SlideShare a Scribd company logo
1 of 23
Download to read offline
CHRIS STAFFORD
Senior Manager,
Mergers & Acquisitions
West Monroe Partners
The State of Open Source
in M&A Transactions
PAUL COTTER
Senior Architect,
Cybersecurity
West Monroe Partners
© 2019 Synopsys, Inc. 2
© 2019 Synopsys, Inc.2
Synopsys Confidential Information
© 2019 Synopsys, Inc.2
Three critical trends
OSS management should
fit into a broader security
program
Sellers need to be prepared
well in advance of a
transaction
Buyers are becoming more
focused and sophisticated
during a transaction
© 2019 Synopsys, Inc. 3
© 2019 Synopsys, Inc.3
Synopsys Confidential Information
About West Monroe Partners
O U R G L O B A L N E T W O R K S O F T W A R E & H I G H - T E C H A D V I S O R S
CARVE OUT READINESS & EXECUTION
DUE DILIGENCE
SELL-SIDE READINESS
MERGER INTEGRATION
VALUE CREATION
NORTH AMERICA
GLOBAL
NETWORK
LATIN AMERICA
EMEA & ASIA
GROWTH STRATEGY
OPS TRANSFORMATION
CUSTOMER SUCCESS
PRODUCT/R&D
IT/OPS/CYBER
© 2019 Synopsys, Inc. 4
© 2019 Synopsys, Inc.4
Synopsys Confidential Information
Over LTM, West Monroe advised on 450 transactions, 150 software transactions,
and directly advised over 75 PE-backed software portfolio companies
Aerospace + Defense
Banking + Insurance
Business Products + Services
Capital Markets + Trading
Education
Energy + Utilities
Food + Food Distribution
Healthcare + Life Sciences
High Tech + Software
Manufacturing + Distribution
Private Equity + Alternative Investments
Professional Services
Public Services
Real Estate
Retail
Telecommunications + Media
OtherHIGH TECH
& SOFTWARE
MANUFACTURING
& DISTRIBUTION
HEALTHCARE &
LIFE SCIENCES
© 2019 Synopsys, Inc. 5
© 2019 Synopsys, Inc.5
Synopsys Confidential Information
© 2019 Synopsys, Inc.5
OSS management & DevSecOps
© 2019 Synopsys, Inc. 6
© 2019 Synopsys, Inc.6
Synopsys Confidential Information
While an OSS audit in diligence is important, ongoing license
governance is more impactful in the long term
WHAT IT IS AND DOES
◆ Occurs in an ongoing manner
(OpEx investment)
◆ Helps identify licenses being used or
modified incorrectly
◆ Gives a buyer historical evidence of a
continuous process to monitor and
remediate licensing issues
WHAT IT DOES NOT DO
◆ Predict license compliance in the future
◆ Prevent misuse or developer mistakes
WHAT IT IS AND DOES
◆ Occurs at a point in time
◆ Looks for known license/security weaknesses
◆ Checks off box for compliance
◆ Gives a buyer assurances at a single point in
time
WHAT IT DOES NOT DO
◆ Evaluate how a company prevents new
licenses from being misused
◆ Predict license compliance in the future
One-time OSS audit Ongoing OSS governance program
© 2019 Synopsys, Inc. 7
© 2019 Synopsys, Inc.7
Synopsys Confidential Information
Software
developers
Tech leadership
Management
team
Aware that OSS exists ü ü ü
Knows where to find it ü
Knows how to use it ü ü
Knows when to seek out counsel ü ü
Aware of the risks associated with OSS use ü ü ü
Knows how OSS fits into the company’s
business strategy
ü ü
Monitored as a part of IT governance ü
To limit liability, each role in the organization must be aware of roles
and responsibilities of using OSS
© 2019 Synopsys, Inc. 8
© 2019 Synopsys, Inc.8
Synopsys Confidential Information
The move to DevSecOps involves Operations and Security as
integrated parts of each stage in the product life cycle, enabling
holistic security
Traditional DevOps
DevSecOps
Dev Sec Ops
© 2019 Synopsys, Inc. 9
© 2019 Synopsys, Inc.9
Synopsys Confidential Information
• Capitalizes on security and
operations involvement across all
product/feature stages
• Leverages security tools and
processes
• Moves security from a stage gate to
an integrated part of the process
• Implements consistency across
delivery teams
