Diffusing the End of Life timebomb

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Depending on operating systems and software that have reached their end of life is a growing risk for IT.

A product that has reached its end of life is no longer supported by the vendor, and may mean any security risks will not be addressed by updates. Every product you have in your environment that has reached its EOL date adds one more potential foothold for a hacker to gain access to your environment.

One current example is Windows XP, which goes end of life this April. Companies may depend on a specific version of a browser, which requires them to stay on Windows XP for business-critical apps; or a legacy piece of software that does not support Windows 7; or have embedded systems running Windows XP.

In all those cases, after April 8th, 2014 you will no longer receive security updates for your XP machines. Java runtime is another all too common example of a product that has exceeded its end of life and is still commonly found in companies around the world. Java 6 reached its end of life in February of 2013, but for as little as $450 a hacker can buy off the shelf exploit toolkits to take advantage of known vulnerabilities.

In this webinar we will look at steps a company can take to reduce or remove these risks, including:

  • Understanding the software you have in your environment and identifying dependencies;
  • Identifying risks, and alternatives to at-risk systems;
  • Look for alternative solutions that do not have this dependency;
  • Premium support options;
  • Virtualisation and even hardware upgrades to remove end-of-life systems from the network.



Chris Goettl

Program Product Manager, Shavlik

Photo of Ernie Hayden

Ernie Hayden

Executive Consultant, Securicon LLC

Photo of Stephen Pritchard

Stephen Pritchard

Freelance Writer, Infosecurity Magazine

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.