Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Robust, Sustainable Merger & Acquisition Process

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

Download PDF
Download PDF

Intel IT's Robust Merger & Acquisition Process

A robust merger and acquisition (M&A) process (which also applies to divestures) is a growing aspect of Intel’s business. But there is nothing simple about evaluating and integrating technologies and business capabilities or supporting incoming employees. IT organizations must use their experience to focus on the following areas:

  • Security and privacy. Cybersecurity and privacy pose a particular risk to the value of M&A before, during, and after closing the deal.
  • Integration. Understanding new business capabilities and the challenges of data harmonization are necessary to developing a phased and prioritized approach.
  • Technical debt. Existing systems are not phased out overnight and must be maintained until integration is cost effective and/or necessary.

At Intel, we have a dedicated IT M&A team that does more than execute on deals. We participate in due diligence discovery, planning, and integration to help Intel secure greater business value, and sometimes highlight potential unforeseen costs. We use an M&A lifecycle process to approach each deal with guiding principles of putting employees, suppliers, and the business value first.

The IT M&A team advocates across IT to help deliver customized, secure, and cost-effective solutions, and brings expertise in its operating model, strategy, and capabilities. We are accountable for aligning IT capabilities and business processes, and our robust professional network brings a cohesive approach to each deal.

Divestures—or separation programs—can be as challenging as acquisitions. They are largely dictated by the buyer’s integration plan, giving us much less control. When planning a divesture, we use the following:

  • Mission critical (Pre-sign). This is what must be in place at or immediately after close. It requires a full assessment of the IT footprint being divested, transition services agreements (TSAs), partner and commercial agreement alignment, and working with the buyer to develop a “Day 1” plan.
  • Initial separation (Close/Day 1). These are initial separation activities, such as removing separated employees from IT systems, exporting relevant data, physically moving people, putting TSAs and commercial support in place, and updating IT systems to reflect sold inventory.
  • Final separation (Day 2). This is the final separation of IT capabilities, such as extracting deal-relevant data from all remaining systems, terminating TSAs, and cleaning up connectivity, assets, and so on.

M&A is not simple, but in today’s business it is increasingly more common. While many organizations outsource this work, at Intel we have achieved great success by forming a dedicated IT M&A team that handles due diligence as well as integration. With a consistent M&A lifecycle process, we have built years of experience in evaluating, prioritizing, planning, and executing the integration of incoming organizations and the separation of divestures.

Cybersecurity is a particularly risky area as breaches can result in unforeseen costs, and even devaluation of the deal. Our planned approach brings a clearer understanding of the challenges, opportunities, and risks that help us add value to the business and ease the transition for employees.

Related Videos

Show more Show less

Related Materials

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration, and other factors. Learn more at intel.com/performanceindex. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo