crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Solid Vendor Management Leads To Solid Successes

In order to function properly, any business will need to procure certain pieces of equipment. Some of this equipment will be specialized to the business’ purpose, while some will be the sort that may be more commonly found in offices everywhere. This equipment must be procured from somewhere, and this is where vendors come in--but who in your organization is responsible for your vendor management?

A Two-Way Street
While you might consider your vendors to be an asset to your business, providing you with what you need to function, you have to remember that they are businesses as well. As a result, they are trying to profit from your relationship with them. However, the relationship between you and your vendor doesn’t have to have nonreciprocal benefits.

Rather than attempting to undercut their businesses by seeking discounts and cost cuts, form partnerships with your vendors. Be open with your needs so that they may better serve them, and contribute resources that can assist the vendor in fulfilling those needs. Instead of looking at your relationship with your vendor as a business transaction, look at it in terms of being a partnership--preferably a lengthy one. The longer you work with a vendor, the higher quality service you will likely receive, the friendlier your negotiations will be, and you will more likely develop a working relationship that focuses on maximum benefit for both parties.

Finding The Right Vendor
Of course, like any business relationship, there are good fits and bad fits. You will want to make sure that you are selective as you choose your vendor from your many options.

  • First, you will need to establish what you require from your vendor, based on the principles that are foundational to your business. Once you have done so, establish how you will rank each candidate you consider against each other in order to make your final call.
  • This can be made easier by creating a variety of bid documents to inform vendors of your business’ requirements. These can include:
    • Request for Quote, or RFQs. This is most useful when price is your largest concern.
    • Request for Information, or RFIs, can help you to get an insider’s look at the market as a whole to better inform your decision. If you like what you see, it is common that you would move on to the next variety of bid document.
    • Request for Proposals. RFPs are almost a practice run for the vendor to prove their worth. By presenting them with a problem, the RFP allows vendors to show you what they would do to resolve your issues. However, if you make the RFP too detailed, or not detailed enough, you could scare away prospects or receive inaccurate quotes back.

Negotiations Needed
At the end of the day, you will need to find a vendor who is willing to work with you to mutually achieve your goals along with theirs. To do so, you may have to compromise, but with clear and constant communication, you will likely find a vendor whom you can work with easily.

Ongoing Support
Purchasing a solution from a vendor isn’t typically the end of the relationship. In fact, when something goes wrong, it can take a lot of time to work through issues. Depending on your SLA (Service Level Agreement) you may need to put in a ticket and wait for a response, or sit through hold music and describe your issue to multiple support representatives until things get moving in the right direction. The last thing you want is your employees stuck in support purgatory while they wait for something to get fixed. Having a dedicated resource for managing vendors, who understands all of the various SLAs and warranties will go a long way.

Integrated Business Technologies can help with your technology vendors. We’ve been building relationships with various vendors throughout the industry. Not only are we accustomed to working with these vendors, but we can help hone in on the solutions your business needs. Give us a call at (918) 770-8738 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 20 July 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Cloud Internet Microsoft Business Computing Best Practices Saving Money Productivity Workplace Tips IT Services Backup Hosted Solutions Hackers Mobile Devices Email Malware Software IT Support Business Small Business Hardware Network Data Communication Server Smartphones Upgrade VoIP Google Windows Computer Business Continuity Mobile Device Management Virtualization Efficiency Microsoft Office Disaster Recovery Miscellaneous Innovation Mobile Office Vendor Management Holiday Gadgets Social Media BYOD Outsourced IT Mobile Computing Android Smartphone Data Backup Quick Tips Passwords User Tips Managed IT services Network Security WiFi Bring Your Own Device Tech Term Windows 10 Internet of Things Browser The Internet of Things Ransomware Spam Best Practice Remote Monitoring Trending Operating System Apple Remote Computing Users Data Recovery Alert Wireless Technology Data Management Going Green Content Filtering Artificial Intelligence Firewall History Gmail Save Money Facebook Printer Tech Support IT Consultant Encryption Information Technology Current Events Managed IT App Customer Relationship Management Unified Threat Management Big Data Office Analytics IT Solutions Lithium-ion Battery Humor Saving Time Antivirus Document Management Cloud Computing Avoiding Downtime Paperless Office Maintenance Hard Drives Applications Employer-Employee Relationship Windows 8 Router Two-factor Authentication Compliance Automation Cybersecurity Office Tips Retail Phishing Bandwidth Apps Application IT service Virus Digital Payment Mobile Device Chrome VPN Business Growth Risk Management Fax Server Outlook Health Productivity Website Customer Service Hacking Computers Managed IT Services Marketing Phone System Excel Collaboration Project Management Budget Proactive IT Computer Repair Regulations Mouse Recovery Money Data Security Training Net Neutrality Running Cable Social Licensing File Sharing PowerPoint User Error Social Networking Wi-Fi Unified Communications Co-Managed IT Tablet Infrastructure Office 365 iPhone Password Government Administration Presentation Augmented Reality Inbound Marketing Search Piracy Virtual Desktop USB Business Owner Internet Exlporer Files Sports Smart Technology Hacker User Point of Sale Programming Mobile Security Company Culture Analyitcs Twitter IoT Mobility Education Specifications Safety Settings Flexibility Hosted Solution IBM Tip of the week Cost Management Wireless Data storage Cybercrime Save Time Help Desk Wearable Technology Robot Hiring/Firing Alerts Printing Display End of Support LiFi Computing Statistics IT Support Vulnerability Intranet Competition Business Intelligence Blockchain HIPAA Network Congestion Recycling eWaste Downtime Data loss Redundancy Scam BDR Knowledge Environment CIO Scheduling Mobile Assessment Fraud Mirgation Telephony Access Control Solid State Drive Bluetooth Online Currency Samsung Smart Tech Identity Theft Cyber Monday Legal Experience Troubleshooting Debate Managing Stress IT Management Computer Accessories Business Technology Storage SharePoint Heating/Cooling Alt Codes Consumers Crowdfunding Connectivity YouTube Enterprise Content Management Network Management Networking Migration Machine Learning Downloads Typing Distributed Denial of Service IP Address Google Drive How To Vulnerabilities Windows 10 Hotspot Touchscreen Chatbots Private Cloud Multi-Factor Security Refrigeration Cryptocurrency Disaster Macro Star Wars Managed IT Service Google Docs Geography Language Techology Identity Public Cloud Google Calendar Bitcoin Digital Signature Memory Utility Computing Software Tips Break Fix Laptop communications High-Speed Internet Server Management Computing Infrastructure Sync Legislation Hacks Gaming Console Documents Conferencing Healthcare Dark Web Halloween Disaster Resistance Entrepreneur Development Cooperation Motherboard PC Care Mobile Device Managment Undo PDF Value People Hard Drive Data Warehousing 5G Scary Stories Virtual Reality IT Consulting Cables eBay Patch Management Staff Remote Support Modem Leadership Software as a Service Skype Streaming Media Cache New Additions Microsoft Excel Monitors Operations SaaS Data Breach Deep Learning Adminstration Print Server Wires Text Messaging Work Station Cookies G Suite Technology Tips Domains Google Wallet 3D Writing LinkedIn Management Congratulations Fun Virtual Private Network Chromebook Technology Laws Word Law Firm IT Video Surveillance Nanotechnology Travel Comparison Public Speaking Drones Windows 8.1 Update Cortana Social Engineering Best Available Buisness Enterprise Resource Planning Permissions IT Technicians Unified Threat Management Identities Screen Reader Black Friday Backups

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code