Author Archives: Thrive

Audax Private Equity and Aspen Surgical Select Thrive for Carve-Out and Ongoing Technology Platform Support Download Now
Audax Private Equity, a leading investment firm, recently acquired Aspen Surgical, a surgical products business previously under Hillrom’s umbrella. This case study highlights how Thrive, a trusted technology partner, facilitated a seamless transition for Aspen Surgical’s IT infrastructure, enabling a successful carve-out and setting the stage for future growth and innovation.
Separation Struggles

Aspen Surgical tackled the challenge of untangling its IT infrastructure from its former parent company, Hillrom, which involved adding new servers, migrating data, and enhancing security. Audax and Aspen Surgical sought a partner to establish their new IT infrastructure and ensure timely completion before the transitional services agreement expired.

Thrive Chosen for Expertise in Mid-Market, PE-backed Ventures

Audax chose Thrive for its innovative approach and proven expertise in mid-market, PE-backed ventures, streamlining critical projects like mergers and acquisitions. “Thrive’s portfolio-wide reporting back to the fund is unique in the marketplace and ensures secure and scalable platforms. Additionally, its proactive cybersecurity approach mitigates post-acquisition risks and lays the groundwork for seamless add-on investments,” said Kevin Ellis, Vice President of Sales at Thrive. Audax also valued Thrive’s dedicated PE-focused teams and tailored support for fast-growth businesses.

Precision in Action: Planning and Execution

Collaborating closely with Aspen Surgical’s internal IT team, Thrive meticulously planned server and data migration, deployed new Office 365 tenants, and implemented robust security measures with an innovative ticketing system for quick response time, resolution and communication. This strategic approach ensured minimal downtime and disruption to operations, laying a secure foundation for future endeavors.

Seamless Deployment

Thrive prioritized security and scalability by implementing advanced endpoint security measures and robust backup and disaster recovery services. These efforts aimed to mitigate cybersecurity threats and minimize downtime risks. Solutions deployed include ThriveCloud, ServiceNow technology, Security Information and Event Management (SIEM), 24x7x365 Security Operations Center, NextGen Endpoint Security (EDR), Vulnerability Scanning, End User Security Training, Phishing Simulation.

Our PE-experienced team possesses the technical and strategic skills to navigate rapid growth scenarios, providing unparalleled support focused on value creation, protection, and PE-specific engineering and account management. Throughout the carve-out process, Thrive ensured project completion within the confines of the transitional services agreement, emphasizing the importance of effective communication and comprehensive project management.

Realizing the Vision: Achieving Success with Thrive

With Thrive’s aid, Aspen Surgical smoothly transitioned to its new IT infrastructure, bolstered by NextGen services for scalability and resilience, while proactive cybersecurity measures ensured value protection post-acquisition. Leveraging Thrive’s services, including ThriveCloud, Aspen Surgical guarantees scalable solutions for future growth, with ongoing support ensuring a robust IT setup. With Thrive’s help, Audax and Aspen completed the carve-out on time and budget, facilitating rapid expansion and investments for Aspen Surgical’s future prosperity.

Revolutionizing Private Equity Transactions

Thrive’s unparalleled expertise in supporting PE transactions transcends individual carve-outs. By providing portfolio-wide reporting and innovative solutions tailored to PE firms’ unique needs, Thrive is poised to revolutionize how investment firms manage and optimize their technology investments, driving value and enabling strategic growth initiatives.

Thrive’s Value Creation and Protection Designed for PE

Acquisitions draw attention, making companies vulnerable to impersonation and phishing. Smaller to mid-market PE firms with technical debt are especially at risk due to outdated security. Immediate security analysis post-acquisition is crucial to mitigate threats promptly. Neglecting this can lead to significant financial losses, emphasizing the need for proactive cybersecurity measures to safeguard against attacks targeting newly acquired businesses.

Agile and Adaptive for PE Transactions

Thrive consistently conducts thorough IT operations reviews and security evaluations. In many cases involving PE firms, transactions come with technical debt and scalability challenges. Nonetheless, Thrive’s agility allows for swift adjustments to the current operational landscape, ensuring seamless support and adaptability to evolving needs.

“Our team was faced with a significant migration project and we sought out an experienced partner to help us make the process seamless and be available as an extension of our internal team for support when needed. Thrive ended up being the partner we were looking for – and more. ~ Christopher Dukes, VP of Information Technology, Aspen Surgical

 

How can Thrive help your business?

Thrive is a leading provider of outsourced IT Infrastructure designed to drive business outcomes by helping you get the most out of your IT.

