โŒ

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

๋ ˆ๊ฑฐ์‹œ ์œ ์ง€๋ณด์ˆ˜์— ๋ฐœ๋ชฉ ์žกํžŒ IT, ์„œ๋“œํŒŒํ‹ฐ๋กœ ๋ŒํŒŒ๊ตฌ ๋ชจ์ƒ‰

4 December 2025 at 22:14

๊ธฐ์ˆ  ๋ถ€์ฑ„๊ฐ€ IT ์กฐ์ง์„ ๋งˆ๋น„์‹œํ‚ฌ ์œ„ํ˜‘ ์š”์ธ์œผ๋กœ ๋– ์˜ค๋ฅด์ž ์ƒ๋‹น์ˆ˜ CIO๊ฐ€ ๋ ˆ๊ฑฐ์‹œ ์†Œํ”„ํŠธ์›จ์–ด์™€ ์‹œ์Šคํ…œ ์œ ์ง€๋ณด์ˆ˜ยท์—…๊ทธ๋ ˆ์ด๋“œ๋ฅผ ์œ„ํ•ด ์„œ๋“œํŒŒํ‹ฐ ์„œ๋น„์Šค ์—…์ฒด์— ๋ˆˆ์„ ๋Œ๋ฆฌ๊ณ  ์žˆ๋‹ค. ๋งค๋‹ˆ์ง€๋“œ ์„œ๋น„์Šค ์—…์ฒด ์—”์†Œ๋…ธ(Ensono)๊ฐ€ ์‹ค์‹œํ•œ ์„ค๋ฌธ์กฐ์‚ฌ ๊ฒฐ๊ณผ, IT ๋ฆฌ๋” 100๋ช… ๊ฐ€์šด๋ฐ 95๋ช…์ด ๋ ˆ๊ฑฐ์‹œ IT๋ฅผ ํ˜„๋Œ€ํ™”ํ•˜๊ณ  ๊ธฐ์ˆ  ๋ถ€์ฑ„๋ฅผ ์ค„์ด๊ธฐ ์œ„ํ•ด ์™ธ๋ถ€ ์„œ๋น„์Šค ์—…์ฒด๋ฅผ ํ™œ์šฉํ•˜๊ณ  ์žˆ๋Š” ๊ฒƒ์œผ๋กœ ๋‚˜ํƒ€๋‚ฌ๋‹ค.

์ด ๊ฐ™์€ ์›€์ง์ž„์€ ๋ถ€๋ถ„์ ์œผ๋กœ ๋ ˆ๊ฑฐ์‹œ IT ๋น„์šฉ ์ฆ๊ฐ€์—์„œ ๋น„๋กฏ๋๋‹ค. ์‘๋‹ต์ž ๊ฐ€์šด๋ฐ ๊ฑฐ์˜ ์ ˆ๋ฐ˜์€ ์ง€๋‚œํ•ด ๋…ธํ›„ IT ์‹œ์Šคํ…œ ์œ ์ง€๋ณด์ˆ˜์— ์˜ˆ์‚ฐ๋ณด๋‹ค ๋” ๋งŽ์€ ๋น„์šฉ์„ ์ง€์ถœํ–ˆ๋‹ค๊ณ  ๋‹ตํ–ˆ๋‹ค. ๋” ํฐ ๋ฌธ์ œ๋Š” ๋ ˆ๊ฑฐ์‹œ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜๊ณผ ์ธํ”„๋ผ๊ฐ€ IT ์กฐ์ง์˜ ๋ฐœ๋ชฉ์„ ์žก๊ณ  ์žˆ๋‹ค๋Š” ์ ์ด๋‹ค. IT ๋ฆฌ๋” 10๋ช… ๊ฐ€์šด๋ฐ 9๋ช…์€ ๋ ˆ๊ฑฐ์‹œ ์œ ์ง€๋ณด์ˆ˜๊ฐ€ AI ํ˜„๋Œ€ํ™” ๊ณ„ํš์— ๊ฑธ๋ฆผ๋Œ์ด ๋˜๊ณ  ์žˆ๋‹ค๊ณ  ์ง€์ ํ–ˆ๋‹ค.

์—”์†Œ๋…ธ์˜ CTO ํŒ€ ๋ฒ ์–ด๋จผ์€ โ€œ๋ ˆ๊ฑฐ์‹œ ์‹œ์Šคํ…œ ์œ ์ง€๋ณด์ˆ˜๊ฐ€ ํ˜„๋Œ€ํ™” ๋…ธ๋ ฅ์— ํฐ ๋ฐฉํ•ด๊ฐ€ ๋˜๊ณ  ์žˆ๋‹คโ€๋ผ๋ฉฐ, โ€œ์ „ํ˜•์ ์ธ ํ˜์‹ ๊ฐ€์˜ ๋”œ๋ ˆ๋งˆ๋‹ค. ํ˜์‹ ๋ณด๋‹ค๋Š” ๋…ธํ›„ ์‹œ์Šคํ…œ๊ณผ ๊ทธ ํ•ด๊ฒฐ ๋ฐฉ์•ˆ์—๋งŒ ์ง‘์ค‘ํ•˜๊ณ  ์žˆ๋‹คโ€๋ผ๊ณ  ์ง€์ ํ–ˆ๋‹ค.

