SlideShare a Scribd company logo
1 of 14
Download to read offline
Matt Tortora
Managing Director: Technology Services
BMI Mergers
P: 312.702.2611
E: mtortora@bmimergers.com
Identifying Code Risks in Software M&A
Introduction
➔ Most CEOs and founders in the
software space when thinking
about a potential exit focus on
table stakes metrics (ARR run rate,
churn, growth rate, etc…)
➔ There are often overlooked
components that are almost
always thoroughly examined
during the due diligence process.
One of these components is the
actual software code and
architecture.
www.bmimergers.com 1
Source Code Issues
There can be a significant risk that lies beneath
the surface from years and years’ worth of
development efforts and fast-tracked version
releases.
Risks around poorly written components of
source code and technical debt can create
significant issues. During the due diligence
process, acquirers will do a thorough technical
audit. Issues with how the software has been
written or the amount of technical debt that has
mounted can pose a real threat in the M&A
process.
www.bmimergers.com 2
Average time to complete
a 3rd party technical audit
is 2-4 weeks.
Technical Audit
The technical audit will typically focus on items that include:
www.bmimergers.com 3
Analysis of the software
architecture
3rd party service
integration analysis
Database design
Code release and
testing practices
Software code and
system maintainability
Open Source Code
Leveraging open-source software within a commercial software solution offers many
benefits. But conversely, it can come back to haunt software companies during an
M&A transaction.
60-70%
60-70%
The average amount of open-source
software in a company’s codebase
www.bmimergers.com 4
Open-source software presents complex licensing
conditions, security risks, and intellectual property
risks that a buyer could potentially inherit.
Acquirers must make an assessment of the potential
risks of the open-source code being used. If that
open source code is fraught with licensing issues,
and security risks it can be enough to cause them to
walk away.
Security & Vulnerability
The potential security risks posed by
open-source code dovetail into the
broader issue of security and
vulnerability. Software code with
significant vulnerabilities can end up
creating a significant liability for a buyer
post-acquisition.
Seasoned software acquirers will likely
want to run a third-party penetration test
(pentest) as part of their cybersecurity
due diligence on a software company.
www.bmimergers.com 5
Penetration Testing
A pentest will typically look for vulnerabilities and examine areas that include:
www.bmimergers.com 6
Encryption and
authentication
Code command and
injection
Configuration of
networks and devices
Likelihood of attacks and
potential impact
Interpreting Audit & Testing Outcomes
The third-party who executes the penetration test will deliver the report to both the
buyer and the seller for review.
www.bmimergers.com 7
Ninety-nine percent of the time
a senior technical resource at
both the buyer and seller will
be involved in the technical
due diligence process.
It’s incredibly important that
non-technical resources,
especially those who reside
with the buyer understand the
true implications of the findings
of a technical audit and
pentest.
The findings of a technical
audit or pentest can flag items
that show an issue. And while
these may seem like major
issues they are often fixable
and not as damning as they
initially appear to be.
Proper Preparation
For the vast majority of software companies eventually being
acquired is the end game. So knowing a rigorous due diligence
process that will include deep technical due diligence is next to
inevitable it’s important to be prepared.
www.bmimergers.com 8
Quality In > Qualify Out:
This goes without saying but hiring top-tier engineering talent and following
best practices for engineering a well-built product is a sure-fire way to avoid
issues down the road. This means avoiding or limiting the amount of
development work that is outsourced, and if you choose to outsource do so
with a great degree of caution and scrutiny.
www.bmimergers.com 9
Potential long-term implications of
open source code:
It’s unrealistic to assume that a sizeable portion of a commercial software
solution won’t be open source. But taking into account potential long-term
risks when selecting those open source components should be a high
priority. The risk factors that must be taken into consideration include;
security vulnerabilities, licensing compliance risks, and overall code quality.
www.bmimergers.com 10
Conduct periodic code audits and
pentests:
The nice thing about conducting periodic software code audits and
penetration testing is it ensures you’re developing a sound software solution
that is secure and will perform at a high level. All of which carry value when
it comes to keeping customers happy. And making this a regular practice
will naturally avoid any major issues when you get to a place where you’re
deep in due diligence with a potential acquirer.
www.bmimergers.com 11
Wrapping Up
The process of engaging with
potential acquirers and navigating all
of the twists and turns of the due
diligence process is time-intensive,
expensive, and emotionally
exhausting. The last thing a CEO or
founder wants is a scenario where
issues lying beneath the surface
derail an acquisition and lots of hard
work.
Understanding what lies ahead in the
due diligence process and being more
than adequately prepared will help
avoid an unfortunate outcome.
www.bmimergers.com 12
Matt Tortora
Managing Director -
Technology Services
BMI Mergers
E: mtortora@bmimergers.com
Contact Info
Web: bmimergers.com/techservices
Chicago:
125 South Wacker Dr., Suite 300
Chicago, IL 60606
312.702.2611
Philadelphia:
One Liberty Tower
1650 Market Street, Suite 3600
Philadelphia, PA 19103
215.240.7648
Tom Kerchner
Managing Director
BMI Mergers
E: tkerchner@bmimergers.com
For over twenty-five years, we have been
successfully engaged in the practice of buying,
selling and managing the business acquisition
process. Our professionals have been engaged in
transactions in a multitude of industries. They have
completed multi-million dollar deals, and they have
also successfully integrated businesses
post-merger. Whether your business is worth $5
million or $100 million, this experience is put to
work to achieve your desired result.
About BMI Mergers
Matt Tortora brings over fifteen years of business
ownership, sales leadership, and consulting
experience in both technology and professional
services. He has founded three companies and
held strategic leadership positions at growth stage
technology companies. Most notably, Matt was the
co-founder and CEO of a Chicago based software
company which he successfully grew and sold to a
strategic acquirer.
About The Author