To learn more about our services and discuss how we can help you optimize the operations of your portfolio companies, please fill out the form below.


Optimizing Operations for Portfolio Companies

As portfolio companies harness digital technologies to drive growth and innovation, they become increasingly reliant on cloud computing and interconnected systems to streamline operations and enhance productivity. However, with these opportunities come inherent risks, including cyber threats such as data breaches, ransomware attacks, and insider threats, which can have profound implications for the financial performance and reputation of portfolio companies – and their private equity backers.

The convergence of cybersecurity and cloud security is particularly relevant for portfolio companies, as they operate within the broader ecosystem of their parent investment firms. Any cybersecurity breach or data compromise within a portfolio company can not only impact its own operations but also reverberate throughout the investment portfolio, affecting investor confidence, valuation, and long-term strategic objectives.

optimizing operations for portfolio companies cover

Conquer Cybersecurity Complexity through Consolidation

Download your copy of the Gartner® Simplify Cybersecurity With a Platform Consolidation Framework report for insights into how using a cybersecurity platform consolidation framework simplifies cybersecurity by streamlining products to improve risk posture.

You will learn about the benefits of vendor consolidation, how to analyze your readiness, and the steps you can take to start the processes.

Download the Gartner report today!

gartner cybersecurity platform consolidation framework image

Gartner, Simplify Cybersecurity With a Platform Consolidation Framework, Dionisio Zumerle and John Watts, 26 March 2024.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

AI Policy Template

Be sure to establish Data Governance and Privacy Protocols before implementing GenAI

Business and IT leaders must approach the integration of Copilot and similar AI solutions with extreme caution and foresight. The allure of enhanced productivity and innovation must be balanced against the inherent risks posed by these powerful tools.

Download our sample AI policy template for a starting point as you look to create and implement robust, company-wide data governance policies and privacy protocols that make safeguarding sensitive information a priority. It’s vital to preemptively ensure that only authorized personnel have access to critical data and that stringent security measures are in place to prevent unauthorized access.

Thrive AI Policy Template Cover

Disclaimer: This policy template is meant to provide general guidelines and should only be used as a reference. It is not a legal document. It may not take into account all relevant local, state, or federal laws. Thrive does not assume any legal liability that may arise from the use of this policy.

Thrive Spotlight: Ryan Goodwin, Architect, Public Cloud Services

Welcome back to another installment of our “Thrive Spotlight” blog series.

Our featured employee is Ryan Goodwin, an Architect of Public Cloud Services, who focuses on defining and standardizing Thrive product offerings in Microsoft Azure. His role encompasses the product’s operational and technical aspects and manages the “Thrive Way” of operating the public Cloud space.

Ryan calls New York City home and enjoys spending time with family. His two children, a 3-year-old girl and an 11-month-old boy, keep him hopping. He also enjoys hitting the slopes and playing basketball when he has free time.

Hi Ryan! Can you tell us about your background and how you came to Thrive?

I started working for Precision IT when I got out of college. My primary responsibility then was to sort through client hardware orders and ensure they made it to the customer. I worked my way through the ranks, from helpdesk to field engineer and lead senior systems admin. At the time of our acquisition by Thrive, I was the CTO, focusing on our product development, technical standards and private Cloud.

Where did you go to school or get training?

I graduated from Syracuse University with a Bachelor of Science in Information Management and Technology. As I’ve been working, I’ve picked up several industry certifications. Plus, I’m a big fan of reading and always up for learning something new – my training is a never-ending story!

What do you most enjoy about working for Thrive?

One notable aspect is the significant professional growth opportunities that Thrive offers, which might be more limited in smaller organizations. Contributing to pivotal initiatives such as the design, development, and implementation of ServiceNow and leading projects related to new acquisitions underscores the diverse and impactful responsibilities I embrace in my role.

Are there any recent exciting projects at Thrive you can tell us about?

In the early stages of my current role, I successfully implemented Azure Lighthouse. This strategic deployment allows Thrive to monitor all Azure customers efficiently through a unified interface. The primary objective was to optimize operational and technical processes, promoting heightened efficiency. The experience of developing a solution that facilitates streamlined operations for our teams.

 

Are you interested in learning more about Thrive? Click here!

Don’t forget to follow us on Twitter and LinkedIn for the latest news, and continue checking our blog for more in our “Thrive Employee Spotlight” series. Until next time…

Navigating Smooth Waters: How Thrive Transformed Transmarine Navigation’s IT Landscape Download Now

 

Transmarine Navigation, part of the Horizon Group, specializes in providing port agency management services and addressing the requirements of shipping companies globally. This case study details how Thrive, a trusted technology partner, supported Transmarine Navigation in addressing a critical staffing gap, stabilizing its IT operations, and bolstering its cybersecurity resilience.