์ผ๋ถ€ CIO๋Š” ๋ ˆ๊ฑฐ์‹œ ์‹œ์Šคํ…œ ์šด์˜์„ ์„œ๋น„์Šค ์—…์ฒด์— ๋งก๊ธฐ๊ฑฐ๋‚˜ ์™ธ๋ถ€ ITํŒ€์„ ํ™œ์šฉํ•ด ๊ธฐ์ˆ  ๋ถ€์ฑ„๋ฅผ ์ •๋ฆฌํ•˜๊ณ  ์†Œํ”„ํŠธ์›จ์–ด์™€ ์‹œ์Šคํ…œ์„ ํ˜„๋Œ€ํ™”ํ•˜๊ณ  ์žˆ๋‹ค. ๋ฒ ์–ด๋จผ์€ ๋ ˆ๊ฑฐ์‹œ ์‹œ์Šคํ…œ์„ ์™ธ๋ถ€์— ๋งก๊ธฐ๋Š” ๊ธฐ์—…์ด ์ฆ๊ฐ€ํ•˜๋Š” ๋ฐฐ๊ฒฝ์œผ๋กœ ๊ณ ๋ นํ™”๋œ ์ธ๋ ฅ์„ ๊ผฝ์•˜๋‹ค. ๊ธฐ์—… ๋‚ด๋ถ€์˜ ๋ ˆ๊ฑฐ์‹œ ์‹œ์Šคํ…œ ์ „๋ฌธ๊ฐ€๊ฐ€ ์€ํ‡ดํ•˜๋ฉด์„œ ์ถ•์ ๋œ ์ง€์‹๋„ ํ•จ๊ป˜ ๋น ์ ธ๋‚˜๊ฐ€๊ณ  ์žˆ๋‹ค๋Š” ์˜๋ฏธ๋‹ค.

๋ฒ ์–ด๋จผ์€ โ€œ์ด ์ผ์„ ๋‚ด๋ถ€์—์„œ ์ง์ ‘ ์ฒ˜๋ฆฌํ•  ์ˆ˜ ์žˆ๋Š” ์ธ๋ ฅ์ด ๋งŽ์ง€ ์•Š๋‹ค. ์กฐ์ง ๋‚ด ์ธ๋ ฅ์ด ๊ณ ๋ นํ™”๋˜๊ณ  ํ‡ด์ง์ž๊ฐ€ ๋Š˜์–ด๋‚˜๋Š” ์ƒํ™ฉ์—์„œ, ํ•„์š”ํ•œ ์ธ์žฌ๋ฅผ ์ฑ„์šฉํ•˜๊ธฐ ์–ด๋ ค์šด ์˜์—ญ์—์„œ๋Š” ์™ธ๋ถ€์—์„œ ์ „๋ฌธ ์ธ๋ ฅ์„ ์ฐพ์•„์•ผ ํ•œ๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ๋˜, โ€œMSP ๋ชจ๋ธ ์ž์ฒด๋Š” ์ˆ˜์‹ญ ๋…„ ์ „๋ถ€ํ„ฐ ์กด์žฌํ–ˆ์ง€๋งŒ, ์ตœ๊ทผ์—๋Š” ์˜ˆ์‚ฐ์„ ํ™•๋ณดํ•˜๊ณ  AI๋ฅผ ๋„์ž…ํ•  ์‹œ๊ฐ„์„ ๋งŒ๋“ค๊ธฐ ์œ„ํ•ด MSP๋ฅผ ๊ธฐ์ˆ  ๋ถ€์ฑ„ ๊ด€๋ฆฌ ์ˆ˜๋‹จ์œผ๋กœ ํ™œ์šฉํ•˜๋Š” ํ๋ฆ„์ด ์ปค์ง€๊ณ  ์žˆ๋‹คโ€๋ผ๊ณ  ๋ถ„์„ํ–ˆ๋‹ค.

AI์ฒ˜๋Ÿผ ์ƒˆ๋กœ์šด ๊ธฐ์ˆ ์ด ๋น ๋ฅด๊ฒŒ ํ™•์‚ฐ๋˜๋Š” ๊ฒƒ๋„ ์ด๋Ÿฐ ํ๋ฆ„์— ์ผ์กฐํ•˜๊ณ  ์žˆ๋‹ค. ๋ฒ ์–ด๋จผ์€ โ€œํ•œ์ชฝ์—๋Š” ๊ด€๋ฆฌยท์œ ์ง€ํ•ด์•ผ ํ•˜๋Š” ๋ ˆ๊ฑฐ์‹œ ๋ฌธ์ œ๊ฐ€ ์žˆ๊ณ , ๋‹ค๋ฅธ ํ•œ์ชฝ์—๋Š” ์ˆ˜๋…„ ๋™์•ˆ ๊ฒฝํ—˜ํ•˜์ง€ ๋ชปํ•œ ์†๋„๋กœ ๋ฐœ์ „ํ•˜๋Š” ์ตœ์‹  ๊ธฐ์ˆ ์ด ์žˆ์–ด ์–‘์ชฝ์„ ๋™์‹œ์— ๋”ฐ๋ผ๊ฐ€๊ธฐ ์–ด๋ ต๋‹คโ€๋ผ๊ณ  ๋ง๋ถ™์˜€๋‹ค.