A holistic approach embeds security and operations within all
phases of the product life cycle
DevSecOps
Plan
Create
Verify
Package
Release
& Deploy
Operate &
Monitor
Security
Training
Secure
Design
Secure
Coding
Static
Analysis
Dynamic
Analysis
Attack
Surface
Check (inc.
OSS)
Final
Review
Code
Signing
Incident
Response
Plan
Testing &
Scanning
Monitor
Logs &
Apps
Change
Mgmt.
© 2019 Synopsys, Inc. 10
© 2019 Synopsys, Inc.10
Synopsys Confidential Information
HOW HAVE MOST MID-MARKET TECH COMPANIES HANDLED THIS TO DATE?
We see distinct differences in DevSecOps based on a company’s
strategy
✕ No holistic approach
✕ No dedicated department/staff
✕ Inconsistent application of
processes and tools
✕ Point application of security
practices (usually ineffective)
Less than 30% of companies we see have a
DevSecOps strategy across their products and platforms
INCOMPLETE/INCONSISTENT
APPROACH TO DELIVERY
✓ An end-to-end view of delivery
✓ Clearly defined metrics and
measures
✓ Buy-in from management on the
importance of and need for
consistency
✓ Continuous security monitoring and
testing
DEFINED, HOLISTIC
DELIVERY STRATEGY
© 2019 Synopsys, Inc. 11
© 2019 Synopsys, Inc.11
Synopsys Confidential Information
© 2019 Synopsys, Inc.11
Seller preparation
© 2019 Synopsys, Inc. 12
© 2019 Synopsys, Inc.12
Synopsys Confidential Information
Most middle-market software companies have immature
or no governance processes related to OSS
◆ Performed at the end of
the SDLC
◆ High effort
◆ Low accuracy /
thoroughness
◆ Dependent on developers
◆ Difficult to maintain
◆ Not usually the source of
truth
◆ Periodic scans / audits
◆ Labor intensive
◆ Not scalable (>11 new
vulns/day)
MANUAL
REVIEWS
SPREADSHEET
INVENTORY
VULNERABILITY
DETECTION & TRACKING
© 2019 Synopsys, Inc. 13
© 2019 Synopsys, Inc.13
Synopsys Confidential Information
• Conduct a third-party audit and risk assessment of the platform(s) for vulnerabilities, unused
components/code, and third-party code without known licenses
• Develop and execute a roadmap for comprehensive secure SDLC processes, including:
– OSS governance model
– Education of engineering team and implementation of governance processes
– Establish SDLC KPIs, measure, track, and trend
• Remediate known issues identified in audit and document progress/improvements
One year out from a transaction, sellers can take significant steps to
improve their posture and demonstrate improvement
12 MONTHS 6 MONTHS 1 MONTH
© 2019 Synopsys, Inc. 14
© 2019 Synopsys, Inc.14
Synopsys Confidential Information
• Ensure documentation and policy is consistent with processes and adjust as necessary
• Conduct internal OSS audit if last review is more than 6 months old
• Adjust or define roadmaps as needed to reflect current state (delays/changes)
• Prepare materials/documentation/positioning for due diligence
Six months allows sellers to address some gaps but not
fundamentally alter maturity
12 MONTHS 6 MONTHS 1 MONTH
© 2019 Synopsys, Inc. 15
© 2019 Synopsys, Inc.15
Synopsys Confidential Information
• Produce historical update / remediation reports
• Review process documentation
• Produce change logs from full scan (if completed earlier)
• Prepare for OSS audit during diligence (such as removing unused OSS component artifacts)
• Educate key team members (including management team) on OSS posture, secure SLDC
gaps/posture, and how to discuss any potential buyer concerns
If a transaction is imminent, sellers have little time to make
adjustments but can prepare for the diligence process
12 MONTHS 6 MONTHS 1 MONTH
© 2019 Synopsys, Inc. 16
© 2019 Synopsys, Inc.16
Synopsys Confidential Information
© 2019 Synopsys, Inc.16
Buyer sophistication
© 2019 Synopsys, Inc. 17
© 2019 Synopsys, Inc.17
Synopsys Confidential Information
