Over the past decade, IT company ownership has experienced drastic change. In the 2010s, IPOs (initial public offerings) were the preferred strategy, then it seems to have switched to LBOs (leveraged buyouts). Private equity firms have gained considerable ground in the past few years as IT company shareholders.
In this report, we will analyze this trend with a special focus on the situation in France and on the vibrant US ecosystem.
Contents:
Management Summary
Introduction
Market Overview
Where Do PE Firms Invest?
What’s Next for Private Equity?
PAC’s Recommendations
SHARE :
This short vendor profile provides a quick overview of the local portfolio and performance of Oesia in Spain.
Event Date : July 14, 2025
This Excel document is part of the company profiles PAC publishes every year at local, regional and worldwide level.
Event Date : March 21, 2025
This document provides market volumes, growth rates and forecasts for the business intelligence (BI) market in Switzerland for the 2022-2028 period.
Event Date : February 14, 2024
This Excel document is part of the company profiles PAC publishes every year at local, regional and worldwide level.
Event Date : August 25, 2025
PAC has evaluated the providers of open digital platforms and related services for specific industrial use cases in Europe.
Event Date : July 30, 2025
Insurance - InBrief Analysis - Austria
Market Reports November 07, 2025
Software & IT Services - InSight Analysis - Denmark
Market Reports November 07, 2025
Seidor - Figures - Spain – FY 31-Dec-2024
Datamart November 06, 2025
Seidor - Vendor Profile - Spain
Vendor Profile November 06, 2025
TCS (Tata Consultancy Services) - Figures - Finland – FY 31-Mar-2025
Datamart November 06, 2025
Atos: Cause for Optimism, Despite the Headlines
Blog Post February 05, 2024
Unit4 Doubles-Down on Industries & Sets Out Growth Plan
Blog Post November 07, 2025
Key Takeaways from Google Cloud Day Romania 2025
Blog Post November 06, 2025
Blog Post November 05, 2025
Orange Business Is Transforming Its Business Model
Blog Post November 04, 2025
Part 6: From Blueprint to Reality – Implementing Core Controls for Data and Application Security
Blog Post November 04, 2025