์œ„ํ—˜์˜ ์•„์›ƒ์†Œ์‹ฑ

์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ์„œ๋น„์Šค ์—…์ฒด ๋‰ด๋น…(Neuvik)์˜ CEO ๋ผ์ด์–ธ ๋ ˆ์ด๋ฅด๋น…์€ ๋ ˆ๊ฑฐ์‹œ IT ๊ด€๋ฆฌ๋ฅผ ์„œ๋น„์Šค ์—…์ฒด์— ๋งก๊ธฐ๋Š” ํ๋ฆ„์ด ํ™•๋Œ€๋˜๊ณ  ์žˆ๋‹ค๋Š” ์ ์— ๋™์˜ํ–ˆ๋‹ค. ๋ ˆ์ด๋ฅด๋น…์€ ๋ ˆ๊ฑฐ์‹œ ์‹œ์Šคํ…œ์— ์ ํ•ฉํ•œ ์ „๋ฌธ๊ฐ€๋ฅผ ๋งค์นญํ•˜๋Š” ๋“ฑ ์—ฌ๋Ÿฌ ์žฅ์ ์„ ์–ธ๊ธ‰ํ•˜๋ฉด์„œ๋„, CIO๊ฐ€ ์œ„ํ—˜ ๊ด€๋ฆฌ๋ฅผ ์œ„ํ•ด MSP๋ฅผ ํ™œ์šฉํ•˜๋Š” ๊ฒฝํ–ฅ๋„ ์žˆ๋‹ค๊ณ  ์ง€์ ํ–ˆ๋‹ค.

๋ ˆ์ด๋ฅด๋น…์€ โ€œ๋งŽ์€ ์žฅ์  ๊ฐ€์šด๋ฐ ์ž์ฃผ ์–ธ๊ธ‰๋˜์ง€ ์•Š๋Š” ํ•ต์‹ฌ์€ ์ทจ์•ฝ์  ์•…์šฉ์ด๋‚˜ ์„œ๋น„์Šค ์ค‘๋‹จ ์œ„ํ—˜์„ ์„œ๋น„์Šค ์—…์ฒด์— ๋งก๊ธธ ์ˆ˜ ์žˆ๋‹ค๋Š” ์ โ€์ด๋ผ๋ฉฐ, โ€œ์ทจ์•ฝ์  ๋ฐœ๊ฒฌ๊ณผ ํŒจ์น˜, ์ „๋ฐ˜์ ์ธ ์œ ์ง€๋ณด์ˆ˜์— ์ง€์†์ ์œผ๋กœ ๋งŽ์€ ๋น„์šฉ์ด ๋“œ๋Š” ํ™˜๊ฒฝ์—์„œ๋Š” ์ž˜๋ชป ๋Œ€์‘ํ–ˆ์„ ๋•Œ ๋ฐœ์ƒํ•˜๋Š” ์œ„ํ—˜์„ ์„œ๋น„์Šค ์—…์ฒด๊ฐ€ ๋– ์•ˆ๊ฒŒ ๋˜๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋งŽ๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

๋ฏธ ๊ตญ๋ฐฉ๋ถ€(US Department of Defense)์—์„œ ๋น„์„œ์‹ค์žฅ ๊ฒธ ์‚ฌ์ด๋ฒ„ ๋ถ€๋ฌธ ๋ถ€๊ตญ์žฅ์„ ์ง€๋‚ธ ๋ ˆ์ด๋ฅด๋น…์€ ๋ ˆ๊ฑฐ์‹œ IT ์œ ์ง€๋ณด์ˆ˜ ์˜ˆ์‚ฐ์„ ์ดˆ๊ณผ ์ง‘ํ–‰ํ•œ IT ์ฑ…์ž„์ž๊ฐ€ ๋งŽ๋‹ค๋Š” ๊ฒƒ์ด ๋†€๋ž„ ์ผ์€ ์•„๋‹ˆ๋ผ๊ณ  ๋งํ•œ๋‹ค. ๋งŽ์€ ์กฐ์ง์ด ํ˜„์žฌ ๋ณด์œ ํ•œ IT ์ธํ”„๋ผ์™€ ์•ž์œผ๋กœ ์ „ํ™˜ํ•ด์•ผ ํ•  ์ธํ”„๋ผ ์‚ฌ์ด์—์„œ ํ•„์š”ํ•œ ์ธ์žฌ ์—ญ๋Ÿ‰์ด ๋งž์ง€ ์•Š๋Š” ์ƒํ™ฉ์— ๋†“์—ฌ ์žˆ๋‹ค๊ณ  ์ง€์ ํ•˜๋ฉฐ, ๋ ˆ๊ฑฐ์‹œ ์†Œํ”„ํŠธ์›จ์–ด์™€ ์‹œ์Šคํ…œ์˜ ์ง€์†์ ์ธ ์œ ์ง€๋ณด์ˆ˜ ๋น„์šฉ์ด ์˜ˆ์ƒ๋ณด๋‹ค ๋” ๋งŽ์ด ๋“œ๋Š” ๊ฒฝ์šฐ๋„ ์žฆ๋‹ค๊ณ  ๋งํ–ˆ๋‹ค.

