Blog

What to Do When Your Security Provider Gets Acquired: How to Spot the Signals and Stay Ahead of the Spin

Managed Detection and Response

Cybersecurity Strategy

Greg Crowley

July 16, 2025

11 MINS READ

When it comes to my career in the cybersecurity industry, I’ve been on both sides of the table during an acquisition. I’ve sat in the CISO seat when a trusted endpoint protection platform partner was acquired and spent long nights trying to figure out what would change – or not change – about the risk landscape I was responsible for.

Now, as the CISO at eSentire, it would be up to me to help our own customers navigate the realities of M&A in the cybersecurity world. Trust me, there’s more happening under the surface than most press releases will ever admit.

If you’re reading this, you might be in the same place I was: your MDR, SIEM, or XDR vendor just announced an acquisition, or maybe you’re just watching industry headlines, wondering when it will happen to you.

And you’re right to be alert; M&A activity in cybersecurity isn’t slowing down, which may be due to more security leaders choosing to consolidate their technology stack. According to PwC’s 2024 Global Digital Trust Insights, 60% of organizations say they’ve had to adjust their security strategy in the past two years directly because of vendor consolidation.

So, what’s really going on when a security provider gets acquired, and how can you as a security leader keep your organization safe? Here’s my playbook, drawn from years on both sides of the buy/sell line.

Don’t Panic, But Don’t Get Comfortable Either

Let’s start with the emotional response. When I first got the news that a key vendor was being acquired, I’ll admit I felt a little uneasy. I’ve seen teams freeze and do nothing, just hoping for the best, and I’ve seen teams overreact, immediately looking to switch vendors at the first sign of trouble.

The reality? Neither extreme is helpful. What you need in this moment is clear-headed action. Acquisitions almost always bring change, but the speed and visibility of those changes can vary. There are cases where things go smoothly, and the customer experience stays high. But that isn’t something you should just hope for.

The first thing you should do is pay close attention to what’s said – and, more importantly, what’s left unsaid – in any official communication from both the acquired and acquiring companies. Read between the lines. Are they being transparent about timelines for integration, changes to the support model, whether how they will prioritize you as a customer or the future of the product you rely on? Or is it just the usual “we’re excited to join forces” fluff?

Then, get tactical:

In my own experience, the security leaders that start these steps early are the ones that avoid scrambling later. The ones who “wait for the dust to settle” often find themselves reacting to changes after the fact, sometimes with real consequences.

Don’t Settle for Generic Answers; Ask the Hard Questions

Let’s be honest – acquisitions are full of marketing spin. Every customer is going to get the same “Nothing will change” line, at least at first. It’s in every press release, every customer webinar, every FAQ.

But in the real world, “nothing will change” often means “we haven’t decided what’s changing yet, so we’ll say nothing is.”

I’ve learned, both as a customer and now as a provider, that you must be persistent and specific if you want answers that mean anything so here’s my advice:

One lesson I’ve learned the hard way: avoid the temptation to ask “softball” questions like “Will my business remain a priority?” No one is going to answer that honestly.

Focus on what you can track and what’s enforceable – SLAs, response times, support access, and compliance documentation. Your goal isn’t to be antagonistic, but to be an informed, proactive customer.

Compliance and Data Residency: The Risks That Sneak Up On You

One area that causes anxiety for most CISOs during a vendor acquisition is compliance and data residency. This is where the hidden risks live. An acquisition can change where your data is stored, who has access to it, and which regulatory frameworks apply.

Here’s what I recommend based on my experience:

The worst time to discover a compliance gap is when a regulator or auditor is already knocking at your door. Being proactive here isn’t just smart; it’s essential.

Red Flags: The Signals No Press Release Mentions

There are almost always warning signs that things are about to go sideways with your provider, but you must know what to watch for. Most customers don’t notice the change until after something major has gone wrong – whether it’s a support disaster, a major feature being dropped, or even a security incident.

From my own “battle scars,” here are the signals I track closely:

I recommend keeping a running log or tracker. In one of my past roles, I did the same and that allowed us to escalate with both our leadership and our vendor before things hit a breaking point.

Don’t Get Caught in a Platform Trap

A major driver behind many security acquisitions these days is the push toward broader “security platforms.” The goal for many acquirers isn’t just to own a single point solution, but to bring your business into their ecosystem – sometimes whether you want to or not.

The numbers back this up: IDC reports that 57% of security leaders said they were “encouraged” (or required) to adopt additional tools or licenses because of a provider M&A event in the last 18 months.

What does this look like in practice?

My recommendation:

Metrics Matter; Don’t Just Trust Your Gut

In the aftermath of an acquisition, you might feel like service is slipping but you need evidence, not just anecdotes, to make your case (internally or with your vendor). Tracking objective metrics not only protects you but also arms you with data if you need to escalate or make a business case for change.

Here’s what I track and why:

In my previous CISO roles, I always had a baseline of what “normal” looked like for these metrics before the acquisition. If you see downward trends over a couple of quarters, don’t ignore them. Bring them up with your vendor, escalate with your leadership, and be prepared to act. You’ll also find this data invaluable if you ever need to negotiate out of a contract for “material degradation” in service.

How to Prepare: A CISO’s Acquisition Readiness Checklist

The best time to get ready for a vendor acquisition is before it happens to you. Here’s what I recommend, based on lessons learned, not just best practices:

1. Know Your Contract Inside and Out

2. Establish a Metrics Baseline

3. Map Your Dependencies

4. Build Your Network

5. Develop a Contingency Plan

You don’t have to do all of this at once, but chipping away at it over time can make a huge difference if you ever need to act quickly.

Looking back, I’ve seen acquisitions play out both ways—some are genuinely positive, with new investment and better capabilities. Others have led to dropped features, service gaps, or even compliance headaches that took months to resolve. The difference always comes down to preparation and vigilance.

Don’t let a vendor acquisition catch you off guard. Read between the lines, ask hard questions, track your metrics, and have a plan. If you do, you’ll find you can weather these changes and maybe even come out stronger on the other side.

To learn how your organization can build cyber resilience and prevent business disruption with eSentire’s Next Level MDR, connect with an eSentire Security Specialist now.

GET STARTED

ABOUT THE AUTHOR

Greg Crowley
Greg Crowley Chief Information Security Officer

Greg Crowley is an accomplished executive with over 20 years in Information Technology and Cybersecurity with extensive experience in managing enterprise security and mitigating risk for global hybrid networks. Greg believes that as a leader in the cyber world, being able to communicate and execute a strategic vision to defend and protect is the most important part of his role. Prior to joining eSentire, Greg oversaw the overall cybersecurity function as Vice President of Cybersecurity and Network Infrastructure at WWE (World Wrestling Entertainment). He spent over 17 years in various leadership roles across engineering, infrastructure and security within that organization. Greg holds a Bachelor's degree from Queens College. He is a Certified Information Security Manager (CISM) and a Certified Information Systems Security Professional (CISSP).

Back to blog

Take Your Cybersecurity Program to the Next Level with eSentire MDR.

BUILD A QUOTE

Read Similar Blogs

EXPLORE MORE BLOGS