주요 콘텐츠로 건너뛰기
인텔 로고 - 홈페이지로 돌아가기
내 도구

언어 선택

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
로그인 제한된 콘텐츠 접근

Intel.com 검색 사용

몇 가지 방법을 통해 Intel.com 사이트 전체를 간편하게 검색할 수 있습니다.

  • 브랜드 이름: 코어 i9
  • 문서 번호: 123456
  • Code Name: Emerald Rapids
  • 특별 운영자: "Ice Lake", Ice AND Lake, Ice OR

바로 가기

가장 인기있는 검색 결과를 찾으려면 아래의 퀵 링크를 찾아볼 수 있습니다.

  • 제품 정보
  • 지원
  • 드라이버 및 소프트웨어

최근 검색

로그인 제한된 콘텐츠 접근

고급 검색

다음에서만 검색

Sign in to access restricted content.
  1. Robust, Sustainable Merger & Acquisition Process

사용 중인 브라우저 버전은 이 사이트에 권장되지 않습니다.
다음 링크 중 하나를 클릭하여 브라우저를 최신 버전으로 업그레이드하십시오.

  • Safari
  • Chrome
  • Edge
  • Firefox

PDF 다운로드
PDF 다운로드

Intel IT's Robust Merger & Acquisition Process

A robust merger and acquisition (M&A) process (which also applies to divestures) is a growing aspect of Intel’s business. But there is nothing simple about evaluating and integrating technologies and business capabilities or supporting incoming employees. IT organizations must use their experience to focus on the following areas:

  • Security and privacy. Cybersecurity and privacy pose a particular risk to the value of M&A before, during, and after closing the deal.
  • Integration. Understanding new business capabilities and the challenges of data harmonization are necessary to developing a phased and prioritized approach.
  • Technical debt. Existing systems are not phased out overnight and must be maintained until integration is cost effective and/or necessary.

At Intel, we have a dedicated IT M&A team that does more than execute on deals. We participate in due diligence discovery, planning, and integration to help Intel secure greater business value, and sometimes highlight potential unforeseen costs. We use an M&A lifecycle process to approach each deal with guiding principles of putting employees, suppliers, and the business value first.

The IT M&A team advocates across IT to help deliver customized, secure, and cost-effective solutions, and brings expertise in its operating model, strategy, and capabilities. We are accountable for aligning IT capabilities and business processes, and our robust professional network brings a cohesive approach to each deal.

Divestures—or separation programs—can be as challenging as acquisitions. They are largely dictated by the buyer’s integration plan, giving us much less control. When planning a divesture, we use the following:

  • Mission critical (Pre-sign). This is what must be in place at or immediately after close. It requires a full assessment of the IT footprint being divested, transition services agreements (TSAs), partner and commercial agreement alignment, and working with the buyer to develop a “Day 1” plan.
  • Initial separation (Close/Day 1). These are initial separation activities, such as removing separated employees from IT systems, exporting relevant data, physically moving people, putting TSAs and commercial support in place, and updating IT systems to reflect sold inventory.
  • Final separation (Day 2). This is the final separation of IT capabilities, such as extracting deal-relevant data from all remaining systems, terminating TSAs, and cleaning up connectivity, assets, and so on.

M&A is not simple, but in today’s business it is increasingly more common. While many organizations outsource this work, at Intel we have achieved great success by forming a dedicated IT M&A team that handles due diligence as well as integration. With a consistent M&A lifecycle process, we have built years of experience in evaluating, prioritizing, planning, and executing the integration of incoming organizations and the separation of divestures.

Cybersecurity is a particularly risky area as breaches can result in unforeseen costs, and even devaluation of the deal. Our planned approach brings a clearer understanding of the challenges, opportunities, and risks that help us add value to the business and ease the transition for employees.

관련 비디오

상세히 표시 간단히 표시

관련 자료

  • 회사 정보
  • 우리의 약속
  • 포용력
  • 투자자 관련 정보
  • 연락처
  • 새 소식
  • 사이트 맵
  • 채용정보
  • ©인텔사
  • 이용 약관
  • *법률 정보
  • 쿠키
  • 개인정보처리방침
  • 공급망 투명성
  • 개인 정보를 공유하지 마십시오 California Consumer Privacy Act (CCPA) Opt-Out Icon

인텔 기술은 지원되는 하드웨어, 소프트웨어 또는 서비스 활성화를 요구할 수 있습니다. // 어떤 제품 또는 구성 요소도 절대적으로 안전하지는 않습니다. // 비용과 결과는 달라질 수 있습니다. // 성능은 용도, 구성 및 기타 요인에 따라 달라질 수 있습니다. 자세한 내용은 intel.com/performanceindex 에서 확인하십시오. // 모든 법적 고지 및 면책 사항을 참조하십시오. // 인텔은 인권을 존중하고 인권 침해 공모를 방지하기 위해 노력합니다. 인텔의 글로벌 인권 규정을 확인하십시오. 인텔의 제품 및 소프트웨어는 국제적으로 합의된 인권을 침해하지 않는 응용 프로그램에서만 사용되어야 합니다.

인텔 바닥글 로고