๋ ˆ์ด๋ฅด๋น…์€ โ€œ์ดˆ๊ธฐ ๋„์ž… ๋น„์šฉ์ด 1์ด๋ผ๋ฉด, ์œ ์ง€๋ณด์ˆ˜ ๋น„์šฉ์€ 1X์ด๊ธฐ ๋•Œ๋ฌธ์— ์˜ˆ์ƒํ•˜์ง€ ๋ชปํ•œ ๊ฑฐ๋Œ€ํ•œ ์œ ์ง€๋ณด์ˆ˜ ๊ผฌ๋ฆฌ๊ฐ€ ์ƒ๊ธด๋‹คโ€๋ผ๊ณ  ๋ง๋ถ™์˜€๋‹ค.

๋ ˆ๊ฑฐ์‹œ ์œ ์ง€๋ณด์ˆ˜์˜ ๋ซ์—์„œ ๋ฒ—์–ด๋‚˜๋ ค๋ฉด ์ ์ ˆํ•œ ์„œ๋“œํŒŒํ‹ฐ ์—…์ฒด๋ฅผ ๊ณ ๋ฅด๋Š” ์„ ๊ฒฌ์ง€๋ช…๊ณผ ์„ ํƒ ๊ธฐ์ค€์ด ํ•„์š”ํ•˜๋‹ค. ๋ ˆ์ด๋ฅด๋น…์€ โ€œ์žฅ๊ธฐ์ ์ธ ๊ด€์ ์—์„œ ํ•ด๋‹น ์—…์ฒด์™€ ํ–ฅํ›„ 5๋…„ ๊ณ„ํš์ด ๋งž๋ฌผ๋ฆฌ๋Š”์ง€ ๋ฐ˜๋“œ์‹œ ํ™•์ธํ•ด์•ผ ํ•œ๋‹ค. ๋˜ ์กฐ์ง์˜ ๋ชฉํ‘œ์™€ ์—…์ฒด๊ฐ€ ์ œ๊ณตํ•˜๋ ค๋Š” ์ง€์› ๋ฐฉํ–ฅ์ด ์ผ์น˜ํ•˜๋Š”์ง€๋„ ์ ๊ฒ€ํ•ด์•ผ ํ•œ๋‹คโ€๋ผ๊ณ  ์กฐ์–ธํ–ˆ๋‹ค.

๋‘ ๋ฒˆ ์ง€๋ถˆํ•˜๋Š” ๋น„์šฉ

์ผ๋ถ€ IT ๋ฆฌ๋”๊ฐ€ ๋ ˆ๊ฑฐ์‹œ ์‹œ์Šคํ…œ ํ˜„๋Œ€ํ™”๋ฅผ ์„œ๋“œํŒŒํ‹ฐ ์—…์ฒด์— ๋งก๊ธฐ๊ณ  ์žˆ์ง€๋งŒ, IT ์„œ๋น„์Šค ๊ด€๋ฆฌ ๋ฐ ๊ณ ๊ฐ ์„œ๋น„์Šค ์†Œํ”„ํŠธ์›จ์–ด ์—…์ฒด ํ”„๋ ˆ์‹œ์›์Šค(Freshworks)๊ฐ€ ์ตœ๊ทผ ๊ณต๊ฐœํ•œ ๋ณด๊ณ ์„œ๋Š” ์ด๋Ÿฐ ํ˜„๋Œ€ํ™” ๋…ธ๋ ฅ์ด ๊ณผ์—ฐ ํšจ์œจ์ ์ธ์ง€์— ์˜๋ฌธ์„ ์ œ๊ธฐํ–ˆ๋‹ค.

ํ”„๋ ˆ์‹œ์›์Šค์˜ ์กฐ์‚ฌ์—์„œ ์‘๋‹ต์ž์˜ 3/4 ์ด์ƒ์€ ์†Œํ”„ํŠธ์›จ์–ด ๋„์ž…์— ์˜ˆ์ƒ๋ณด๋‹ค ๋” ๋งŽ์€ ์‹œ๊ฐ„์ด ๊ฑธ๋ฆฐ๋‹ค๊ณ  ๋‹ตํ–ˆ๊ณ , ํ”„๋กœ์ ํŠธ ๊ฐ€์šด๋ฐ 2/3์€ ์˜ˆ์‚ฐ์„ ์ดˆ๊ณผํ–ˆ๋‹ค๊ณ  ์‘๋‹ตํ–ˆ๋‹ค. ํ”„๋ ˆ์‹œ์›์Šค์˜ CIO ์•„์Šˆ์œˆ ๋ฐœ๋ž„์€ ์„œ๋“œํŒŒํ‹ฐ ์„œ๋น„์Šค ์—…์ฒด๊ฐ€ ์ด ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•ด ์ฃผ์ง€ ๋ชปํ•  ์ˆ˜๋„ ์žˆ๋‹ค๊ณ  ๊ฒฝ๊ณ ํ–ˆ๋‹ค.

