Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Verizon Business Offers IT and Security Tips to Guide Clients through Merger Integrations

Verizon Business is offering five tips to assist businesses in building a successful framework for bringing together and securing IT systems.
  • 13 October, 2009 13:34

<p>Consulting Services Available to Support Customers Through Often Complex, Challenging IT Transitions</p>
<p>SYDNEY, Australia – 13 October 2009 – Among the many complex issues driven by merger and acquisition (M&amp;A) activity is the need for IT leaders to meld disparate systems and processes. A failure to effectively assess and devise a strategic plan to securely combine IT systems can lead to tremendous trouble and expense at a critical time for the acquiring company.</p>
<p>With this in mind, Verizon Business is offering five tips to assist businesses in building a successful framework for bringing together and securing IT systems.</p>
<p>1) Align IT and security integration with business intent. Oftentimes, IT and security managers do not take the necessary time, or are not given sufficient opportunity, to fully understand the business strategy behind a merger or acquisition. As such, they are tempted to make integration decisions based on IT drivers alone, rather than considering the accompanying business objectives as part of the greater picture.</p>
<p>IT leaders should make sure they understand how the business strategy aligns with the IT and security integration, so that the solution chosen is optimal for the business overall.</p>
<p>2) Communicate and plan effectively. Well-planned and executed integration activities and strong communications plans are essential to a successful merger or acquisition. This is true for any part of the organisation going through changes, including IT.</p>
<p>There may be significant turmoil and uncertainty among employees of an acquired organisation. IT executives should communicate information to their employees in a timely, easy-to-understand manner to stave off productivity loss and malintent due to speculation and fear.</p>
<p>It is equally important for company leaders to define a realistic roadmap for critical IT infrastructure and plan for additional load on the workforce during the transition, and to communicate this information to employees effectively.</p>
<p>3) Inventory all existing and incoming IT assets. First, ensure that the company has a strong visibility into and understanding of its own IT assets. This provides the basis for a successful IT integration. When acquiring another company, take a thorough inventory of the acquired company’s IT assets. Acquiring companies often do not have a full understanding of the IT assets they are acquiring, which opens up the company to increased risk.</p>
<p>This is more common than an IT manager might suspect. Sixty-six percent of all breaches investigated by Verizon Business in 2008 involved data that a company did not even know was on its systems. Be aware that while you are gaining IT assets, you may also be increasing your risk.</p>
<p>4) Understand the technical and reputational risks. As part of due diligence, understand the viability, scalability, flexibility, financial position, regulatory compliance, market share and service qualifications of major suppliers of services, hardware and software. This includes a thorough review of third-party organisations—such as vendors, customers and partners—that connect to the acquired business via its extended enterprise. Failure to review the company’s third-party relationships can impact security compliance and the initiatives surrounding them.</p>
<p>5) Assess IT maturity. Finally, as part of post-merger activity, determine the maturity of the acquired company’s IT assets. Identify the company’s compliance with industry regulations. Learn about the company’s disaster and recovery procedures. Review all essential IT practices concerning capacity management, change management and approval and problem management. An awareness of the company’s youth or maturity from an IT perspective can help the acquiring organisation decide where it has incoming security strengths and weaknesses.</p>
<p>“As a leader in security and IT services, Verizon Business is poised to help clients make the most of a merger or acquisition, especially with M&amp;A activity heating up as the economy continues to improve,” said Kerry Bailey, senior vice president of global services, Verizon Business. “Through our client engagements, we have learned that these five simple tips can help customers avoid common IT and security pitfalls associated with M&amp;A activity. This allows a business to come out of an acquisition faster and stronger.”</p>
<p>Verizon Business Consulting Services Ease the IT Transition
Verizon Business offers a full range of security and IT consulting services aimed at helping organisations manage the M&amp;A process as part of a robust global portfolio of expert professional services. Backed by a team of more than 2,700 consultants in 30 countries, Verizon Business offers consulting services that help customers map out their security and IT requirements and calculate risk; identify which IT assets, data and applications are most critical to the business; and design and implement plans to securely consolidate the IT infrastructure and network.</p>
<p>About Verizon Business
Verizon Business, a unit of Verizon Communications (NYSE: VZ), is a global leader in communications and IT solutions. We combine professional expertise with the world’s most connected IP network to deliver award-winning communications, IT, information security and network solutions. We securely connect today’s extended enterprises of widespread and mobile customers, partners, suppliers and employees — enabling them to increase productivity and efficiency and help preserve the environment. Many of the world’s largest businesses and governments — including 96 percent of the Fortune 1000 and thousands of government agencies and educational institutions — rely on our professional and managed services and network technologies to accelerate their business. Find out more at</p>
<p>Media Contact:</p>
<p>Gabriel Wong</p>
<p>Max Australia</p>
<p>+ 61 2 9954 3492</p>

Most Popular

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Media Release

More media release