Contact Us

|

Careers

|

Change Locale
close

2 Reasons to Pay Close Attention to Cisco Last Day of Support

Security | Posted on July 16, 2018 by andrew

The squeaky wheel gets the grease. The good news is Cisco devices don’t squeak often. But even devices as solid as Cisco’s don’t last forever. Just like every other device, they have a life cycle. After the end of the life cycle, also known as the Last Day of Support (LDOS), to keep them around is to embrace a certain degree of risk.

Maintaining unsupported devices is a risk that too many are taking. Research by Softchoice indicates that over 96% of companies have End of Sale devices in their production environment, and 73% have End of Service devices.

Why are these percentages so high? It’s often because of poor license visibility. Companies who have purchased Cisco products from a number of partners may end up with several different End of Service dates. This increases management complexity and makes it difficult to take appropriate action.

Secondly, LDOS-related costs are hidden in the future, whereas the costs of replacing gear are more obvious. Nevertheless, the hidden costs are real, including the high cost of a data breach.

Last Day of Support Devices Are Vulnerable Devices

Cybercriminals know that Cisco devices are ubiquitous. That means they’re interested in targeting them. This involves a constant cat and mouse game: Cisco has to defeat an ever-evolving array of threats.

Recently, Cisco discovered a vulnerability in their IOS XE software, wherein a malicious actor could log in with a certain kind of fictitious account and obtain high-level access. The vulnerability was noticed quickly, and fixed before it became the cause of a large-scale data breach.

However, if you have LDOS devices, you’re no longer protected by Cisco updates. That makes you a softer target for cybercriminals and malicious activity of all kinds.

According to research commissioned by security firm Malwarebytes, 39% of companies are victims of ransomware. Of those, 40% pay up. Simple calculations dictate that this translates to an unacceptable year-over-year hazard. A ransomware attack is a question of “when,” rather than a case of “if.”

The Cost of Outages

Let’s say that one of your devices breaks down, or one of your employees makes a mistake, and you have an outage. It happens to nearly everyone. According to research by Gartner and others, in 2017, the average company had 14 hours of downtime. These were costly hours. Half of those companies characterized the incidents as damaging to their reputation. By Gartner’s estimate, the average cost was $42,000 an hour.

While outages are always painful, they’re much less painful if your devices are supported. Your partner can fix the issue quickly, or replace the device within hours if a replacement is needed.

But it’s completely different with LDOS devices. When LDOS devices break, they really break. The worst-case scenarios are an absolute nightmare: you need to replace a device that doesn’t exist anymore or solve an issue that nobody can solve anymore. Unintentionally, by letting your devices go out of support, you’ve built a house of cards. In a moment of crisis, as your customers wonder why they can’t buy your products or access your services, you’ve got to modify and replace your architecture at the same time.

Take the Long View

So, with LDOS devices, there are two options. The first is to embrace the future and update your architecture. By doing so, you accrue some short-term costs, but you know that your systems are solid. The second is to wait for something terrible to happen, like a hard-to-fix outage, or a cyber attack. You save money in the short term, at the cost of future chaos and escalating, unpredictable costs, all of which could descend at any time.
The decision is yours.

Categories

Related Articles

Cloud | December 6, 2018 by Maya Cieszynska

Moving Beyond Cloud FUD It is necessary that companies be able to take advantage of a newly connected business world. These days, the speed, mobility, and flexibility offered by the cloud are just table stakes. It’s vitally important that your company overcomes the fear, uncertainty, and doubt (FUD) that can surround the cloud.

Security | November 14, 2018 by Susana Byun

The IT community has come full-circle on security in the cloud. A few years ago, any IT professional would have shuddered to imagine storing information in someone else’s data center. Today, cloud and hybrid IT are facts-of-life for many businesses.

Security | October 29, 2018 by Susana Byun

One of the most hyped use cases of software-defined networking (SDN) is micro-segmentation — and for a good reason. With solutions such as VMware NSX, micro-segmentation promises several high-value business outcomes. These include modern security, seamless operations and optimized user experience. Learn the key three reasons why you should consider micro-segmentation for your organization.