๋ฐœ๋ž„์€ โ€œ๋ ˆ๊ฑฐ์‹œ ์‹œ์Šคํ…œ์ด ๋„ˆ๋ฌด ๋ณต์žกํ•ด์ง€๋ฉด์„œ ๊ธฐ์—…์ด ๋„์›€์„ ๊ตฌํ•˜๋ ค๊ณ  ์„œ๋“œํŒŒํ‹ฐ ์—…์ฒด์™€ ์ปจ์„คํ„ดํŠธ์— ์ ์  ๋” ์˜์กดํ•˜๊ณ  ์žˆ์ง€๋งŒ, ์‹ค์ œ๋กœ๋Š” ์ˆ˜์ค€ ์ดํ•˜์˜ ๋ ˆ๊ฑฐ์‹œ ์‹œ์Šคํ…œ์„ ๋‹ค๋ฅธ ์ˆ˜์ค€ ์ดํ•˜ ๋ ˆ๊ฑฐ์‹œ ์‹œ์Šคํ…œ์œผ๋กœ ๋ฐ”๊พธ๋Š” ๊ฒฐ๊ณผ์— ๊ทธ์น˜๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋งŽ๋‹คโ€๋ผ๋ฉฐ, โ€œ์„œ๋“œํŒŒํ‹ฐ ์—…์ฒด์™€ ์ปจ์„คํ„ดํŠธ๋ฅผ ์ถ”๊ฐ€ํ•˜๋ฉด ๊ธฐ์กด ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ๋ณด๋‹ค๋Š” ์ƒˆ๋กœ์šด ๋ณต์žก์„ฑ๋งŒ ๋”ํ•ด ๋ฌธ์ œ๋ฅผ ์•…ํ™”์‹œํ‚ค๋Š” ์‚ฌ๋ก€๋„ ์ ์ง€ ์•Š๋‹คโ€๋ผ๊ณ  ์ง€์ ํ–ˆ๋‹ค.

ํ•ด๋ฒ•์€ ์„œ๋“œํŒŒํ‹ฐ ์—…์ฒด๋ฅผ ๋Š˜๋ฆฌ๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋ผ ๋ณ„๋„์˜ ๋ณต์žกํ•œ ์ž‘์—… ์—†์ด ๋ฐ”๋กœ ์“ธ ์ˆ˜ ์žˆ๋Š” ์ƒˆ๋กœ์šด ๊ธฐ์ˆ ์„ ๋„์ž…ํ•˜๋Š” ๋ฐ ์žˆ๋‹ค. ๋ฐœ๋ž„์€ โ€œ์ด๋ก ์ ์œผ๋กœ ์„œ๋“œํŒŒํ‹ฐ ์—…์ฒด๋Š” ์ „๋ฌธ์„ฑ๊ณผ ์†๋„๋ฅผ ์ œ๊ณตํ•œ๋‹ค. ํ•˜์ง€๋งŒ ํ˜„์‹ค์—์„œ๋Š” ๋ณต์žกํ•œ ๊ธฐ์ˆ ์„ ๋„์ž…ํ•˜๋Š” ๋ฐ ํ•œ ๋ฒˆ, ํ•ด๋‹น ๊ธฐ์ˆ ์ด ์ œ๋Œ€๋กœ ์ž‘๋™ํ•˜๋„๋ก ์ปจ์„คํ„ดํŠธ๋ฅผ ํˆฌ์ž…ํ•˜๋Š” ๋ฐ ๋˜ ํ•œ ๋ฒˆ ๋“ฑ ๋‘ ๋ฒˆ ๋น„์šฉ์„ ์ง€๋ถˆํ•˜๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋งŽ๋‹คโ€๋ผ๊ณ  ๊ผฌ์ง‘์—ˆ๋‹ค.

ํ”ผํ•˜๊ธฐ ์–ด๋ ค์šด ์„œ๋“œํŒŒํ‹ฐ ์—…์ฒด ํ™œ์šฉ

์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ์†”๋ฃจ์…˜ ์—…์ฒด ์›Œ์น˜๊ฐ€๋“œ ํ…Œํฌ๋†€๋กœ์ง€์Šค(WatchGuard Technologies)์˜ ํ•„๋“œ CTO ๊ฒธ CISO ์• ๋ค ์œˆ์Šคํ„ด์€ ์ƒ๋‹น์ˆ˜ IT ๋ฆฌ๋”๊ฐ€ ์ผ์ • ์ˆ˜์ค€์˜ ์„œ๋“œํŒŒํ‹ฐ ์ง€์›์„ ์‚ฌ์‹ค์ƒ ํ”ผํ•  ์ˆ˜ ์—†๋Š” ์„ ํƒ์œผ๋กœ ๋ณด๊ณ  ์žˆ๋‹ค. ์œˆ์Šคํ„ด์€ ์˜ค๋ž˜๋œ ์ฝ”๋“œ๋ฅผ ์—…๋ฐ์ดํŠธํ•˜๊ฑฐ๋‚˜ ์›Œํฌ๋กœ๋“œ๋ฅผ ํด๋ผ์šฐ๋“œ๋กœ ์ด์ „ํ•˜๊ณ  SaaS ๋„๊ตฌ๋ฅผ ๋„์ž…ํ•˜๊ณ , ์‚ฌ์ด๋ฒ„๋ณด์•ˆ์„ ๊ฐ•ํ™”ํ•˜๋Š” ๋“ฑ ๋Œ€๋ถ€๋ถ„์˜ ๊ณผ์ œ์—์„œ ์ด์ œ ์™ธ๋ถ€ ์ง€์›์ด ํ•„์š”ํ•˜๋‹ค๊ณ  ๋งํ–ˆ๋‹ค.

