Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

A legacy application that is unsupported by the vendor poses a number of risks to your organization. Use Info-Tech’s research to:

  • Understand the risks posed by legacy applications.
  • Develop strategies for addressing the risks.
  • Access Info-Tech resources that help Applications Development & Maintenance leaders to overcome this challenge.

The legacy challenge must be addressed by a combination of skills and portfolio management

Related Content

Hide Details

Search Code: 46232
Published: August 7, 2011
Last Revised: August 7, 2011


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.