
Implementation hurdles
Sunil Varkey, advisor at Beagle Security, warns of implementation complexities. “The operational reality of removing legacy systems is not straightforward,” Varkey said. “Legacy devices continue to exist not by design, but by necessity.”
He pointed to orphaned systems that remain live and embedded in workflows but lack clear ownership, and operational technology environments where newer hardware or software versions are not available, compatible, or certified. The process requires asset discovery, risk assessment, procurement, configuration redesign, data migration, testing, and managed cutovers to avoid service disruption.
“A common challenge will be the presence of ‘orphaned’ or ‘ghost’ systems — devices that are live, embedded in workflows, but no longer clearly owned,” Varkey said. “These systems often persist because ‘they’ve always worked,’ even when no one fully understands their function.”
