise Azure AD (now Entra ID), and then deleted all of the target’s Azure resources. Currently, the threat primarily originates from nation states, but in the future, it could shift to criminal organizations and eventually to low-end script kiddies.

That’s why it’s important to have a backup plan ready just in case things go haywire.

What can and can’t be recovered in the Entra ID recycle bin?

When we talk about the native recovery in Entra ID, it’s important to note that not all objects go through the Entra ID recycle bin when they are deleted.

Some objects are “soft deleted” and get put into the recycle bin. They include:

  • Microsoft 365 groups
  • App registrations
  • User and guest accounts

Here’s something important to know: When these cloud objects are soft deleted, they stay in the recycle bin for 30 days, but after that, they are ‘hard deleted” and vanish forever as they are permanently and irreversibly deleted. No chance of getting them back.

For all the other objects, they undergo immediate ‘hard deletion,’ indicating that they bypass the recycle bin and can’t be recovered natively. Microsoft shares that “hard-deleted items must be re-created and reconfigured. It is best to avoid unwanted hard deletions.” In other words, to maintain efficiency and business continuity, it’s advisable to steer clear of any unintended hard deletions if you don’t have a backup. Immediately hard-deleted objects include:

  • Distribution groups
  • Enterprise applications / Service principals
  • Intune device policies
  • Conditional access policies
  • BitLocker recovery keys
  • Security groups

Keep in mind that many Entra ID objects have intricate setups or unique connections with other systems, and unfortunately, the recycle bin doesn’t capture all those details. This means if you accidentally delete or alter those objects, there’s no way to recover them.

Oh, and don’t forget, the recycle bin is only for deleted objects — it can’t bring back an object to its previous state if you’ve made changes to it. Yikes. That means any change overwrites the object.

What are the risks of not backing up Entra ID?

While it’s open to debate whether backing up Entra ID is universally applicable to every organization and situation, it’s a wise approach for most enterprises. We’ve collected a couple of compelling reasons why backing up Entra ID can benefit your organization:

1. Loss of security / configuration policies
Entra ID allows administrators to define and enforce various configurations, policies, and access controls. Not having a backup means the loss of these settings, which can result in inconsistencies, misconfigurations, and unauthorized access. It takes significant time and effort to recreate and reapply these configurations manually, leaving the environment exposed to potential security risks.

With a backup of Entra ID, organizations have more control over the restoration process as they can easily recover permanently deleted cloud objects like device configurations, security policies, and access controls in a fast and efficient way.

2. Limited recovery options
Entra ID provides native features for data recovery, such as recycle bin and soft delete options. However, these options have limitations, such as time-bound retention and the inability to restore specific attributes or configurations.

A proper backup of Entra ID ensures more comprehensive recovery options and greater control over the restoration process.

3. Failure to meet compliance requirements
Organizations are often subject to various regulatory requirements, such as GDPR or industry-specific regulations. Failure to have a backup of Entra ID can lead to non-compliance with data protection and privacy regulations, resulting in potential legal issues, financial penalties, and reputational damage.

A backup of Entra ID ensures continuous chain of custody and provenance of security policies. This allows organizations to prove to regulators exactly which policies were in place at any time and document changes and deviations, if any.

4. Data loss
Entra ID stores security policies, application settings, and other cloud-only configurations. If this data is lost due to accidental deletion, malicious activity, or system failure, it can lead to severe consequences, including user access issues, operational disruptions, and compliance violations.

If you have a backup before the incident, you can use it to easily recover your lost data and bring it back into your Entra ID environment right away.

5. User productivity impact
Without a backup, recovering security and device policies can be a difficult and time-consuming task. This process may restrict activity or even prevent users from logging in to apps.

Restoring security policies and configurations manually can result in significant downtime and decreased productivity for users who are unable to access the resources they need.

6. Microsoft system outages
If Entra ID experiences a prolonged outage or catastrophic failure, organizations without a backup will have limited options for recovery, leading to extended periods of system unavailability and business disruption.

No backup can prevent Microsoft from having a system outage: That’s simply a risk all organizations face. However, if you have a backup, you can use it to recover your data once the service outage is resolved.

Evaluate your need for Entra ID backup

If you’re uncertain about the need to back up Entra ID for your organization, a helpful approach is to consider the potential risks associated with Entra ID data loss. Evaluate your comfort level with the level of risk involved to determine the best course of action.

We’ve created an Entra ID risk assessment sheet to help you gauge your exposure and risk tolerance. Use the assessment to determine your Entra ID backup requirements and the need for backup.

Download and create your own Entra ID security risk assessment here.

Ready to learn more about the Keepit solution? Request a callback from a member of the Keepit team. 

