Companies are moving to cloud services at a record rate. Many companies now have several different cloud solutions.
For example:
Most custom applications need to integrate with these cloud solutions. For example, if your application uses the customer list, that list should load from the CRM package and not a separate table of customers. There should be one source of truth for all company data so it is imperative that custom applications can access cloud technologies. Older technologies are just not built to work with cloud APIs in a secure and efficient manner.
As companies migrate their technologies to the cloud, the number of servers hosted in-house starts to dwindle. It won’t be long before a single in-house server is dedicated for the purpose of running the one custom application.
Applications written using current programming technologies can be deployed directly to the cloud as an application service. Unfortunately, older technologies cannot be deployed to the cloud without setting up an entire virtual server—which is much more expensive than using an application service.
Why is this important? Windows applications are a hassle to set up for remote users. They either require the user to use their work computer and VPN into the office or run the application through their remote desktop. Both solutions can result in significant performance issues which cost time and money.
Web applications are lightweight and can be used from any device that has a web browser and an Internet connection. This includes desktops, laptops, tablets and mobile phones.
As more and more cloud technologies are used, each employee is required to manage several usernames and passwords for the CRM, ERP and other solutions. Your custom application may also fall into that list. Many older applications use a login table to keep track of users, their passwords and their rights within the application.
New technologies have the ability to automatically authenticate users by either using their Windows credentials or the credentials from another solution, thus eliminating the requirement to keep track of another set of passwords. In addition, many modern applications can use Active Directory to manage security within the application. That means that if a user needs access to an application, the IT department just needs to add the user to an AD group and the user is in. This is a very simple approach with centralized authorization handled in Active Directory where it belongs.
There are several good arguments for rewriting applications. If you think you or your business could benefit an Application Assessment from SCS is a great place to start. Learn more here. Feel free to contact us with any questions you might have!