Business Express is an online portal that covers the latest developments in the world of business and finance. From startups and entrepreneurship to mergers and acquisitions, Business Express provides reporting on the stories that matter most to business leaders and decision-makers.The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.
How zero trust can accelerate time to value in mergers and acquisitions
Stephen Singh, Global Vice President M&A, Zscaler
The success of mergers and acquisitions (M&A) hinges on many factors, key amongst them successful integrations. In this, merging IT infrastructures is often a challenge but it is one that must be overcome – failing to achieve a smooth transition can jeopardise the early realisation of M&A value. Add to this the jeopardy of the as-yet-unknown acquired IT estate falling victim to a breach, and the stakes couldn’t be higher. However now there is a simpler, more effective path to M&A IT integration through cloud security utilising zero trust principles.
Why M&A tech integrations struggle
IT environments have become steadily more complex. Hybrid architectures, an increasingly remote workforce and ever evolving cyberthreats all add to the challenge of swift, effective M&A IT integrations, not to mention the delivery of synergy benefits. It is not surprising therefore that 70 per cent of technology integrations fail in the beginning, not the end according to Bain & Company.
To stand the best chance of a successful outcome it is important to plan integrations as early on as possible in the M&A process. Unfortunately, that often doesn’t happen: IT get involved late on because of sensitivities and confidentialities during M&A dealmaking and closing. That said, implementing even the best laid IT integration plan can still come up against problems.
Network architectures are complex; they have often been built up over time with legacy infrastructure co-existing alongside modern networks. In a merger of two IT environments, these complex architectures must be consolidated and protected with security rules and systems correctly applied. User profiles must be up-and-running through any transition as quickly as possible for day-to-day work to continue.
The business impact of lengthy or failed IT mergers
Disruption during IT transitions impacts employee productivity and therefore the delivery of value from the M&A. The alternative though is to maintain separate IT estates but that is fraught with risk and negates the potential cost and efficiency savings from M&A synergies.
That can be catastrophic for M&A value capture. It is pertinent to note that, according to PwC, 83 per cent of successful deal makers realise their synergy expectations, while only 47 per cent of unsuccessful ones do.
There is significant risk in M&A. If an acquired company brings with it security failings or challenges, those threats and vulnerabilities become the responsibility of the unwitting acquirer. Due diligence is therefore essential to mitigate the risk of ‘buying a breach’ with the reputational, as well as remediation costs, that can mean.
Where M&A IT integrations go wrong
Don't miss out on any breaking news or insightful opinions!
Subscribe to our free newsletter and stay updated on the go!
By submitting this form, you are consenting to receive marketing emails from: . You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email. Emails are serviced by Constant Contact
Despite the amount of upfront planning, investment, and effort involved in M&A IT integrations, the results often deliver below expectations. They may fail to mitigate risk, take an unacceptably long time to deliver, miss the opportunity to synergise, or result in a poor user experience. They may even come up short on all counts.
It doesn’t help matters that many of the activities involved happen in a linear fashion, rather than running concurrently.
Resource is often a stumbling block. M&A activities mean long hours for stretched IT teams, lengthy process creation and capacity issues trying to provide the acquiring and acquired company with cross-company connectivity.
The problem is that it is complex, time-consuming and can be error-prone to try and combine IT architectures and systems, root out redundant (potential security risk) infrastructure, provide everyone with the correct authenticated access and protect the whole environment.
How zero trust turns this around
‘Zero trust’ takes a different approach to security and access. Corporate network security has traditionally secured the perimeter, authenticating users as they access the network and keeping anyone on the outside, out. That’s no longer a feasible approach with an explosion in cloud-based services, applications, remote access and additional devices.
Zero trust protects users, devices and data rather than the corporate perimeter. It secures each access, rather than each network access, and it can do so without detriment to the user experience.
Taking a zero trust approach to M&A IT integrations can reduce the length of time involved in risk profiling and connectivity and access, and enable the majority of these activities to run at the same time.
Instead of secure access to the corporate network, users have secure connections to the applications and systems they access, wherever they are and however they are working. This makes for a consistent experience, without on/off network differentiation.
Due diligence and rigour are essential in all M&A deals to mitigate risk and maximise value. IT integrations have tended to be challenging, but a zero trust approach can turn this around to actually accelerate time to value. M&A should integrate only what is needed, adopting a zero trust secure access approach that gets users up-and-running quickly, delivers on synergy expectations and moves the combined business more rapidly to value realisation.
Join millions of others and stay up to date with the latest developments.
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.