The market for tech isn’t slowing down; in the first half of 2019, TMT
is still dominating, with 42% more transactions than the second-
busiest sector
622TMT
439Industrials + Chemicals
352Business Services
282Pharma, Medical, and Biotech
225Financial Services
208Consumer
151Energy, Mining, + Utilities
77
72
60
Construction
Transportation
Leisure
Real Estate 19
15
9
US M&A SECTORS BY VOLUME, H1 2019
Agriculture
Defense
© 2019 Synopsys, Inc. 18
© 2019 Synopsys, Inc.18
Synopsys Confidential Information
Add-on acquisitions can drive rapid growth through cross-sell,
expansion into new markets, and enable more mature functional
integrations
◆ Operating flexibility of SaaS
companies
◆ Acquiring the right products and
services is always a quicker
approach
◆ The “buy and build” strategy
CONTRIBUTING FACTORS
2016
47% 61%
2007
% OF ADD-ONS AMONG
TOTAL SOFTWARE DEAL
COUNT
© 2019 Synopsys, Inc. 19
© 2019 Synopsys, Inc.19
Synopsys Confidential Information
Buyers are becoming more focused and sophisticated during a
transaction process
Speed is a differentiator
for buyers
Buyers have less tolerance
for unknown product risks
Buyers have high
expectations and will
demand precision pre-close
© 2019 Synopsys, Inc. 20
© 2019 Synopsys, Inc.20
Synopsys Confidential Information
Buyers will holistically evaluate OSS in diligence
• Via West Monroe or other
third party
• Will review audit output to
help interpret findings
• Will evaluate risks /
remediation paths with
legal diligence provider
• Via Black Duck or other
third party
• Requires 1–3 weeks’
duration, plus
review/explanation time
with third parties and
buyers
• Via third-party legal
advisors
• Will review audit output to
evaluate and measure
risks
• Will advise buyer on
remediation needed, reps
& warranties needs, and
closing conditions
OSS AUDIT TECH DILIGENCE LEGAL DILIGENCE
© 2019 Synopsys, Inc. 21
© 2019 Synopsys, Inc.21
Synopsys Confidential Information
A CAUTIONARY TALE
Diligence of a remote management and security tool company
Conducted one-time OSS audit
Licensing issues identified
◆ 100+ license concerns
◆ Most concerns related to OSS that
was redistributed on Target’s
appliances
SITUATION
◆ Line-by-line investigation and root-
cause analysis
◆ Multiple hours spent on calls with
WMP, legal counsel, Black Duck,
buyer and seller
ACTION
Root cause
◆ 80%+ of issues related to Linux
distribution source code in the code
tree
◆ Most modifications to source were
being contributed back to the OSS
community
Lessons learned
◆ Careful scoping of scans is
necessary to avoid expensive and
exhausting meetings (delayed
transaction close, fees to advisors)
◆ Source code hygiene can help
prevent issues
RESULTS
© 2019 Synopsys, Inc. 22
© 2019 Synopsys, Inc.22
Synopsys Confidential Information
A DELAYED DEAL
Diligence of a SaaS / on-prem software company
Conducted one-time OSS audit
Licensing issues identified
◆ The Target company had improperly
modified and deployed an OSS
component within their software
package
◆ The improperly modified code had
been included in legacy distributed
versions of the product, limiting the
company’s ability to upgrade
customers to a more recent version
SITUATION
◆ Completed Black Duck audit
◆ Legal advisors conducted research
on the license’s copyright owner to
evaluate potential outcomes
◆ Identified several “best” and “worst”
case scenarios and evaluated
actions required by Target prior to
close
ACTION
Outcomes
◆ Target required to remediate issue
and execute necessary deployments
prior to close (delayed deal closing)
◆ Modified reps & warranties and
advised on explanation for future
buyers
Lessons learned
◆ Lack of OSS insight can delay a
transaction
◆ A distributed codebase can lead to
ongoing licensing concerns
RESULTS
Thank You