์œˆ์Šคํ„ด์€ ๋…ธํ›„ ์›๊ฒฉ์ ‘์† ๋„๊ตฌ์™€ VPN์„ ํฌํ•จํ•œ ๋ ˆ๊ฑฐ์‹œ ์‹œ์Šคํ…œ์ด ์Œ“์ด๋ฉด ๊ธฐ์ˆ  ๋ถ€์ฑ„๊ฐ€ ๋ˆˆ๋ฉ์ด์ฒ˜๋Ÿผ ๋ถˆ์–ด๋‚˜ ์กฐ์ง์„ ์ง“๋ˆ„๋ฅผ ์ˆ˜ ์žˆ๋‹ค๊ณ  ๊ฒฝ๊ณ ํ–ˆ๋‹ค. ๋˜, ์•„์ง ๋งŽ์€ ์กฐ์ง์ด ํด๋ผ์šฐ๋“œ๋‚˜ SaaS ๋„๊ตฌ๋กœ ์™„์ „ํžˆ ํ˜„๋Œ€ํ™”ํ•˜์ง€ ๋ชปํ•œ ์ƒํƒœ์ด๋ฉฐ, ์ „ํ™˜ ์‹œ์ ์ด ์˜ค๋ฉด ์™ธ๋ถ€ ์—…์ฒด์— ๋„์›€์„ ์š”์ฒญํ•  ์ˆ˜๋ฐ–์— ์—†์„ ๊ฒƒ์ด๋ผ๊ณ  ๋‚ด๋‹ค๋ดค๋‹ค.

์œˆ์Šคํ„ด์€ โ€œ๋Œ€๋ถ€๋ถ„ ๊ธฐ์—…์€ ์ž์ฒด ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ์„ค๊ณ„ยท๊ฐœ๋ฐœยท์šด์˜ํ•˜์ง€ ์•Š๊ณ , ๊ทธ๋Ÿฐ ์˜์—ญ์— ๊ธฐ์ˆ  ๋ถ€์ฑ„๊ฐ€ ์Œ“์—ฌ ์žˆ๋Š” ์ƒํ™ฉ์—์„œ ํ•˜์ด๋ธŒ๋ฆฌ๋“œ IT ๊ตฌ์กฐ๋ฅผ ์œ ์ง€ํ•˜๊ณ  ์žˆ๋‹คโ€๋ผ๋ฉฐ, โ€œ์—ฌ์ „ํžˆ ์ฝ”๋กœ์ผ€์ด์…˜๊ณผ ์˜จํ”„๋ ˆ๋ฏธ์Šค ์ค‘์‹ฌ์ด๋˜ ์‹œ์ ˆ์˜ ํ™˜๊ฒฝ์„ ์œ ์ง€ํ•˜๋Š” ๊ธฐ์—…๋„ ๋งŽ๊ณ , ์ด๋Ÿฐ ํ™˜๊ฒฝ์—๋Š” ๊ฑฐ์˜ ์˜ˆ์™ธ ์—†์ด ๋ ˆ๊ฑฐ์‹œ ์„œ๋ฒ„์™€ ๋ ˆ๊ฑฐ์‹œ ๋„คํŠธ์›Œํฌ, ํ˜„๋Œ€์ ์ธ ์„ค๊ณ„๋‚˜ ์•„ํ‚คํ…์ฒ˜๋ฅผ ๋”ฐ๋ฅด์ง€ ์•Š๋Š” ๋ ˆ๊ฑฐ์‹œ ์‹œ์Šคํ…œ์ด ํฌํ•จ๋ผ ์žˆ๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

์ด๋Ÿฐ ๊ธฐ์—…์˜ IT ๋ฆฌ๋”๋Š” ๋…ธํ›„ ๊ธฐ์ˆ ์„ ๋‹จ๊ณ„์ ์œผ๋กœ ํ‡ด์—ญ์‹œํ‚ค๋Š” ๊ณ„ํš์„ ์„ธ์šฐ๊ณ , IT ํˆฌ์ž๊ฐ€ ๊ฐ€๋Šฅํ•œ ํ•œ ์ตœ์‹  ์ƒํƒœ๋ฅผ ์œ ์ง€ํ•˜๋„๋ก ์†”๋ฃจ์…˜ ์—…์ฒด์˜ ์ฑ…์ž„์„ ๋ช…ํ™•ํžˆ ํ•˜๋Š” ์„œ๋น„์Šค ๊ณ„์•ฝ์„ ์ฒด๊ฒฐํ•ด์•ผ ํ•œ๋‹ค. ์œˆ์Šคํ„ด์€ ๋งŽ์€ ์†”๋ฃจ์…˜ ์—…์ฒด๊ฐ€ ์‹ ์ œํ’ˆ์„ ๋‚ด๋†“์œผ๋ฉด์„œ ๊ธฐ์กด ์ œํ’ˆ ์ง€์›์„ ๋„ˆ๋ฌด ์‰ฝ๊ฒŒ ์ค‘๋‹จํ•œ๋‹ค๊ณ  ์ง€์ ํ–ˆ๋‹ค.