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

Operating system updates are critical to security, see how ESET products are impacted by End of life for Windows 10

In case you missed Microsoft’s announcement, January 10, 2023, was a solemn occasion. The software giant communicated that another of its ubiquitous operating systems (OS), Windows 10, was entering its product sunset period and is going to reach its End-of-Life (EOL) on October 14, 2025.  

What’s the big deal about using unsupported tech?

Both non-updated, and outdated software, in general, literally invite criminals to infiltrate IT systems. We must accept that security is provided to our PCs by two parties, the first via the creator of the operating system (in this case Microsoft) and the second by a security vendor. With older platforms, there are either limited or no longer any security updates. This includes Windows XP, Vista, 7 & 8.1*. However, machines running these platforms are still in use on the internet in their millions, even if the flaws found are as large as can be.  
 
The biggest risk comes from vulnerabilities in network protocols, such as EternalBlue (2017) and others, which are still massively exploited today. The encryption Trojan WannaCry(ptor) -which leveraged Eternal Blue– was still responsible (as of 2022/23), for over half of all ransomware infection attempts. While WannaCry(ptor) mainly uses a Windows vulnerability that has long had an effective patch, when updates and patches are not applied, your system remains vulnerable.
 
More recent incidents like the zero-day exploit of MOVEit (a paid file transfer app) has led to a large-scale ransomware infection of businesses and governments globally, via supplier software. While not OS software, unpatched vulnerabilities in supplier software can also leave users similarly exposed.

Security is as security does, especially at scale

Product sunset “gets real” when the functional limitations of software begin to open the door to criminal manipulation. This becomes a concern because at some point, it simply no longer makes economic sense to the provider to keep developers maintaining:
 
1. Old software with complex, legacy architecture  
2. Difficult or impossible to make one software work well with newer code and hardware standards.  
 
While an OS like Windows 10 has many features and functions users and businesses benefit from, progress means that the economic and technical factors above play a decisive role. So let’s take a look at one of the most critical areas in which EOL has an impact, its role in security.
 
Microsoft End of life affects ESET products on your device  

The last version of Windows 10 was released in the fall of 2022. As with each previous OS version, ESET products had to be modified to provide maximum protection and full functionality. Once Microsoft communicated the date for the conclusion of its own period of mainstream support, most critically, security updates, this has portended potential technical impediments to compatibility with ESET products.  

*Specifically, ESET supports an OS until technical issues from the OS vendor’s side can no longer be overcome with reasonable effort.  

What should you expect?
 
Any version of an OS that is not the latest (or does not have the latest updates installed) can impact ESET and other security products in that some components or features might stop functioning (in the worst case) or that the user may not be able to install new builds (security and stability updates or feature updates) of ESET products. This is, for instance, the case of Windows 10 versions that are not the latest – these lack support for Azure Code signing that users will need to install new updates to ESET products.

Affected Business products:

  • ESET Endpoint Antivirus
  • ESET Endpoint Security
  • ESET Server Security for Microsoft Windows Server
  • ESET Security for Microsoft SharePoint Server
  • ESET Mail Security for Microsoft Exchange Server
  • ESET Mail Security for IBM Domino

Home products:

  • ESET NOD32 Antivirus
  • ESET Internet Security
  • ESET Smart Security Premium

From a hardware point of view, many PCs running Windows 10 have sufficient computing resources/performance to run Windows 11. However, in specific cases, hardware replacement may make sense. ESET strongly encourages you to make the move to Windows 11, as this version is the most fine-tuned, and most secure, and as it is the latest version, enabling you to enjoy the full potential of ESET products. ESET also highly recommends you to enable automatic Windows updates so that you do not miss any security patches or critical and driver updates.
 
Riding the Windows 10 wave to the very end?
With 17 months remaining until Microsoft ends product support for users of Windows 10 Home, Pro, Enterprise, and Education (Version 22H2), users have two roads to travel – stay on Windows 10 or begin planning an upgrade to Windows 11. Businesses and consumers should closely examine their PC and Server infrastructure’s compatibility with Windows 11 and decide If, how, and when to invest in futureproofing their IT infrastructure with secure computing in mind.
 
For ESET-protected Small and Medium Businesses (SMB) and both enterprises and institutional customers, an IT environment-wide upgrade to Windows 11 is a necessity. Business users at this scale should carefully consider the security risks of migrating after the end of our period of limited support. In that case businesses will be left with Microsoft’s built-in security features and components, which leaves a security environment partially reliant on signature-based detections rather than security modules that include advanced threat defense – a set of technologies that defend against targeted attacks and new, never-before-seen threat types, especially ransomware.

For PCs left running Windows 10, which will reach end of support on October 14, 2025, the current version 22H2 will be the final, with remaining support provided via a monthly security update until that date. For users delaying a move to Windows 11, it is critical that you stay on briefed about ESET support at our ESET Knowledge Base article here.   

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET  
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×