This chapter is from the book
1.9 Dealing with Mergers and Acquisitions
- If mergers and acquisitions will be frequent, make arrangements to get information as early as possible, even if this means
that designated people will have information that prevents them from being able to trade stock for certain windows of time.
- Some mergers require instant connectivity to the new business unit. Others are forbidden from having full connectivity for
a month or so until certain papers are signed. In the first case, set expectations that this will not be possible without
some prior warning (see previous item). In the latter case, you have some breathing room, but act quickly!
- If you are the chief executive officer (CEO), you should involve your chief information officer (CIO) before the merger is
- If you are an SA, try to find out who at the other company has the authority to make the big decisions.
- Establish clear, final decision processes.
- Have one designated go-to lead per company.
- Start a dialogue with the SAs at the other company. Understand their support structure, service levels, network architecture,
security model, and policies. Determine what the new model is going to look like.
- Have at least one initial face-to-face meeting with the SAs at the other company. It’s easier to get angry at someone you
- Move on to technical details. Are there namespace conflicts? If so, determine how are you going to resolve them—Chapter 8.
- Adopt the best processes of the two companies; don’t blindly select the processes of the bigger company.
- Be sensitive to cultural differences between the two groups. Diverse opinions can be a good thing if people can learn to respect one another—Sections 126.96.36.199 and 35.1.5.
- Make sure that both SA teams have a high-level overview diagram of both networks, as well as a detailed map of each site’s
local area network (LAN)—Chapter 7.
- Determine what the new network architecture should look like—Chapter 7. How will the two networks be connected? Are some remote offices likely to merge? What does the new security model or security
perimeter look like?—Chapter 11.
- Ask senior management about corporate-identity issues, such as account names, email address format, and domain name. Do the
corporate identities need to merge or stay separate? What implications does this have on the email infrastructure and Internet-facing
- Learn whether any customers or business partners of either company will be sensitive to the merger and/or want their intellectual
property protected from the other company—Chapter 7.
- Check router tables of both companies, and verify that the Internet Protocol (IP) address space in use doesn’t overlap. (This
is particularly a problem if you both use RFC 1918 address space [Lear et al. 1994, Rekhler et al. 1996].)
- Consider putting a firewall between the two companies until both have compatible security policies—Chapter 11.