Throughout my career, I have worked for organizations that have purchased and integrated 4 companies. The acquired companies ranged from an organization with revenues of less than $3 million per year to a publicly traded company with annualized revenues of almost $1 billion. While the acquisitions all carried their own set of challenges, they remain among the highlights of my career.
When I pictured corporate acquisitions, I always envisioned purchasing the next big startup or buying out your leading competitor. I didn’t realize that a majority of corporate acquisitions are an attempt to leverage existing infrastructure and shared services to turn a failing company into a profitable organization. When I was informed that my company was about to purchase another organization, I instantly realized I was going to be working with a lot of old hardware, disgruntled employees and vulnerable systems. Fortunately, I was able to leverage HoneyPoint to address several the aforementioned challenges.
Completing an acquisition can be overwhelming at times. It’s important to take a step back and look at systems from a bird’s-eye view. I always found it extremely helpful to deploy HoneyPoint Agent at the start of an acquisition. I worked diligently to create an Agent deployment that mimicked the infrastructure of the acquired company. This allowed me to have a centralized view of their network from one HoneyPoint console. On more than one occasion, HoneyPoint Agent helped me to identify infected machines on the network of a recently acquired company.
Having worked for a company that has been acquired on two separate occasions, I always empathize with the employees of an acquired organization. While it can be a scary time, it can also be looked at as an opportunity to demonstrate your talent to a new company. I have met several talented IT Professionals throughout the 4 acquisitions that I have had the privilege of completing. I was frequently amazed at their ability keep a critical infrastructure running on a nonexistent budget. Unfortunately, for every talented and cooperative professional, I have encountered a few disgruntled employees.
HoneyPoint has several great features that can help identify a disgruntled employee. For example, I was able to place documents throughout our network that would log an alert to my HoneyPoint console each time they were opened. This would have allowed me to easily identify any disgruntled employee that was searching a file server for confidential information. Deploying these trojanized documents throughout our network taught me a valuable lesson about HoneyPoint…it should be considered a good thing when a deployment does not generate any alerts. In this instance, it meant that I did not identify any employees that were digging through our file shares for confidential information.
Unfortunately, I have been a part of acquisitions where the IT staff of the acquired organization were not retained. While it was purely a business decision, the layoffs posed a serious risk of creating disgruntled employees. This could lead an employee of the acquired company to attempt to cause harm to systems owned and operated by the acquiring organization. During each acquisition, I deployed HoneyPoint Agents that mimicked the Infrastructure of my company. This allowed me to identify any instance of an individual attempting to scan systems that were owned by the parent organization. While I did not catch any individuals in the act, I was able to rest assured knowing that I had the capability to do so.
I highly recommend leveraging HoneyPoint during your next M&A. It will help you address several of the challenges that are associated with the M&A process. If you have any questions about HoneyPoint and how it can help your organization, please contact us at info <at> microsolved.com.