More Related Content

What's hot

Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Synopsys Software Integrity Group
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksSynopsys Software Integrity Group
 
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CDSynopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CDSynopsys Software Integrity Group
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Synopsys Software Integrity Group
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsSynopsys Software Integrity Group
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsSynopsys Software Integrity Group
 
Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016Black Duck by Synopsys
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 blior mazor
 
Black Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck by Synopsys
 

What's hot (18)

Webinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability FeedWebinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability Feed
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
 
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created EqualWebinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created Equal
 
Webinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source LicensingWebinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source Licensing
 
Webinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in ReviewWebinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in Review
 
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CDSynopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
 
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for DevelopersWebinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for Developers
 
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
 
Webinar – Security Tool Misconfiguration and Abuse
Webinar – Security Tool Misconfiguration and AbuseWebinar – Security Tool Misconfiguration and Abuse
Webinar – Security Tool Misconfiguration and Abuse
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
 
Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 b
 
Black Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open Source
 
Webinar–2019 Open Source Risk Analysis Report
Webinar–2019 Open Source Risk Analysis ReportWebinar–2019 Open Source Risk Analysis Report
Webinar–2019 Open Source Risk Analysis Report
 
Webinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the NumbersWebinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the Numbers
 

Similar to Webinar–The State of Open Source in M&A Transactions

6 Steps to Better Bad Debt Recovery
6 Steps to Better Bad Debt Recovery6 Steps to Better Bad Debt Recovery
6 Steps to Better Bad Debt RecoveryAppFolio
 
How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud SureCloud
 
REQUE - Predictive lead scoring for recruiters and talent agencies
REQUE - Predictive lead scoring for recruiters and talent agenciesREQUE - Predictive lead scoring for recruiters and talent agencies
REQUE - Predictive lead scoring for recruiters and talent agenciesMiroslav Maráz
 
Fleet Optimization Buyer's Guide
Fleet Optimization Buyer's GuideFleet Optimization Buyer's Guide
Fleet Optimization Buyer's GuideCurtis Serna
 
Panorama 360 Insurance and Wealth Management Business Architecture Framework ...
Panorama 360 Insurance and Wealth Management Business Architecture Framework ...Panorama 360 Insurance and Wealth Management Business Architecture Framework ...
Panorama 360 Insurance and Wealth Management Business Architecture Framework ...Pierre Gagne
 
Webinar slides takeacloserlookatabm
Webinar slides takeacloserlookatabmWebinar slides takeacloserlookatabm
Webinar slides takeacloserlookatabmDelaneyKutsal
 
Take a Closer Look at ABM: Best Practices with TOPO
Take a Closer Look at ABM: Best Practices with TOPOTake a Closer Look at ABM: Best Practices with TOPO
Take a Closer Look at ABM: Best Practices with TOPODemandbase
 
Corporate digest-magazine-september (1)
Corporate digest-magazine-september (1)Corporate digest-magazine-september (1)
Corporate digest-magazine-september (1)Abhishek Kanaujia
 
How Do We Use a Business or Regulatory Event to Improve Your Data Management ...
How Do We Use a Business or Regulatory Event to Improve Your Data Management ...How Do We Use a Business or Regulatory Event to Improve Your Data Management ...
How Do We Use a Business or Regulatory Event to Improve Your Data Management ...Molly Alexander
 
Hi600ch07_text_slides
Hi600ch07_text_slidesHi600ch07_text_slides
Hi600ch07_text_slidesljmcneill33
 
Submission to the senate inquiry
Submission to the senate inquirySubmission to the senate inquiry
Submission to the senate inquiryHenry Leo
 
Feb20 Webinar - Managing Risk and Pain of Vendor Management
Feb20 Webinar - Managing Risk and Pain of Vendor ManagementFeb20 Webinar - Managing Risk and Pain of Vendor Management
Feb20 Webinar - Managing Risk and Pain of Vendor ManagementTrustArc
 
Implementing New Technology: 5 Secrets to Maintaining Productivity and Profi...
Implementing New Technology:  5 Secrets to Maintaining Productivity and Profi...Implementing New Technology:  5 Secrets to Maintaining Productivity and Profi...
Implementing New Technology: 5 Secrets to Maintaining Productivity and Profi...AppFolio
 
Symantec Corporate Presentation
Symantec Corporate PresentationSymantec Corporate Presentation
Symantec Corporate PresentationInvestorSymantec
 
Webinar: Making the Move to SaaS - Commercial and Licensing Implications
Webinar: Making the Move to SaaS - Commercial and Licensing ImplicationsWebinar: Making the Move to SaaS - Commercial and Licensing Implications
Webinar: Making the Move to SaaS - Commercial and Licensing ImplicationsFlexera
 
A Stress-free Guide to Mergers Acquisitions and Divestitures.pdf
A Stress-free Guide to Mergers Acquisitions and Divestitures.pdfA Stress-free Guide to Mergers Acquisitions and Divestitures.pdf
A Stress-free Guide to Mergers Acquisitions and Divestitures.pdfeprentise
 
The Difference Between Business Sponsored and Business Led
The Difference Between Business Sponsored and Business LedThe Difference Between Business Sponsored and Business Led
The Difference Between Business Sponsored and Business LedDATAVERSITY
 