์œˆ์Šคํ„ด์€ โ€œ์—…๊ทธ๋ ˆ์ด๋“œ๋ฅผ ํ•˜์ง€ ์•Š์„ ๊ณ„ํš์ด๋ผ๋ฉด ๋ ˆ๊ฑฐ์‹œ ์ง€์› ๋น„์šฉ์„ ๋ฉด๋ฐ€ํžˆ ๋”ฐ์ ธ ๋ณด๊ณ , ์—…๊ทธ๋ ˆ์ด๋“œํ•  ์ˆ˜ ์—†๋‹ค๋ฉด ์–ด๋–ป๊ฒŒ ๊ฒฉ๋ฆฌํ•  ๊ฒƒ์ธ์ง€์— ๋Œ€ํ•œ ๋‹ต์„ ์ค€๋น„ํ•ด์•ผ ํ•œ๋‹คโ€๋ผ๋ฉฐ, โ€œ์—…๊ทธ๋ ˆ์ด๋“œ๊ฐ€ ๋ถˆ๊ฐ€๋Šฅํ•  ๊ฒฝ์šฐ ์œ„ํ—˜์„ ์˜ฎ๊ธฐ๊ธฐ ์œ„ํ•œ ์ด๋ฅธ๋ฐ” โ€˜๋ฌด๋ค ๊ฒฉ๋ฆฌ ์ „๋žต(graveyard segmentation strategy)โ€™์„ ์–ด๋–ป๊ฒŒ ์„ค๊ณ„ํ• ์ง€๋„ ๊ณ ๋ฏผํ•ด์•ผ ํ•œ๋‹คโ€๋ผ๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค. ๋˜ โ€œ์†”๋ฃจ์…˜ ์—…์ฒด ์‹ค์‚ฌ ๊ณผ์ •์—์„œ ์ด๋Ÿฐ ๋…ผ์˜๊ฐ€ ๋น ์ง€๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋งŽ๊ณ , ๊ทธ๋Ÿฌ๋‹ค ๋ฌธ์ œ๊ฐ€ ํ„ฐ์ง€๋ฉด ์กฐ์ง์ด ๋’ค๋Šฆ๊ฒŒ ๋†€๋ผ๊ฒŒ ๋œ๋‹คโ€๋ผ๊ณ  ๋ง๋ถ™์˜€๋‹ค.

๊ทธ๋ ‡๋‹ค๊ณ  CIO๊ฐ€ ๋ ˆ๊ฑฐ์‹œ IT ์ „๋ฌธ์„ฑ์„ ์Œ“๋Š” ๋ฐฉํ–ฅ์œผ๋กœ ์ปค๋ฆฌ์–ด๋ฅผ ์„ค๊ณ„ํ•˜๋Š” ๊ฒƒ์€ ํ”ผํ•ด์•ผ ํ•œ๋‹ค. ์œˆ์Šคํ„ด์€ โ€œ์†Œํ”„ํŠธ์›จ์–ด๋‚˜ ๊ตฌ์ถ• ๋น„์šฉ์„ ์ถฉ๋ถ„ํžˆ ์ƒ๊ฐํ•˜์ง€ ๋ชปํ–ˆ๋‹ค๋ฉด, ์•ž์œผ๋กœ ๋„์ž…ํ•˜๋Š” ๋ชจ๋“  ์‹ ๊ทœ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์—๋Š” ์ตœ์‹  ์ปดํฌ๋„ŒํŠธ๋ฅผ ์‚ฌ์šฉํ•˜๊ฒ ๋‹ค๊ณ  ์Šค์Šค๋กœ ๋‹ค์งํ•ด์•ผ ํ•œ๋‹คโ€๋ผ๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค.
dl-ciokorea@foundryco.com

IT leaders turn to third-party providers to manage tech debt

4 December 2025 at 05:01

As tech debt threatens to cripple many IT organizations, a huge number of CIOs have turned to third-party service providers to maintain or upgrade legacy software and systems, according to a new survey.

A full 95% of IT leaders are now using outside service providers to modernize legacy IT and reduce tech debt, according to a survey by MSP Ensono.

The push is in part due to the cost of legacy IT, with nearly half of those surveyed saying they paid more in the past year to maintain older IT systems than they had budgeted. More importantly, dealing with legacy applications and infrastructure is holding IT organizations back, as nearly nine in 10 IT leaders say legacy maintenance has hampered their AI modernization plans.

