Premium Content

Access "Perspectives: Mergers and acquisitions open security risks"

Published: 15 Oct 2012

More than once I've had the shock of arriving at work to learn that a newly acquired company was connected to the network the prior evening. Instantly, the mind starts racing: Where did it get connected? How was it connected? What access was granted and to whom? The overarching concern is how much additional risk was just created for both businesses, and it's a concern we all share once a merger or acquisition takes place. In my experience with mergers and acquisitions--and I've had plenty--the solution has been to connect the new business directly into the core network as quickly as possible. But, that's the wrong solution. Such swiftness prevents the comprehensive security assessment needed to understand what risks are being taken on with the addition of this new network. Standardization of hardware and consolidation of processes also are often left to be completed post-connection. That's dangerous, as the known risk in the business is now compounded with the additional unknown risks of the other business. The challenge, then, is how to integrate the two ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free