As a ship’s agency, Transmarine acts as a vital service provider for ships entering and exiting ports, ensuring seamless operations of cargo and port services throughout the maritime journey. However, an unexpected IT staffing departure caused waves in daily operations that could have had a destructive ripple effect across sea transport.

Why Thrive Was Chosen

“We decided to work with Thrive for our security and networking needs because we were impressed with its effectiveness and knowledge in these fields, which gave us confidence in its ability to deliver,” said Travis Sirmon, Director of Technology at Transmarine Navigation.

By partnering with Thrive, Transmarine avoided building internal teams and infrastructure for security and networking, opting for a plug-and-play solution instead. Thrive’s familiarity with Transmarine’s environment allowed it to seamlessly implement the necessary measures to ensure compliance on both the network and security fronts.

Thrive’s Strategic Deployment and Evolution

In the beginning, Thrive was instrumental in jumping in ASAP to handle Transmarine’s day-to-day service needs, helping solidify processes for the IT team and bolster our internal support operations. Thrive put together a support desk to give users a way to contact technical experts for help. Thrive also implemented the Microsoft 365 Admin Center to make it more efficient and effective. After stabilizing the internal support, Transmarine recognized Thrive had more to offer in terms of security and network management and opted to deepen the partnership. Transmarine tapped Thrive to optimize its IT infrastructure to make it more efficient and secure. Thrive then shifted into more of a 24/7 support partner for network and security, eventually passing the helpdesk back to the Transmarine team. “Thrive dove into our legacy equipment, guiding us through assessing our existing assets. They initiated firmware upgrades and enhancements, prompting us to entrust them to manage our hardware responsibilities,” added Sirmon.

Thrive’s Impact

Thrive’s impact on Transmarine Navigation extends far beyond mere technological enhancements. Thrive’s significant contribution was evident in Transmarine’s first Customer Satisfaction (CSAT) assessment, which showed remarkable improvement with triple the scores from the previous year. In an industry where security concerns loom large due to global vendor interactions with varying requirements, Thrive’s expertise in fortifying network infrastructure to protect Transmarine’s data and communications becomes indispensable.

Conclusion

Thrive’s partnership significantly alleviated the strain on Transmarine Navigation’s resources, allowing them to focus on serving their clients effectively. “Thrive’s unwavering support and effective communication underscore the importance of strong relationships in navigating IT obstacles, especially in higher-end networking and security,” said Jay Pearson, IT Support Specialist at Transmarine Navigation

 

Transmarine Logo Vert with tag

“Thrive’s significant contribution was evident in our first Customer Satisfaction (CSAT) assessment, where we saw a remarkable improvement, tripling our scores from the previous year. This surge in satisfaction directly reflects Thrive’s commitment to excellence and underscores their pivotal role in our vertical, particularly within the maritime and transportation sectors.” ~ Travis Sirmon, Director of Technology, Transmarine Navigation

 

 

About Thrive

Thrive delivers global technology outsourcing for cybersecurity, Cloud, networking, and other complex IT requirements. Thrive’s NextGen platform enables customers to increase business efficiencies through standardization, scalability, and automation, delivering oversized technology returns on investment (ROI). They accomplish this with advisory services, vCISO, vCIO, consulting, project implementation, solution architects, and a best-in-class subscription-based technology platform. Thrive delivers exceptional high-touch service through its POD approach of subject matter experts and global 24x7x365 SOC, NOC, and centralized services teams. Learn more at www.thrivenextgen.com or follow us on LinkedIn.

Optimizing Operations for Portfolio Companies

As portfolio companies harness digital technologies to drive growth and innovation, they become increasingly reliant on cloud computing and interconnected systems to streamline operations and enhance productivity. However, with these opportunities come inherent risks, including cyber threats such as data breaches, ransomware attacks, and insider threats, which can have profound implications for the financial performance and reputation of portfolio companies – and their private equity backers.

The convergence of cybersecurity and cloud security is particularly relevant for portfolio companies, as they operate within the broader ecosystem of their parent investment firms. Any cybersecurity breach or data compromise within a portfolio company can not only impact its own operations but also reverberate throughout the investment portfolio, affecting investor confidence, valuation, and long-term strategic objectives.

optimizing operations for portfolio companies cover

The Risks of Neglect: Celebrating Identity Management Day

Since 2021, Identity Management Day has been celebrated annually as an event dedicated to raising awareness about the importance of protecting personal information online. Held on the second Tuesday of April, this day serves as a reminder for individuals and organizations alike to take proactive steps in safeguarding their digital identities as part of a comprehensive approach to cybersecurity.