CIMA Dublin MIAGEN on FP&A Best Practices June '15
CIMA Dublin MIAGEN on FP&A Best Practices June '15CIMA Dublin MIAGEN on FP&A Best Practices June '15
CIMA Dublin MIAGEN on FP&A Best Practices June '15MIAGEN
 

Similar to Webinar–The State of Open Source in M&A Transactions (20)

6 Steps to Better Bad Debt Recovery
6 Steps to Better Bad Debt Recovery6 Steps to Better Bad Debt Recovery
6 Steps to Better Bad Debt Recovery
 
How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud
 
Business
BusinessBusiness
Business
 
REQUE - Predictive lead scoring for recruiters and talent agencies
REQUE - Predictive lead scoring for recruiters and talent agenciesREQUE - Predictive lead scoring for recruiters and talent agencies
REQUE - Predictive lead scoring for recruiters and talent agencies
 
Fleet Optimization Buyer's Guide
Fleet Optimization Buyer's GuideFleet Optimization Buyer's Guide
Fleet Optimization Buyer's Guide
 
Panorama 360 Insurance and Wealth Management Business Architecture Framework ...
Panorama 360 Insurance and Wealth Management Business Architecture Framework ...Panorama 360 Insurance and Wealth Management Business Architecture Framework ...
Panorama 360 Insurance and Wealth Management Business Architecture Framework ...
 
Webinar slides takeacloserlookatabm
Webinar slides takeacloserlookatabmWebinar slides takeacloserlookatabm
Webinar slides takeacloserlookatabm
 
Take a Closer Look at ABM: Best Practices with TOPO
Take a Closer Look at ABM: Best Practices with TOPOTake a Closer Look at ABM: Best Practices with TOPO
Take a Closer Look at ABM: Best Practices with TOPO
 
Corporate digest-magazine-september (1)
Corporate digest-magazine-september (1)Corporate digest-magazine-september (1)
Corporate digest-magazine-september (1)
 
Product Development Process. Ukraine Commodity Market Development Conference
Product Development Process. Ukraine Commodity Market Development ConferenceProduct Development Process. Ukraine Commodity Market Development Conference
Product Development Process. Ukraine Commodity Market Development Conference
 
How Do We Use a Business or Regulatory Event to Improve Your Data Management ...
How Do We Use a Business or Regulatory Event to Improve Your Data Management ...How Do We Use a Business or Regulatory Event to Improve Your Data Management ...
How Do We Use a Business or Regulatory Event to Improve Your Data Management ...
 
Hi600ch07_text_slides
Hi600ch07_text_slidesHi600ch07_text_slides
Hi600ch07_text_slides
 
Submission to the senate inquiry
Submission to the senate inquirySubmission to the senate inquiry
Submission to the senate inquiry
 
Feb20 Webinar - Managing Risk and Pain of Vendor Management
Feb20 Webinar - Managing Risk and Pain of Vendor ManagementFeb20 Webinar - Managing Risk and Pain of Vendor Management
Feb20 Webinar - Managing Risk and Pain of Vendor Management
 
Implementing New Technology: 5 Secrets to Maintaining Productivity and Profi...
Implementing New Technology:  5 Secrets to Maintaining Productivity and Profi...Implementing New Technology:  5 Secrets to Maintaining Productivity and Profi...
Implementing New Technology: 5 Secrets to Maintaining Productivity and Profi...
 
Symantec Corporate Presentation
Symantec Corporate PresentationSymantec Corporate Presentation
Symantec Corporate Presentation
 
Webinar: Making the Move to SaaS - Commercial and Licensing Implications
Webinar: Making the Move to SaaS - Commercial and Licensing ImplicationsWebinar: Making the Move to SaaS - Commercial and Licensing Implications
Webinar: Making the Move to SaaS - Commercial and Licensing Implications
 
A Stress-free Guide to Mergers Acquisitions and Divestitures.pdf
A Stress-free Guide to Mergers Acquisitions and Divestitures.pdfA Stress-free Guide to Mergers Acquisitions and Divestitures.pdf
A Stress-free Guide to Mergers Acquisitions and Divestitures.pdf
 
The Difference Between Business Sponsored and Business Led
The Difference Between Business Sponsored and Business LedThe Difference Between Business Sponsored and Business Led
The Difference Between Business Sponsored and Business Led
 
CIMA Dublin MIAGEN on FP&A Best Practices June '15
CIMA Dublin MIAGEN on FP&A Best Practices June '15CIMA Dublin MIAGEN on FP&A Best Practices June '15
CIMA Dublin MIAGEN on FP&A Best Practices June '15
 

More from Synopsys Software Integrity Group

More from Synopsys Software Integrity Group (9)

Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?
 
