For many law firms, upgrading core financial systems has historically been about new features: better billing workflows, smoother user experiences, and incremental productivity gains. The latest 3E 3.2.0 on-prem release certainly delivers those enhancements—from more granular 3E Proforma security to smarter notifications and faster write-offs.
But as the Elite team emphasized in a recent 3E 3.2 On-Prem webinar, the most important story behind this release isn’t just usability. It’s security.
To hear the full discussion from the product and security leaders, watch the webinar recording here.
As underlying Microsoft platforms and frameworks reach end of life, staying on older 3E versions doesn’t just mean missing out on new features. It means taking on growing technical, operational, and security risk in your on-prem deployment—risk that directly affects your firm’s financial data. Understanding these risks—and the options available to address them—is now essential for protecting your financial systems.
From Features to Risk: Why Security Is Now the Main Story
While the webinar included an overview of new enhancements in 3E 3.2.0—such as additional configurability within Proforma, improved delegation options, and a series of user experience refinements—the most meaningful takeaway wasn’t the feature set itself. The discussion ultimately centered on something far more critical for firms running 3E on-prem: the security and support implications of remaining on aging technologies and what firms should be doing now to protect their financial systems. Ray Espinoza (Elite Security) and Joseph Cotrono (Engineering) walked through what’s happening underneath the application itself—in the Microsoft platforms and frameworks that 3E relies on. This is where the real risk emerges. For firms on older on-prem versions such as 2.8 and 2.9, or even some 3.0 builds, the Microsoft technologies they depend on are approaching or are already in end-of-life or extended support status. For example:- SQL Server 2019 has moved from mainstream support into extended support
- Certain .NET Framework and .NET 6 versions have fallen out of active support
- Microsoft is moving to a faster, more active release cadence, meaning that supported versions age out more quickly than before
The Hidden Cost of Staying Put
On paper, staying on your current version might feel like the least disruptive option. In reality, it carries hidden costs and risks:- End-of-life technologies: Once a Microsoft platform moves out of mainstream support, feature and non-security fixes stop. With extended support, even security updates may require separate paid programs and specific eligibility.
- No new security patches: For 2.8 and 2.9, Elite can no longer provide new security patches. If new vulnerabilities are discovered in components used by those versions, your firm will not receive patches.
- Compliance exposure: Running critical financial systems on unsupported platforms can raise questions during audits and regulatory reviews, especially where client or financial data is involved
- Operational drag: Aging infrastructure and software become harder to support. Replacement parts may be scarce, and modern security tools may not fully support older operating systems.
Three Paths to Protect Your Financials
There are three options, each with different timelines, commitments, and benefits. If you’d like to hear the full discussion and Q&A around these options, watch the webinar recording.Option 1: Upgrade to 3E 3.2.0 On-Prem
The most direct path is to upgrade from your current on-prem version to 3E 3.2.0. This path:- Keeps you on a fully supported product version
- Aligns you with current Microsoft platform support, including Windows Server 2019/2022 and SQL Server 2019/2022
- Gives you access to the latest functional enhancements (such as the new Proforma security options, co-owners, write-off improvements, and UI 49 enhancements)
Option 2: Opt Into the Extended Security Update (ESU) Program
For firms that can’t move to 3.2 right away but still want to maintain security coverage, Elite offers an Extended Security Update (ESU) program. Key points for this path:- Eligibility: ESU is available only for 3E versions 3.0.3.15 and above. If you’re on an earlier 3.0 build—or on 2.8 or 2.9—you’ll need to upgrade at least to 3.0.3.15 to participate.
