IT Due Diligence

Case Study

F500 Engineering and Construction Contractor

The buyer is consolidating smaller regional specialty engineering and construction firms to build scale and expand their market to include larger targets with multiple facilities. In alignment with the Client’s IT strategy to refresh all end-user devices and migrate and host all applications using Client standards, limited IT Due Diligence was conducted across Cyber Security, Data Center, Data and VoIP Networks, Servers, Storage, and Business and Collaborative Applications.

Challenge

    • Client IT staff was at capacity and not available for these unexpected opportunities.
    • Client required IT Due Diligence to be performed as quickly as possible to block rivals from bidding.
    • Limited data and documentation were available from the Target.
    • Target’s non-classified work for the DoD requires additional proof of cyber compliance and audits.
    • Maintain confidentiality of the assessment to avoid any impact to Target’s workforce and customer base.
    • Align Due Diligence scope and depth with Client Business and Technology strategies.
    • Utilize Client reporting, and Rough Order of Magnitude (ROM) investment estimate formats and media to seamlessly and efficiently integrate with the Clients Due Diligence Book.

Execution

    • Learn the Client’s business and technical strategies and timeframe requirements, and tailor the scope, depth, time, and cost of the engagement.
    • Focus on Cyber Security; eliminate End-user devices (desktops, laptops, tablets, smartphones), IT Organization, and Data Protection from the assessment scope.
    • Provide an early/interim report of Key Findings and Red Flags for a faster than normal Go/No-Go decision.
    • Gather and convey relevant engagement data to the Client Integration Readiness Planning team BEFORE closing to enable faster start of planning, placing of equipment orders, and sourcing of resources. 
    • Evaluate the impact of the Target’s migration to Client IT standards, hosting, and support, and recommend approaches to  mitigate key risks.

Client Outcomes

    • 5 additional acquisition opportunities were able to be evaluated by our client.
    • End user devices were not included in the scope, saving time and cost.
    • Client use of 3rd party resources performing the assessment was transparent to the Targets.
    • Delivered interim Findings and Red Flags reports per client specifications and media in 5 days, and full reports in 10 days.
    • IT ROM estimates were within 12% of Client investment model.
    • Available data was provided to enable start of pre-integration planning.