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde AgileWebinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
 
Webinar – Software Security 2019–Embrace Velocity
Webinar – Software Security 2019–Embrace Velocity Webinar – Software Security 2019–Embrace Velocity
Webinar – Software Security 2019–Embrace Velocity
 
Webinar - Developers Are Your Greatest AppSec Resource
Webinar - Developers Are Your Greatest AppSec ResourceWebinar - Developers Are Your Greatest AppSec Resource
Webinar - Developers Are Your Greatest AppSec Resource
 
Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Using Metrics to Drive Your Software Security Initiative Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Using Metrics to Drive Your Software Security Initiative
 
Webinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production EnvironmentsWebinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production Environments
 
Webinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or RealityWebinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or Reality
 
Infographic–A Look Back at the First Year of GDPR
Infographic–A Look Back at the First Year of GDPRInfographic–A Look Back at the First Year of GDPR
Infographic–A Look Back at the First Year of GDPR
 
Webinar–Reviewing Modern JavaScript Applications
Webinar–Reviewing Modern JavaScript ApplicationsWebinar–Reviewing Modern JavaScript Applications
Webinar–Reviewing Modern JavaScript Applications
 

Recently uploaded

What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 

Recently uploaded (20)

What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 

Webinar–The State of Open Source in M&A Transactions

  • 1. CHRIS STAFFORD Senior Manager, Mergers & Acquisitions West Monroe Partners The State of Open Source in M&A Transactions PAUL COTTER Senior Architect, Cybersecurity West Monroe Partners
  • 2. © 2019 Synopsys, Inc. 2 © 2019 Synopsys, Inc.2 Synopsys Confidential Information © 2019 Synopsys, Inc.2 Three critical trends OSS management should fit into a broader security program Sellers need to be prepared well in advance of a transaction Buyers are becoming more focused and sophisticated during a transaction
  • 3. © 2019 Synopsys, Inc. 3 © 2019 Synopsys, Inc.3 Synopsys Confidential Information About West Monroe Partners O U R G L O B A L N E T W O R K S O F T W A R E & H I G H - T E C H A D V I S O R S CARVE OUT READINESS & EXECUTION DUE DILIGENCE SELL-SIDE READINESS MERGER INTEGRATION VALUE CREATION NORTH AMERICA GLOBAL NETWORK LATIN AMERICA EMEA & ASIA GROWTH STRATEGY OPS TRANSFORMATION CUSTOMER SUCCESS PRODUCT/R&D IT/OPS/CYBER
  • 4. © 2019 Synopsys, Inc. 4 © 2019 Synopsys, Inc.4 Synopsys Confidential Information Over LTM, West Monroe advised on 450 transactions, 150 software transactions, and directly advised over 75 PE-backed software portfolio companies Aerospace + Defense Banking + Insurance Business Products + Services Capital Markets + Trading Education Energy + Utilities Food + Food Distribution Healthcare + Life Sciences High Tech + Software Manufacturing + Distribution Private Equity + Alternative Investments Professional Services Public Services Real Estate Retail Telecommunications + Media OtherHIGH TECH & SOFTWARE MANUFACTURING & DISTRIBUTION HEALTHCARE & LIFE SCIENCES
  • 5. © 2019 Synopsys, Inc. 5 © 2019 Synopsys, Inc.5 Synopsys Confidential Information © 2019 Synopsys, Inc.5 OSS management & DevSecOps
  • 6. © 2019 Synopsys, Inc. 6 © 2019 Synopsys, Inc.6 Synopsys Confidential Information While an OSS audit in diligence is important, ongoing license governance is more impactful in the long term WHAT IT IS AND DOES ◆ Occurs in an ongoing manner (OpEx investment) ◆ Helps identify licenses being used or modified incorrectly ◆ Gives a buyer historical evidence of a continuous process to monitor and remediate licensing issues WHAT IT DOES NOT DO ◆ Predict license compliance in the future ◆ Prevent misuse or developer mistakes WHAT IT IS AND DOES ◆ Occurs at a point in time ◆ Looks for known license/security weaknesses ◆ Checks off box for compliance ◆ Gives a buyer assurances at a single point in time WHAT IT DOES NOT DO ◆ Evaluate how a company prevents new licenses from being misused ◆ Predict license compliance in the future One-time OSS audit Ongoing OSS governance program