More Related Content

What's hot

Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkChaitanya Bhatt
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)Vijilan IT Security solutions
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...at MicroFocus Italy ❖✔
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply ChainSFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply ChainSouth Tyrol Free Software Conference
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. ManufacturingIgnyte Assurance Platform
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSJohn Gilligan
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
GDPR: The Application Security Twist
GDPR: The Application Security TwistGDPR: The Application Security Twist
GDPR: The Application Security TwistSecurity Innovation
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationShritam Bhowmick
 

What's hot (20)

Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling Framework
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply ChainSFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
GDPR: The Application Security Twist
GDPR: The Application Security TwistGDPR: The Application Security Twist
GDPR: The Application Security Twist
 
System of security controls
System of security controlsSystem of security controls
System of security controls
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 

Similar to Identifying Code Risks in Software M&A

Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsFull Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsIgnyte Assurance Platform
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsAlan Tatourian
 
Software Outsourcing
Software OutsourcingSoftware Outsourcing
Software OutsourcingTanvir Hossen
 
What scrum masters and product owners should know about software quality and ...
What scrum masters and product owners should know about software quality and ...What scrum masters and product owners should know about software quality and ...
What scrum masters and product owners should know about software quality and ...STX Next
 
EOS Smart Contract Audit (https://www.somish.com/blockchain/smart-contract-au...
EOS Smart Contract Audit (https://www.somish.com/blockchain/smart-contract-au...EOS Smart Contract Audit (https://www.somish.com/blockchain/smart-contract-au...
EOS Smart Contract Audit (https://www.somish.com/blockchain/smart-contract-au...Somish Blockchain Labs
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueRapidValue
 
Fact vs-hype top10
Fact vs-hype top10Fact vs-hype top10
Fact vs-hype top10Usman Arif
 
Escrow Presentation2010
Escrow Presentation2010Escrow Presentation2010
Escrow Presentation2010simongreaves
 
Cyber review-guide
Cyber review-guideCyber review-guide
Cyber review-guideaqazad
 
Venture Capitalists Tech Investment Hidden Risks
Venture Capitalists Tech Investment Hidden RisksVenture Capitalists Tech Investment Hidden Risks
Venture Capitalists Tech Investment Hidden RisksSource Code Control Limited
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteSurfWatch Labs
 
Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Security Innovation
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentationlucydavidson
 
ISACA_CISM_April_2023-v1.3.pdf
ISACA_CISM_April_2023-v1.3.pdfISACA_CISM_April_2023-v1.3.pdf
ISACA_CISM_April_2023-v1.3.pdfCCIEHOMER
 
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...Ignyte Assurance Platform
 
ThirdPartyOversight
ThirdPartyOversightThirdPartyOversight
ThirdPartyOversightMolly Dowdy
 

Similar to Identifying Code Risks in Software M&A (20)

Automotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still ExistsAutomotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still Exists
 
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsFull Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
Hanu whitepaper
Hanu whitepaperHanu whitepaper
Hanu whitepaper
 
Software Outsourcing
Software OutsourcingSoftware Outsourcing
Software Outsourcing
 
What scrum masters and product owners should know about software quality and ...
What scrum masters and product owners should know about software quality and ...What scrum masters and product owners should know about software quality and ...
What scrum masters and product owners should know about software quality and ...
 
EOS Smart Contract Audit (https://www.somish.com/blockchain/smart-contract-au...
EOS Smart Contract Audit (https://www.somish.com/blockchain/smart-contract-au...EOS Smart Contract Audit (https://www.somish.com/blockchain/smart-contract-au...
EOS Smart Contract Audit (https://www.somish.com/blockchain/smart-contract-au...
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
Fact vs-hype top10
Fact vs-hype top10Fact vs-hype top10
Fact vs-hype top10
 
Escrow Presentation2010
Escrow Presentation2010Escrow Presentation2010
Escrow Presentation2010
 
The Economics of Security
The Economics of SecurityThe Economics of Security
The Economics of Security
 
Cyber review-guide
Cyber review-guideCyber review-guide
Cyber review-guide
 
Venture Capitalists Tech Investment Hidden Risks
Venture Capitalists Tech Investment Hidden RisksVenture Capitalists Tech Investment Hidden Risks
Venture Capitalists Tech Investment Hidden Risks
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-Suite
 
Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?
 
Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
 
ISACA_CISM_April_2023-v1.3.pdf
ISACA_CISM_April_2023-v1.3.pdfISACA_CISM_April_2023-v1.3.pdf
ISACA_CISM_April_2023-v1.3.pdf
 
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
 
ThirdPartyOversight
ThirdPartyOversightThirdPartyOversight
ThirdPartyOversight
 

Recently uploaded

Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxgeorgebrinton95
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCRsoniya singh
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherPerry Belcher
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCRsoniya singh
 

Recently uploaded (20)

Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
 

Identifying Code Risks in Software M&A

  • 1. Matt Tortora Managing Director: Technology Services BMI Mergers P: 312.702.2611 E: mtortora@bmimergers.com Identifying Code Risks in Software M&A
  • 2. Introduction ➔ Most CEOs and founders in the software space when thinking about a potential exit focus on table stakes metrics (ARR run rate, churn, growth rate, etc…) ➔ There are often overlooked components that are almost always thoroughly examined during the due diligence process. One of these components is the actual software code and architecture. www.bmimergers.com 1
  • 3. Source Code Issues There can be a significant risk that lies beneath the surface from years and years’ worth of development efforts and fast-tracked version releases. Risks around poorly written components of source code and technical debt can create significant issues. During the due diligence process, acquirers will do a thorough technical audit. Issues with how the software has been written or the amount of technical debt that has mounted can pose a real threat in the M&A process. www.bmimergers.com 2 Average time to complete a 3rd party technical audit is 2-4 weeks.
  • 4. Technical Audit The technical audit will typically focus on items that include: www.bmimergers.com 3 Analysis of the software architecture 3rd party service integration analysis Database design Code release and testing practices Software code and system maintainability
  • 5. Open Source Code Leveraging open-source software within a commercial software solution offers many benefits. But conversely, it can come back to haunt software companies during an M&A transaction. 60-70% 60-70% The average amount of open-source software in a company’s codebase www.bmimergers.com 4 Open-source software presents complex licensing conditions, security risks, and intellectual property risks that a buyer could potentially inherit. Acquirers must make an assessment of the potential risks of the open-source code being used. If that open source code is fraught with licensing issues, and security risks it can be enough to cause them to walk away.
  • 6. Security & Vulnerability The potential security risks posed by open-source code dovetail into the broader issue of security and vulnerability. Software code with significant vulnerabilities can end up creating a significant liability for a buyer post-acquisition. Seasoned software acquirers will likely want to run a third-party penetration test (pentest) as part of their cybersecurity due diligence on a software company. www.bmimergers.com 5
  • 7. Penetration Testing A pentest will typically look for vulnerabilities and examine areas that include: www.bmimergers.com 6 Encryption and authentication Code command and injection Configuration of networks and devices Likelihood of attacks and potential impact
  • 8. Interpreting Audit & Testing Outcomes The third-party who executes the penetration test will deliver the report to both the buyer and the seller for review. www.bmimergers.com 7 Ninety-nine percent of the time a senior technical resource at both the buyer and seller will be involved in the technical due diligence process. It’s incredibly important that non-technical resources, especially those who reside with the buyer understand the true implications of the findings of a technical audit and pentest. The findings of a technical audit or pentest can flag items that show an issue. And while these may seem like major issues they are often fixable and not as damning as they initially appear to be.
  • 9. Proper Preparation For the vast majority of software companies eventually being acquired is the end game. So knowing a rigorous due diligence process that will include deep technical due diligence is next to inevitable it’s important to be prepared. www.bmimergers.com 8
  • 10. Quality In > Qualify Out: This goes without saying but hiring top-tier engineering talent and following best practices for engineering a well-built product is a sure-fire way to avoid issues down the road. This means avoiding or limiting the amount of development work that is outsourced, and if you choose to outsource do so with a great degree of caution and scrutiny. www.bmimergers.com 9
  • 11. Potential long-term implications of open source code: It’s unrealistic to assume that a sizeable portion of a commercial software solution won’t be open source. But taking into account potential long-term risks when selecting those open source components should be a high priority. The risk factors that must be taken into consideration include; security vulnerabilities, licensing compliance risks, and overall code quality. www.bmimergers.com 10
  • 12. Conduct periodic code audits and pentests: The nice thing about conducting periodic software code audits and penetration testing is it ensures you’re developing a sound software solution that is secure and will perform at a high level. All of which carry value when it comes to keeping customers happy. And making this a regular practice will naturally avoid any major issues when you get to a place where you’re deep in due diligence with a potential acquirer. www.bmimergers.com 11
  • 13. Wrapping Up The process of engaging with potential acquirers and navigating all of the twists and turns of the due diligence process is time-intensive, expensive, and emotionally exhausting. The last thing a CEO or founder wants is a scenario where issues lying beneath the surface derail an acquisition and lots of hard work. Understanding what lies ahead in the due diligence process and being more than adequately prepared will help avoid an unfortunate outcome. www.bmimergers.com 12
  • 14. Matt Tortora Managing Director - Technology Services BMI Mergers E: mtortora@bmimergers.com Contact Info Web: bmimergers.com/techservices Chicago: 125 South Wacker Dr., Suite 300 Chicago, IL 60606 312.702.2611 Philadelphia: One Liberty Tower 1650 Market Street, Suite 3600 Philadelphia, PA 19103 215.240.7648 Tom Kerchner Managing Director BMI Mergers E: tkerchner@bmimergers.com For over twenty-five years, we have been successfully engaged in the practice of buying, selling and managing the business acquisition process. Our professionals have been engaged in transactions in a multitude of industries. They have completed multi-million dollar deals, and they have also successfully integrated businesses post-merger. Whether your business is worth $5 million or $100 million, this experience is put to work to achieve your desired result. About BMI Mergers Matt Tortora brings over fifteen years of business ownership, sales leadership, and consulting experience in both technology and professional services. He has founded three companies and held strategic leadership positions at growth stage technology companies. Most notably, Matt was the co-founder and CEO of a Chicago based software company which he successfully grew and sold to a strategic acquirer. About The Author