โ€œMaintaining legacy systems is really slowing down modernization efforts,โ€ says Tim Beerman, Ensonoโ€™s CTO. โ€œItโ€™s the typical innovatorโ€™s dilemma โ€” theyโ€™re focusing on outdated systems and how to address them.โ€

In some cases, CIOs have turned to service providers to manage legacy systems, but in other cases, they have looked to outside IT teams to retire tech debt and modernize software and systems, Beerman says. One reason theyโ€™re turning to outside service providers is an aging employee base, with internal experts in legacy systems retiring and taking their knowledge with them, he adds.

โ€œNot very many people are able to do it themselves,โ€ Beerman says. โ€œYou have maturing workforces and people moving out of the workforce, and you need to go find expertise in areas where you canโ€™t hire that talent.โ€

While the MSP model has been around for decades, the move to using it to manage tech debt appears to be a growing trend as organizations look to clear up budget and find time to deploy AI, he adds.

โ€œIf you look at the advent of lot of new technology, especially AI, thatโ€™s moving much faster, and clients are looking for help,โ€ Beerman says. โ€œOn one side, you have this legacy problem that they need to manage and maintain, and then you have technology moving at a pace that it hasnโ€™t moved in years.โ€

Outsourcing risk

Ryan Leirvik, CEO at cybersecurity services firm Neuvik, also sees a trend toward using service providers to manage legacy IT. He sees several advantages, including matching the right experts to legacy systems, but CIOs may also use MSPs to manage their risk, he says.

โ€œOf the many advantages, one primary advantage oftenย not mentioned is shifting the exploitation or service interruption risk to the vendor,โ€ he adds. โ€œIn an environment where vulnerability discovery, patching, and overall maintenance is an ongoing and expensive effort, the risk of getting it wrong typically sits with the vendor in charge.โ€

The number of IT leaders in the survey who overspent their legacy IT maintenance budgets also doesnโ€™t surprise Leirvik, a former chief of staff and associate director of cyber at the US Department of Defense.

Many organizations have a talent mismatch between the IT infrastructure they have and the one they need to move to, he says. In addition, the ongoing maintenance of legacy software and systems often costs more than anticipated, he adds.

โ€œThereโ€™s this huge maintenance tail that we werenโ€™t expecting because the initial price point was one cost and the maintenance is 1X,โ€ Leirvik says.

To get out of the legacy maintenance trap, IT leaders need foresight and discipline to choose the right third-party provider, he adds. โ€œTake the long-term view โ€” make sure the five-year plan lines up with this particular vendor,โ€ he says. โ€œDo your goals as an organization match up with where theyโ€™re going to help you out?โ€

Paying twice

While some IT leaders have turned to third-party vendors to update legacy systems, a recently released report from ITSM and customer-service software vendor Freshworks raises questions about the efficiency of modernization efforts.

More than three-quarters of those surveyed by Freshworks say software implementations take longer than expected, with two-thirds of those projects exceeding expected budgets.

Third-party providers may not solve the problems, says Ashwin Ballal, Freshworksโ€™ CIO.

โ€œLegacy systems have become so complex that companies are increasingly turning to third-party vendors and consultants for help, but the problem is that, more often than not, organizations are trading one subpar legacy system for another,โ€ he says. โ€œAdding vendors and consultants often compounds the problem, bringing in new layers of complexity rather than resolving the old ones.โ€

The solution isnโ€™t adding more vendors, but new technology that works out of the box, Ballal adds.

โ€œIn theory, third-party providers bring expertise and speed,โ€ he says. โ€œIn practice, organizations often find themselves paying for things twice โ€” once for complex technology, and then again for consultants to make it work.โ€

Third-party vendors unavoidable

Other IT leaders see some third-party support as nearly inevitable. Whether itโ€™s updating old code, moving workloads to the cloud, adopting SaaS tools, or improving cybersecurity, most organizations now need outside assistance, says Adam Winston, field CTO and CISO at cybersecurity vendor WatchGuard Technologies.

A buildup of legacy systems, including outdated remote-access tools and VPNs, can crush organizations with tech debt, he adds. Many organizations havenโ€™t yet fully modernized to the cloud or to SaaS tools, and they will turn to outside providers when the time comes, he says.

โ€œMost companies donโ€™t build and design and manage their own apps, and thatโ€™s where all that tech debt basically is sitting, and they are in some hybrid IT design,โ€ he says. โ€œThey may be still sitting in an era dating back to co-location and on-premise, and that almost always includes legacy servers, legacy networks, legacy systems that arenโ€™t really following a modern design or architecture.โ€

Winston advises IT leaders to create plans to retire outdated technology and to negotiate service contracts that lean on vendors to keep IT purchases as up to date as possible. Too many vendors are quick to drop support for older products when new ones come out, he suggests.

โ€œIf youโ€™re not going to upgrade, do the math on that legacy support and say, โ€˜If we canโ€™t upgrade that, how are we going to isolate it?โ€™โ€ he says. โ€œโ€˜What is our graveyard segmentation strategy to move the risk in the event that this canโ€™t be upgraded?โ€™ The vendor due diligence leaves a lot of this stuff on the table, and then people seem to get surprised.โ€

CIOs should avoid specializing in legacy IT, he adds. โ€œIf you canโ€™t amortize the cost of the software or the build, promise yourself that every new application thatโ€™s coming into the system is going to use the latest component,โ€ Winston says.

โŒ
โŒ