· Insights  · 11 min read

Strategic Acquisition + Tech Assets: the Good, the Bad, and Board's Role

Explore key considerations for corporate boards when assessing strategic tech acquisitions. Learn about the hallmarks of good assets, red flags to watch out for, and how boards can ensure informed decision-making in tech-driven deals.
tl;dr

Strategic tech acquisitions present both opportunities and risks for companies. Corporate boards must be equipped to assess whether potential deals align with company strategy and maximize shareholder value. Key considerations include:

  • Evaluating synergies
  • Novel uses of technology
  • Execution capabilities
  • IP practices
  • Tech foundations
  • Compliance

Boards should push for thorough technical due diligence, challenge management’s integration plans, and ensure a balance between optimism and realistic assessment of tech assets.

When it comes to strategic acquisitions, few opportunities can present as much promise or peril as tech assets. Over the last decade, common target assets have expanded: originally patents and simple hosted software components were the focus, but now strategic acquisitions often set their sights on a company’s datasets, machine learning models, SDKs, APIs, and hybrid cloud infrastructures. Corporate boards overseeing these strategic acquisitions must be equipped to assess whether a potential deal truly aligns with the company strategy and will maximize shareholder value.

While the breadth and complexity of these deals has increased, there are still many patterns and hallmarks of strategic tech asset acquisitions. And among these patterns, there are common themes related to underlying assets that separate the good from the bad.

In this article, I’ll be outlining some key considerations for corporate boards when assessing strategic tech acquisitions. I’ll cover three hallmarks of “good” assets that often generate strong returns on investment, as well as three red flags that might signal that an asset is likely to generate more heartache than enterprise value.

What Makes a “Good” Asset?

A paintbrush in the hands of a renowned artist can be a tool for endless production of masterworks; in the hands of a toddler, it is more likely to result in decreased home value. Is the paintbrush an intrinsically good or bad asset? Is the value of the old master’s tool the same as the toddler’s?

Sometimes, putting an asset in the right hands can unlock value where there was previously none. Assets that seem like nothing but liability can be transformed into profit. Whether through synergy, novel use, or simply better execution or resourcing, there are many examples of “failed” assets that found success after a strategic transaction.

Synergy

While “synergy” is frequently parodied for its overuse and abuse, it is also a real concept with true potential. Many software, data, or patent assets that are gained through successful acquisitions create value through synergies.

Simply put, tech assets typically create synergies when they make other products or services better. Normally, synergies are created when larger organizations with established products or services acquire assets from smaller organizations. In other cases, acquisitions occur when larger organizations spin out or “give up” on non-core activities. In both cases, when larger organizations acquire assets like software or data, the “synergistic value” is unlocked by scaling a capability across the acquirer’s product or service portfolio.

Synergy on paper is one thing. In practice, however, realizing the potential value often depends on many details related to the asset and acquirer. For example, large differences in technology infrastructure, software architectures, programming languages, open source strategies, or brand can result in unexpected costs or missed opportunities. It’s key for organizations acquiring software or data assets to validate the assumptions in their financial modeling with proper technical diligence.

Board Considerations:
  • Evaluate synergy realization: Challenge management to clearly articulate and quantify expected synergies. Are the integration plans robust and realistic?

  • Ensure successful integration: Successful acquisitions include integrations that align with strategic and operational objectives. What steps can we take to ensure successful post-execution integration?

Novel Use or Licensing

The second common pattern among successful strategic acquisitions is novel use. In this case, an asset is currently being “underutilized” from a strategic perspective. Creative acquirers purchase the asset and then use it in new applications, new markets, or new commercial strategies. Software and data frequently fall into this category, especially when they are related to “behind-the-scenes” automation or machine learning.

Internal Use 🡲 Market

Technology solutions are frequently initially developed for internal use. Organizations might create software or collect data to automate a task as part of solving an internal pain point. These systems and records might successfully enhance margin or reduce risk within the company. For a variety of reasons, management often fails to consider whether such tech or data could then be leveraged elsewhere. Even when they do identify such possibilities, financial or operational constraints may prevent them from executing on these strategies.

These situations often present valuable opportunities for “spin-outs” or strategic partnerships. The seller typically receives ongoing license or preferential usage rights along with a cash payment, partial ownership stake, or future revenue share. The acquirer or successor organization can skip the research and development phase, going straight to market with tested, mature solutions. In cases where there is fear of competition or cannibalization, these deals may also feature geographic or industry exclusions.

Alternative Strategies

In other cases, startups or R&D groups develop a technology or dataset for a narrow commercial purpose. When they go to market, they may fail to gain traction or hit profitability goals. Another organization may identify alternative use cases for the assets, expanding the total addressable market or finding higher-margin opportunities. Sometimes, the alternative strategy is as simple as licensing or white-labeling. In situations like this, strategic acquirers can obtain assets at a substantial discount to their “true” value if the seller does not appreciate or hasn’t contemplated the alternative uses of their asset.

Risks of Moving the Inside Out

Vetting information security risks, maintenance cost budgets, and open source licensing is often critical for situations like this. Because many internal use applications were never intended to be redistributed or made available to third parties, some aspects of their design may create serious legal or business risk like potential litigation. Technical diligence can help identify and measure these risks so they can factor into the price or legal terms of the deal. In addition, the sooner the acquirer gains a technical understanding of the assets, the sooner they can plan for scaling or enhancing their team to support the acquisition.