Understanding the Importance of Identity Management

The significance of managing and securing online identities cannot be overstated. An online identity is not just a collection of usernames and passwords; it’s a digital representation of who a person is and their most confidential information. From sensitive financial data to personal communications, a breach of an online identity can have far-reaching consequences, including identity theft, financial loss, and reputational damage.

The Risks of Neglect

There are numerous ways hackers can exploit vulnerabilities in your team’s online identities, such as phishing scams and malware attacks. Without proper management and end-user security measures in place, anyone in your organization could easily fall victim to these threats.

Best Practices for Identity Management

So, what can you do to help protect the online identity of anyone in your company? Here are some best practices to keep in mind:

  • Use Strong, Unique Passwords: Avoid using the same password for multiple accounts, and opt for complex passwords that include a mix of letters, numbers, and special characters.
  • Enable Multi-Factor Authentication (MFA): Adding an extra layer of security with MFA can help prevent unauthorized access to your accounts, even if your password is compromised.
  • Regularly Update Software and Applications: Keep your operating system, web browsers, and applications up to date to patch any security vulnerabilities that hackers could exploit.
  • Be Mindful of Sharing Personal Information: Think twice before sharing sensitive information online, and be cautious of phishing attempts disguised as legitimate requests for personal data.
  • Monitor Your Accounts: Regularly review your online accounts for any suspicious activity, and report any unauthorized transactions or login attempts immediately.

Identity Management Day serves as a timely reminder of the importance of taking proactive steps to safeguard our personal information online. By following best practices for identity management and staying informed about emerging threats, we can minimize the risk of falling victim to cybercrime and protect our digital identities for years to come. For additional information on how to keep your information secure on Identity Management Day and every day, contact Thrive today!

Thrive Spotlight: Mark Lopshire – Strategic Account Executive, Private Equity Group

Welcome back to another installment of our “Thrive Spotlight” blog series.

Our featured employee is Mark Lopshire, Strategic Account Executive, Private Equity Group.  In his position he manages a diverse portfolio comprising high-growth mid-sized, and emerging companies.  He works closely with these organizations leveraging his expertise to implement strategic measures that bolster their security framework and provide tailored solutions aligned with their unique business objectives.

Mark lives in Derry, New Hampshire and likes to spend as much time with his family as he can.

Hi Mark!  Can you tell us about your background and how you came to Thrive?

I have been in the technology industry for over 27 years and have been working for Thrive the past 17 years.  Previously, I have worked as a systems engineer, sales engineer, solutions architect, engineering director, consultant, vCIO, and have had several sales and account management roles.

Where did you go to school or get training?

I started school at Eastern Nazarene College on a pharmacy track through a partnership with Massachusetts College of Pharmacy.  In my second year, I discovered my passion for technology and decided to redirect my career path.  I enrolled in the Boston University’s Corporate Education program and obtained my MCSE certification.  Throughout my years within the industry, I have worked on various certifications to enhance my expertise and align with the evolving demands of the tech industry.

What do you most enjoy about working for Thrive?

Every day at Thrive is filled with excitement and growth as we continually evolve. I consider myself fortunate to work alongside individuals who share a strong work ethic and a deep commitment to putting our clients first.  Thrive encourages us to challenge the status quo and strive for continuous improvements in and processes and services.  It is a dynamic environment that fosters innovation and empowers employees to deliver the best possible results for our clients.

Are there any recent exciting projects at Thrive you can tell us about?

My clients consist of private equity-held companies that are in a phase of rapid growth. Our primary focus is on facilitating their continuous expansion by assisting with strategic acquisitions and ensuring seamless integration into platform organizations. Our approach emphasizes minimizing disruption while prioritizing the highest levels of security throughout the process.

 

Are you interested in learning more about Thrive? Click here!

Don’t forget to follow us on Twitter and LinkedIn for the latest news, and continue checking our blog for more in our “Thrive Employee Spotlight” series. Until next time…

The Change Healthcare cyberattack: lessons for data security

The effects of the Change Healthcare cyberattack have rippled through the health care sector over the past few months, leading to outages, payment delays, and even cancellation of patient appointments. Hospitals and other health care organizations are learning, sometimes the hard way, that their cyber resiliency needs to be improved.