Creating an ERP landing zone
Merged companies need the ability to report on critical financial and operational data soon after the deal close. This is especially challenging for serial acquirers that are tasked with multiple and often concurrent M&A technology integrations.
In EY-Parthenon experience, this pain point can be addressed with strategies such as a two-tier ERP approach that creates a “landing zone” ERP for newly acquired or non-integrated acquisitions. This allows the enterprise system to run the core business without disruption, along with multiple core ERPs. The acquired processes can be harmonized separately. This also creates additional visibility into critical data to drive combined business performance.
ERP case study
To reduce spending and simplify their exit strategy, private equity investors often use partial M&A technology integration. When they do invest in technology transformation with an acquisition, it is frequently to fulfill specific commercial or operational objectives or limit risk.
One private equity buyer that acquired a global distributor leveraged a two-tier ERP approach, combined with data orchestration tools, to limit cost and complexity while providing new insights into operations and profitability. The target firm, the portfolio company and several satellite entities all relied on heavily customized, on-premises ERP solutions tailored to their specific regulatory and operational environments. On top of the ERP solution, the purchaser opted to use data orchestration to roll up financial reporting and create new insights into the operation and profitability of each regional satellite and its products and customers.
Through this rapid and partial technology integration strategy, EY analysis indicates the purchaser reduced ERP implementation costs by more than $1m and reduced ERP future-state implementation time by multiple months. In addition, the process limited business interruption and allowed the acquirer to redeploy savings elsewhere.
Assuring seamless data strategy and orchestration
Data insights are particularly critical during M&A IT integration to measure progress against key performance indicator targets and monitor risks. Many business acquisition strategies assume the ability to share data seamlessly across an enterprise, but that is often not what happens. Historically, companies have tried to quickly force enterprise-wide data into a single repository, an aggressive goal that is difficult to achieve, costly and time-consuming.
New cloud-based technologies allow data “orchestration” that takes information from multiple sources to assess and securely report for the business. This increasingly popular approach can help acquirers meet regulatory data sharing and governance compliance requirements.
Helping the end-user with software, M&A cybersecurity exercises
One of the first and most common M&A IT integration requests from an acquirer is to help improve end-user computing — the ability to quickly enable interorganizational communication and collaboration. Major software platforms enable advanced methods for newly integrated employees to remain on their email, chat, and other communication platforms post-merger but security measures must be in place. During the integration, security phishing and other exercises can help train employees about cybercriminals’ techniques in an M&A transition. Testing of critical security controls should be in place during the transition period.
Employing Zero Trust network protection
Modern technologies that leverage cloud-based Zero Trust cybersecurity frameworks restrict access and can be deployed rapidly to bolster M&A cybersecurity. Zero Trust network access (ZTNA) allows acquired companies to remain on their own platforms with segmented networks protecting sensitive systems and data, applications, and content. They are the antithesis of what was the typical integration approach — a full transition to the acquirer’s networks, domains and security procedures. However, that kind of broad access can open vectors for cybercriminals, increase the risk of inappropriate access by employees and create additional technology cost and complexity.
Zero Trust frameworks also are a significant asset during transition service agreement (TSA) periods; because Zero Trust access can help prevent unauthorized access or disclosure of sensitive data or data that is not part of the transaction.
Zero Trust case study
One large health insurance provider, a serial acquirer, reduced technology integration costs by 50% by leveraging a partial integration strategy with modern technologies. The target and acquirer could not converge IT systems on the deal timeline due to the complexity of the IT integration and the short timeline to close. It was not practical for employees to use two laptops or have multiple sign-on accounts. An EY team supported the deployment of a Zero Trust platform of services to connect networks, harden security and improve compliance standards across the companies. In addition to improving cyber defenses, partial integration between identity providers for sign-on access enhanced the end-user experience. Overall, the effort directly reduced technology costs so the buyer could focus spending on transformational initiatives.