Execution

Paradoxically, many good assets available for acquisition are paired with bad execution. To understand the paradox, you can think about why technology organizations or projects fail. One possible answer is that the technology did not meet a real need or that it was not properly designed or implemented. The other possible answer is that the technology idea and implementation itself was viable, but some other element of execution was at fault. For example, a product with great potential might be paired with a bad marketing strategy or poor customer support team, generating fatal early turnover or poor sales pipeline.

When evaluating failed tech organizations, identifying bad execution is often key to making good investments. This bad execution typically yields poor financial results, which creates a context for acquiring software or data assets at a substantial discount. Furthermore, identifying the “problem” areas prior to acquisition allows organizations to better plan and cost out post-acquisition financial models and strategy.

Board Considerations:
  • Assess acquisition potential: It’s crucial for boards to distinguish between technology potential and operational execution. Does our company have the capabilities to execute more effectively than the target company had?

  • Plan for value creation: What specific operational improvements could we implement to unlock the value of the acquired technology?

What makes a “bad” asset?

Conversely, there are some red flags for tech assets that should generate immediate concern. When these findings show up in diligence, organizations should make sure to take a conservative approach to bidding or valuations.

Sloppy IP practices

Intangible assets like software and data represent the majority of value in recent M&A deals and VC/PE investments. But when it comes to creating and protecting this intellectual property, there are many ways to slip up. For most acquisitions, diligence starts and ends with checking the terms of contracts for individuals and organizations that wrote the code. But are work for hire and IP assignment clauses really the only things that matter? While reps and warranties address these in almost all deals, recourse is practically limited when distressed companies or Section 363 bankruptcy sales are involved.

The board’s risk committee should be particularly attentive to these issues.

Board Considerations:
  • Ensure thorough IP due diligence: While the board shouldn’t be hands-on in IP due diligence, they should ensure that diligence in line with the company’s risk management system has been undertaken.

    Has IP due diligence been conducted, including technical assessments of source code and data provenance? What safeguards are in place to protect against IP-related risks, especially in distressed company acquisitions?

Poor Tech Foundations

When it comes to technology assets, this one is the most obvious. Sometimes, good ideas have poor technology implementations. Software assets might be riddled with poor design choices, unscalable architectures, abandoned or unsupported dependencies, or countless security hazards. Machine learning models might be trained on bad data, wildly overfit, poorly specified in their targets or outcomes, or built on unreliable or unexplainable techniques.

Buying assets like software or machine learning models without adequate tech diligence might not end up being a failure, but it’s almost guaranteed that buyers pay too much or underestimate the timeline to return their investment. When tech diligence is done in advance, it doesn’t just result in better marks on the assets; it also helps the new owner make better strategic and operational plans for life after acquisition.

Board Considerations:
  • Evaluate technology viability: Confirm that management’s expectations align with the company’s overall technology strategy.

    Have we received clear assessments of the acquired technology’s scalability, security, and long-term viability?

  • Assess financial implications: Ensure that post-acquisition investment requirements are fully understood and budgeted for.

    Do we have sufficient projected cash flow or available credit to commit to both the transaction and long-term maintenance/development of the tech assets?

Flying Blind with Compliance and Risk Management

Tech assets that have been designed in a vacuum of compliance and risk management often fall into the “bad” asset category. Design constraints, metadata collection, or regulatory requirements must frequently be incorporated from the beginning of a project. When things go really wrong, they can taint an entire asset or business. Understanding these potential risks begins with reviewing the culture of compliance and risk management – or lack thereof.

To be clear, this doesn’t mean that you need to start with the headcount for compliance or legal departments. There are plenty of high-quality, valuable assets built without a full team of attorneys or a Chief Risk Officer. What’s most important is that the people who designed or developed technology or data products had an appreciation for risk management and regulation. While compliance and legal departments can certainly help, most risk is generated by the individuals making daily decisions about what features to build or what data to collect.

Traditional diligence approaches often identify some elements of this “cultural awareness,” like product design documentation, risk registers, or related policies and procedures. However, there is no substitute for technical diligence on the infrastructure, source code, data provenance, and machine learning models. Even the best-intentioned policies and procedures cannot guarantee that software or data does not run afoul of regulatory frameworks like GDPR, HIPAA, or ITAR. While many of these topics may be covered in purchase agreements, acquirers do best to identify these issues before closing. Even when these risks don’t sink the deal or result in price adjustments, the parties can begin working towards risk mitigation or rep and warranty disclosures.

Making Strategic Strategic Acquisitions

Corporate boards overseeing strategic tech acquisitions must balance optimism about future potential with a clear-eyed assessment of current realities. It’s easy to jump to thoughts of what the future could look like with the acquired technology or data, but acquirers should ensure that their hopes of the future are backed up by the actual state of these assets.

Boards should:

  1. Require management to present a clear integration and value creation plan for each acquisition.
  2. Ensure that technical due diligence is conducted by qualified experts.
  3. Consider the long-term strategic fit of the acquisition, not just short-term financial projections.
  4. Pay close attention to potential risks, especially around IP, compliance, and technology scalability.

While one company’s tech trash may indeed be another’s treasure, it’s the board’s responsibility to ensure that the company looks inside the treasure chest before committing shareholders’ capital. By taking a strategic, thorough approach to tech asset acquisitions, boards can help their companies navigate these complex decisions and make informed decisions that create long-term value.

Related Posts

View All Posts »

Discover how robust information security practices can significantly enhance your company's value and appeal to potential buyers. Learn about key strategies in establishing security baselines, leveraging existing standards, and creating a security-aware culture from an experienced entrepreneur and advisory board member.