  • 7. © 2019 Synopsys, Inc. 7 © 2019 Synopsys, Inc.7 Synopsys Confidential Information Software developers Tech leadership Management team Aware that OSS exists ü ü ü Knows where to find it ü Knows how to use it ü ü Knows when to seek out counsel ü ü Aware of the risks associated with OSS use ü ü ü Knows how OSS fits into the company’s business strategy ü ü Monitored as a part of IT governance ü To limit liability, each role in the organization must be aware of roles and responsibilities of using OSS
  • 8. © 2019 Synopsys, Inc. 8 © 2019 Synopsys, Inc.8 Synopsys Confidential Information The move to DevSecOps involves Operations and Security as integrated parts of each stage in the product life cycle, enabling holistic security Traditional DevOps DevSecOps Dev Sec Ops
  • 9. © 2019 Synopsys, Inc. 9 © 2019 Synopsys, Inc.9 Synopsys Confidential Information • Capitalizes on security and operations involvement across all product/feature stages • Leverages security tools and processes • Moves security from a stage gate to an integrated part of the process • Implements consistency across delivery teams A holistic approach embeds security and operations within all phases of the product life cycle DevSecOps Plan Create Verify Package Release & Deploy Operate & Monitor Security Training Secure Design Secure Coding Static Analysis Dynamic Analysis Attack Surface Check (inc. OSS) Final Review Code Signing Incident Response Plan Testing & Scanning Monitor Logs & Apps Change Mgmt.
  • 10. © 2019 Synopsys, Inc. 10 © 2019 Synopsys, Inc.10 Synopsys Confidential Information HOW HAVE MOST MID-MARKET TECH COMPANIES HANDLED THIS TO DATE? We see distinct differences in DevSecOps based on a company’s strategy ✕ No holistic approach ✕ No dedicated department/staff ✕ Inconsistent application of processes and tools ✕ Point application of security practices (usually ineffective) Less than 30% of companies we see have a DevSecOps strategy across their products and platforms INCOMPLETE/INCONSISTENT APPROACH TO DELIVERY ✓ An end-to-end view of delivery ✓ Clearly defined metrics and measures ✓ Buy-in from management on the importance of and need for consistency ✓ Continuous security monitoring and testing DEFINED, HOLISTIC DELIVERY STRATEGY
  • 11. © 2019 Synopsys, Inc. 11 © 2019 Synopsys, Inc.11 Synopsys Confidential Information © 2019 Synopsys, Inc.11 Seller preparation
  • 12. © 2019 Synopsys, Inc. 12 © 2019 Synopsys, Inc.12 Synopsys Confidential Information Most middle-market software companies have immature or no governance processes related to OSS ◆ Performed at the end of the SDLC ◆ High effort ◆ Low accuracy / thoroughness ◆ Dependent on developers ◆ Difficult to maintain ◆ Not usually the source of truth ◆ Periodic scans / audits ◆ Labor intensive ◆ Not scalable (>11 new vulns/day) MANUAL REVIEWS SPREADSHEET INVENTORY VULNERABILITY DETECTION & TRACKING
  • 13. © 2019 Synopsys, Inc. 13 © 2019 Synopsys, Inc.13 Synopsys Confidential Information • Conduct a third-party audit and risk assessment of the platform(s) for vulnerabilities, unused components/code, and third-party code without known licenses • Develop and execute a roadmap for comprehensive secure SDLC processes, including: – OSS governance model – Education of engineering team and implementation of governance processes – Establish SDLC KPIs, measure, track, and trend • Remediate known issues identified in audit and document progress/improvements One year out from a transaction, sellers can take significant steps to improve their posture and demonstrate improvement 12 MONTHS 6 MONTHS 1 MONTH
  • 14. © 2019 Synopsys, Inc. 14 © 2019 Synopsys, Inc.14 Synopsys Confidential Information • Ensure documentation and policy is consistent with processes and adjust as necessary • Conduct internal OSS audit if last review is more than 6 months old • Adjust or define roadmaps as needed to reflect current state (delays/changes) • Prepare materials/documentation/positioning for due diligence Six months allows sellers to address some gaps but not fundamentally alter maturity 12 MONTHS 6 MONTHS 1 MONTH
