Securing Cloud Networks

Securing Cloud Networks

Continuing our blog series on Azure Secure Cloud Migration, we will discuss Azure’s take on network control and how scalability and manageability play a role in designing a secure and functional environment. See our previous post on Talking to the Cloud for insights on architecting an Azure network. Network Access Control Network Security Groups (NSGs) are a native Azure feature to apply...

Read More
How to Talk to the Cloud

How to Talk to the Cloud

Picking up from last week’s post on Preparing to Migrating to a Secure Cloud, the first part of our Azure Secure Cloud Migration blog series, we’ll jump right in to how and why the client’s Azure network was architected. Connectivity and traffic flow between Azure, on-premises locations, and even business partners are things to consider immediately, as they impact the overall structure of the...

Read More
Common Misconceptions around the Payment Card Industry Data Security Standard (PCI DSS)

Common Misconceptions around the Payment Card Industry Data Security Standard (PCI DSS)

In a recent post, we discussed what PCI DSS is, why it matters, and the release of the latest version, including a summary of the changes and the impact of each. See “What PCI DSS version 3.2 means for you” for more information. In 2016, West Monroe Partners has conducted over 140 IT diligences on behalf of private equity firms and strategic buyers across a number of industries as...

Read More
Preparing to Migrate to a Secure Cloud

Preparing to Migrate to a Secure Cloud

West Monroe Partners recently completed a nine-month effort to help a client migrate a large custom SaaS platform with regulatory requirements (PCI DSS v3.1, SSAE16). The engagement involved migrating on-premises systems to Microsoft Azure’s IaaS platform, and in the coming weeks, we’ll be detailing our methodology for designing and securing that environment in a series of blog...

Read More
Partly Cloudy with a Chance of Compliance

Partly Cloudy with a Chance of Compliance

As advisors to our 100+ private equity clients who use M&A activity to provide positive returns to their investors, WMP helps establish platforms, processes, and technology that can enable rapid EBITDA growth. Within the world of M&A, carve-outs and divestitures are some of the most complex situations when it comes to quickly getting the newly acquired business on the right track...

Read More
Fighting Diligence Fatigue

Fighting Diligence Fatigue

You’re preparing for a transaction and advisory teams have descended upon you. For months, you’ve been answering the same questions and you’ve gotten tired of hearing yourself talk. Here’s how to prepare for a stream of diligences and fight the fatigue. The world of mergers and acquisitions (M&A) can be thrilling with promises of potential.…

Read More

The Good, the Bad, and the Ugly Series – Part 3

Part 3: Secret Sauce Tasting Notes: How to approach a proprietary system critical to operations It is one of the most overlooked aspects of deals: you have fine-tuned the valuation model but did not conduct sufficient diligence on the target’s applications environment to determine if it could support growth plans. Eighteen months into the holding period, the portfolio company requires a...

Read More

The Good, the Bad, and the Ugly Series – Part 1

Part 1: Protecting your asset IT diligence is commonly thought of as a confirmatory exercise prior to closing a deal in order to assuage concerns of the lenders. In today’s world however, the increased importance of technology to enable healthy business performance makes IT diligence all the more significant. Raise your hand if you’ve ever engaged a provider who missed the mark on IT diligence...

Read More

Role of Identity Management – Removing the Friction

With what seems like a daily stream of news related to data breaches these days, why is identity and access management (IAM) still: Not moved to the top of every CIO/CTO roadmap Only talked about as just the management of an identity and not also the governance of that identity Not a standard swim lane with every project that requires any type of authentication to any service (on-premises or...

Read More

Negotiation is as Simple as Signing a Contract, Right?

A software selection process can be intimidating, time consuming, and frustrating.  Where do you start?  What are the rules of engagement?  What if the software vendor isn’t responding in a timely manner?  What if there isn’t internal alignment between IT and the business?  These are just some of the questions that are likely to arise during a software selection process.…

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons