Adaptive Apps in the Cloud-Native and Container-environment

More flexibility for traditional applications Adaptive Apps in the Cloud-Native and Container-environment

Many companies want to speed with agile processes, the development and customization of applications. However, traditional applications, you set a great challenge. With the help of modern solutions, these can be seamlessly integrated with Cloud and Container environments.

Company to the topic

Rigidity may lead to an application must not be working in a new environment and retrofitted.
Rigidity may lead to an application must not be working in a new environment and retrofitted.(Photo: Carlo Martin)

Flexibility and scalability: both of These requirements are not only in the Wake of the Corona pandemic is becoming more and more important. Micro-services, containers, architectures, and Cloud-native applications have brought forward company significantly.

However, only few Start-ups can develop their infrastructures and applications for a complete rebuild this as a distributed Cloud – based or Container-native services interact via APIs inter. Classic, companies must generally use traditional applications and platforms continue to your business processes to continue.

Monolithic applications to be important

According to a recent study from F5 shows that 97 percent of companies continue to use traditional applications, a monolithic or Client-Server architecture have. More than three-quarters of the use of both traditional and modern applications. Viewed from the other side that means that 21 percent of the companies use exclusively conventional applications.

These traditional applications have been developed over the last decades, in order to meet Business requirements. They often form the Basis for business-critical processes. This includes systems for the processing of mortgage loans, payment processing systems, electronic patient records in hospitals, SaaS i.e. Software – as-a-Service platforms in the first Generation, warehouse management systems, and 3G and 4G mobile networks of Service providers.

These applications continue to use as they run for many years as a reliable and relatively smoothly. In the face of new customer and Compliance requirements, the Problem is that they are usually difficult and expensive to get bigger. In addition, companies fear in adjustments to this business-critical systems, a possible interruption of business operation, with all the negative consequences, such as revenue and the loss of Image.

So many front-Ends for customers, which today are designed usually with modern architectures are instructed in the practice continues to this traditional applications in the Backend. Most of the digital offers of today, to form a mixture of older applications as a System of Record and modern applications as a System of Engagement.

This application logic is traditional and modern, increasingly, the local data center, the Public Cloud and the Edge-area distributed. And all of these elements come together on the device or in the Browser of the customer as a quote.

Traditional applications are rigid

Traditional applications may have been developed with programming languages that are widely used today, such as Fortran or COBOL. Even if they were written in a more modern language, are the developers may already be in peace or are now in other companies.

It is all an expert in this area, they must fight their way through part of the undocumented Code, before it can make Changes. The lack of flexibility of conventional applications is also a Problem, because the traffic patterns change over time. This applies to the type of the requests made to the application, their frequency, the protocols and the actual data packets.

The elements of the Infrastructure, which is surrounded by the application, such as network Switching and Routing, as well as Compute or Hypervisor technologies, also change over time. Vulnerabilities and security risks increase the possible dangers due to rigid applications. In the last two years, the number of attacks on Apps has risen by 300 percent. Older applications with known vulnerabilities, and Exploits can be an easy target for cyber criminals.

Rigidity can also lead to the fact that the application is working in a new environment, or even crashing. But the application is still critical to the business, companies can not do without it. On the other hand, a complete Revision of the application is often time-consuming and expensive.

Increase efficiency, reduce costs

Traditional Apps with the help of modern solutions, but retrofitting. To be able to have a legacy application in a current environment efficiently, provides a kind of flexible shell with programmable technologies for the security and deployment of the App in distributed Cloud and Container – native services. Thus, the problems can be, so to speak, in the application itself. In this case, the Add such a function is fast, cost-effective and does not require the application developer.

Such a case must contain advanced features for application security, in order to enable consistent policies and Services in all environments. This is especially true when companies migrate business-critical, traditional applications in a Public Cloud or Multi-Cloud.

The enveloping layer of protection should be extremely flexible. This is shown in the Form of faster programmability and configurability. In addition, it enables the control of the data traffic and guidelines, so that certain data streams to the application itself. You can also perform additional functions. This ranges from Load Balancing and Protocol translation – for example, of HTTP/2 to HTTP/1.1 to security features such as Application Firewalling, distributed Denial-of-Service protection, and Bot-defense.

For optimal operational efficiency, companies should have the security and deployment technologies, as an overall package, evaluate, promote consistency between On-Premises and Public Cloud. A “Best-of-Suite”approach is all the more important for the Performance, the greater the traffic is to be encrypted.

These functions are spread out over a series of virtual or physical Appliances along with the Application data path, is used to decode each device in the path of the data traffic, a feature, and then re-encrypt. This is extremely inefficient. The standardization and consolidation of security and deployment features in one solution reduces only the cost, but also increases the Performance of the App.

Automation

To run traditional applications as effectively and efficiently as possible, the automation is becoming increasingly important. Automatic functions for application security and deployment, the envelop traditional applications, can further reduction in operating costs. This can be achieved through declarative APIs versioning and the use of centralised management solutions.

All solutions work together optimally, companies should use the latest versions with all the latest features. Also, make sure that you use high-quality and secure Code. Then you can retrofit traditional Apps and their safety, as well as providing for Hybrid and Multi-Cloud deployments, simplify.

As a result, traditional Apps work the same way as modern adaptive applications. This Adaptive Apps contain technologies for application security and deployment, covering all of the vulnerabilities, resources according to the demand to expand and reduce, detect problems, and proactively self-heal.

Conclusion

Traditional applications will be playing in most of the companies for many years an important role. The right technologies for security and deployment can ensure that these Apps will continue to function reliably and at the same time improve operational efficiency.

Kara Sprague

Kara Sprague

(Image: Richard Brown 2017)

These technologies should work in on-premises and Cloud environments in a consistent and highly programmable and configurable to provide as much flexibility as possible. In addition, they protect you with advanced safety features of business-critical applications against the latest attack methods.

* Kara Sprague, Executive Vice President and General Manager, BIG-IP, F5.

(ID:47118550)

Ready to see us in action:

More To Explore

IWanta.tech
Logo
Enable registration in settings - general
Have any project in mind?

Contact us:

small_c_popup.png