  • 15. © 2019 Synopsys, Inc. 15 © 2019 Synopsys, Inc.15 Synopsys Confidential Information • Produce historical update / remediation reports • Review process documentation • Produce change logs from full scan (if completed earlier) • Prepare for OSS audit during diligence (such as removing unused OSS component artifacts) • Educate key team members (including management team) on OSS posture, secure SLDC gaps/posture, and how to discuss any potential buyer concerns If a transaction is imminent, sellers have little time to make adjustments but can prepare for the diligence process 12 MONTHS 6 MONTHS 1 MONTH
  • 16. © 2019 Synopsys, Inc. 16 © 2019 Synopsys, Inc.16 Synopsys Confidential Information © 2019 Synopsys, Inc.16 Buyer sophistication
  • 17. © 2019 Synopsys, Inc. 17 © 2019 Synopsys, Inc.17 Synopsys Confidential Information The market for tech isn’t slowing down; in the first half of 2019, TMT is still dominating, with 42% more transactions than the second- busiest sector 622TMT 439Industrials + Chemicals 352Business Services 282Pharma, Medical, and Biotech 225Financial Services 208Consumer 151Energy, Mining, + Utilities 77 72 60 Construction Transportation Leisure Real Estate 19 15 9 US M&A SECTORS BY VOLUME, H1 2019 Agriculture Defense
  • 18. © 2019 Synopsys, Inc. 18 © 2019 Synopsys, Inc.18 Synopsys Confidential Information Add-on acquisitions can drive rapid growth through cross-sell, expansion into new markets, and enable more mature functional integrations ◆ Operating flexibility of SaaS companies ◆ Acquiring the right products and services is always a quicker approach ◆ The “buy and build” strategy CONTRIBUTING FACTORS 2016 47% 61% 2007 % OF ADD-ONS AMONG TOTAL SOFTWARE DEAL COUNT
  • 19. © 2019 Synopsys, Inc. 19 © 2019 Synopsys, Inc.19 Synopsys Confidential Information Buyers are becoming more focused and sophisticated during a transaction process Speed is a differentiator for buyers Buyers have less tolerance for unknown product risks Buyers have high expectations and will demand precision pre-close
  • 20. © 2019 Synopsys, Inc. 20 © 2019 Synopsys, Inc.20 Synopsys Confidential Information Buyers will holistically evaluate OSS in diligence • Via West Monroe or other third party • Will review audit output to help interpret findings • Will evaluate risks / remediation paths with legal diligence provider • Via Black Duck or other third party • Requires 1–3 weeks’ duration, plus review/explanation time with third parties and buyers • Via third-party legal advisors • Will review audit output to evaluate and measure risks • Will advise buyer on remediation needed, reps & warranties needs, and closing conditions OSS AUDIT TECH DILIGENCE LEGAL DILIGENCE
  • 21. © 2019 Synopsys, Inc. 21 © 2019 Synopsys, Inc.21 Synopsys Confidential Information A CAUTIONARY TALE Diligence of a remote management and security tool company Conducted one-time OSS audit Licensing issues identified ◆ 100+ license concerns ◆ Most concerns related to OSS that was redistributed on Target’s appliances SITUATION ◆ Line-by-line investigation and root- cause analysis ◆ Multiple hours spent on calls with WMP, legal counsel, Black Duck, buyer and seller ACTION Root cause ◆ 80%+ of issues related to Linux distribution source code in the code tree ◆ Most modifications to source were being contributed back to the OSS community Lessons learned ◆ Careful scoping of scans is necessary to avoid expensive and exhausting meetings (delayed transaction close, fees to advisors) ◆ Source code hygiene can help prevent issues RESULTS
  • 22. © 2019 Synopsys, Inc. 22 © 2019 Synopsys, Inc.22 Synopsys Confidential Information A DELAYED DEAL Diligence of a SaaS / on-prem software company Conducted one-time OSS audit Licensing issues identified ◆ The Target company had improperly modified and deployed an OSS component within their software package ◆ The improperly modified code had been included in legacy distributed versions of the product, limiting the company’s ability to upgrade customers to a more recent version SITUATION ◆ Completed Black Duck audit ◆ Legal advisors conducted research on the license’s copyright owner to evaluate potential outcomes ◆ Identified several “best” and “worst” case scenarios and evaluated actions required by Target prior to close ACTION Outcomes ◆ Target required to remediate issue and execute necessary deployments prior to close (delayed deal closing) ◆ Modified reps & warranties and advised on explanation for future buyers Lessons learned ◆ Lack of OSS insight can delay a transaction ◆ A distributed codebase can lead to ongoing licensing concerns RESULTS