- What you get:
- Quarterly security scans of the relevant 3E builds
- Patching of any critical and high-severity vulnerabilities identified (based on CVSS scores) in the third-party libraries used by 3E
- What ESU does not include:
- No new feature enhancements
- No compliance or regulatory updates outside of security vulnerabilities
- How patches are delivered:
- Security remediations are included in new builds (hotfixes) of 3E; customers move to the latest build rather than applying patches manually
- ESU hotfixes are applied by Elite Support and are not available for self-install
Option 3: Move to 3E in the Cloud
The last option is to migrate to 3E in the cloud, where Elite assumes much of the operational and security burden that on-prem customers currently shoulder. In the cloud model, you get:- Managed upgrades: Elite handles upgrades and patching, so you’re not planning multi-year upgrade projects or juggling end-of-life frameworks
- Security and compliance frameworks: The cloud environment is supported by recognized frameworks such as SOC 2 Type 2 and ISO 27001, along with other controls designed specifically for protecting client and financial data
- Backups and availability: Elite is responsible for ensuring your data is appropriately backed up and available to the application
- Faster, incremental releases:
- Cloud has quarterly releases, with smaller, more manageable sets of changes
- You get a preview environment for about a month before changes roll into production, giving you time to validate customizations and processes
- Extensibility and integration: Public APIs and integrations allow firms to connect to third-party applications, customize solutions, and optimize both back-office and front-office operations
Before You Choose: Reassess Your On-Prem Deployment
Whether you decide to upgrade, join ESU, or move to cloud, one thing is clear: You must reassess your current deployment. Ray outlines a practical, security-focused lens that every firm should apply before making a move—or even if you decide to stay put a bit longer.1. Inventory Your Infrastructure and Hardware
Start with the basics:- What hardware is currently supporting your 3E on-prem deployment?
- Are those servers and components still fully supported by your vendors?
- Can you obtain replacement parts if something fails?
2. Assess Patch Status and Software Supportability
Next, look at the software stack:- What versions of Windows Server, SQL Server, and .NET are you running?
- Have any of those components moved from mainstream to extended support?
- Are you enrolled in any required vendor ESU programs (like Microsoft’s) to continue receiving fixes?
3. Revisit Backup and Recovery
Your 3E data is the lifeblood of your firm. That makes backup and recovery non-negotiable:- Are your backup and recovery processes operational, tested, and documented?
- Will they still work reliably if you change versions, move to ESU, or adjust your infrastructure?
- How often do you test restores, not just backups?
4. Evaluate Your Security Controls—Especially on Aging Platforms
Modern security solutions often have minimum supported operating system versions. For example, your endpoint security or other controls might not fully support older OS releases. Ask:- Are all your current security tools fully supported on the platforms you’re running?
- Have you had to implement special workarounds or “gates” to protect older technologies?
5. Continue Scanning and Patching Vulnerabilities
Finally, keep your vulnerability management processes sharp:- Are you regularly scanning your environment for system and software vulnerabilities?
- Do you have a process to patch or mitigate those findings in a timely manner?
- If you’re relying on ESU, do you have mitigating controls in place between quarterly updates?
What About Customizations and Cloud?
A common concern in the Q&A portion of the webinar was: “If I migrate to the cloud, can my current customizations and templates come with me?” The answer, based on the session, is nuanced:- Templates: Templates are generally intended to be configured and customized; they are not the same as custom code. In most cases, templates themselves are fine to bring forward.
- Customizations: Some customizations can move to the cloud, others may need to be redesigned. Elite provides tools like the CAT Scan framework to analyze which customizations are “cloud ready” and which may need changes or could be replaced by standard product functionality.
- Ongoing troubleshooting: In the cloud, you still have a preview environment to test and troubleshoot your customizations. Partners can continue to support you, and your internal teams can validate behavior before changes go live.
Bringing It All Together
The 3E 3.2.0 on-prem release delivers valuable usability and configuration improvements. But the real message of the webinar is strategic:- Older on-prem versions are increasingly risky as underlying platforms move into extended support or out of support altogether
- Firms have three concrete options: upgrade to 3.2, opt into ESU as a security bridge, or move to 3E in the cloud and shift much of the operational and security burden to Elite
- Regardless of the path you choose, you should reassess your deployment—from hardware and patch status to backup, security controls, and vulnerability management