General discussion

Locked

IT Infrastructure separation

By christian ·
What are the major risk/mitigation strategies when separating IT infrastructures? A large business unit was sold to a competitor. During a period of one year all current applications, servers, end-user access need to be granted to the employees of the new owner. Meanwhile all IT Infrastructure (Data, Applications, User access, etc) need to be completly unbundled and passed it over to the new owners. It is a multi site project.

This conversation is currently closed to new comments.

1 total post (Page 1 of 1)  
| Thread display: Collapse - | Expand +

All Comments

Collapse -

by Oldefar In reply to IT Infrastructure separat ...

The major risk is faced by the new owner - the risk being a less than complete transfer of infrastructure. A second risk is the transfer of actual data. For the new owner all CRM data is critical for maintaining customer satisfaction while for the seller the risk is in transferring proprietary data not included with the sale and losing CRM data for the now shared customer base.

The strategy is fairly simple a high level. Identification of infrastructure and data and classification as BU specific, BU and seller shared, and seller proprietary. The first is transferred, the second replicated and transferred, and the third protected.

If you already have a security policy in place that has limited access by level authorized and also need, you will have an easier time with the transition. If not, putting this in place now should be a first step.

Back to IT Employment Forum
1 total post (Page 1 of 1)  

Related Discussions

Related Forums