crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Solid Vendor Management Leads To Solid Successes

In order to function properly, any business will need to procure certain pieces of equipment. Some of this equipment will be specialized to the business’ purpose, while some will be the sort that may be more commonly found in offices everywhere. This equipment must be procured from somewhere, and this is where vendors come in--but who in your organization is responsible for your vendor management?

A Two-Way Street
While you might consider your vendors to be an asset to your business, providing you with what you need to function, you have to remember that they are businesses as well. As a result, they are trying to profit from your relationship with them. However, the relationship between you and your vendor doesn’t have to have nonreciprocal benefits.

Rather than attempting to undercut their businesses by seeking discounts and cost cuts, form partnerships with your vendors. Be open with your needs so that they may better serve them, and contribute resources that can assist the vendor in fulfilling those needs. Instead of looking at your relationship with your vendor as a business transaction, look at it in terms of being a partnership--preferably a lengthy one. The longer you work with a vendor, the higher quality service you will likely receive, the friendlier your negotiations will be, and you will more likely develop a working relationship that focuses on maximum benefit for both parties.

Finding The Right Vendor
Of course, like any business relationship, there are good fits and bad fits. You will want to make sure that you are selective as you choose your vendor from your many options.

  • First, you will need to establish what you require from your vendor, based on the principles that are foundational to your business. Once you have done so, establish how you will rank each candidate you consider against each other in order to make your final call.
  • This can be made easier by creating a variety of bid documents to inform vendors of your business’ requirements. These can include:
    • Request for Quote, or RFQs. This is most useful when price is your largest concern.
    • Request for Information, or RFIs, can help you to get an insider’s look at the market as a whole to better inform your decision. If you like what you see, it is common that you would move on to the next variety of bid document.
    • Request for Proposals. RFPs are almost a practice run for the vendor to prove their worth. By presenting them with a problem, the RFP allows vendors to show you what they would do to resolve your issues. However, if you make the RFP too detailed, or not detailed enough, you could scare away prospects or receive inaccurate quotes back.

Negotiations Needed
At the end of the day, you will need to find a vendor who is willing to work with you to mutually achieve your goals along with theirs. To do so, you may have to compromise, but with clear and constant communication, you will likely find a vendor whom you can work with easily.

Ongoing Support
Purchasing a solution from a vendor isn’t typically the end of the relationship. In fact, when something goes wrong, it can take a lot of time to work through issues. Depending on your SLA (Service Level Agreement) you may need to put in a ticket and wait for a response, or sit through hold music and describe your issue to multiple support representatives until things get moving in the right direction. The last thing you want is your employees stuck in support purgatory while they wait for something to get fixed. Having a dedicated resource for managing vendors, who understands all of the various SLAs and warranties will go a long way.

Integrated Business Technologies can help with your technology vendors. We’ve been building relationships with various vendors throughout the industry. Not only are we accustomed to working with these vendors, but we can help hone in on the solutions your business needs. Give us a call at (918) 770-8738 for more information.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 24 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Business Management Privacy Managed Service Provider Internet Microsoft Cloud Productivity Saving Money Business Computing Workplace Tips Best Practices IT Services Backup Hackers Hosted Solutions IT Support Email Small Business Business Malware Mobile Devices Software Hardware Network Smartphones Data Server Communication Windows Upgrade Mobile Device Management VoIP Business Continuity Google Virtualization Efficiency Microsoft Office Disaster Recovery Computer Mobile Office Vendor Management Miscellaneous Gadgets Holiday Innovation Social Media Quick Tips Android Outsourced IT Smartphone User Tips Windows 10 Mobile Computing WiFi BYOD Best Practice Passwords Remote Monitoring Browser Bring Your Own Device Internet of Things Network Security Users The Internet of Things Trending Operating System Apple Wireless Technology Spam Going Green Alert Managed IT services Firewall Content Filtering Remote Computing History Information Technology Current Events Ransomware Data Backup Gmail Analytics IT Solutions Save Money Lithium-ion Battery IT Consultant Unified Threat Management Big Data Office Managed IT Data Management Printer Tech Support Saving Time Avoiding Downtime Encryption Maintenance Hard Drives App Facebook Customer Relationship Management Windows 8 Antivirus Artificial Intelligence Humor Automation Risk Management Office Tips Retail Data Recovery Phishing Apps Application IT service Virus Phone System Business Growth Fax Server Outlook Employer-Employee Relationship Health Customer Service Hacking Computers Marketing Excel Collaboration Document Management Two-factor Authentication Digital Payment VPN PowerPoint Recovery Tablet Money Training Running Cable Licensing iPhone Chrome User Error Administration Project Management Co-Managed IT Augmented Reality Applications Office 365 Proactive IT Computer Repair Password Mouse Data Security Router Presentation Inbound Marketing Net Neutrality Social Cybersecurity Mobile Device Budget Wearable Technology Government Social Networking Hacker User Programming Mobile Security Display Alerts Analyitcs Education Specifications Files Safety Settings Intranet Business Intelligence Wireless Cybercrime Save Time Help Desk Redundancy Wi-Fi Hiring/Firing Bandwidth Piracy Managed IT Services Flexibility Hosted Solution Website Statistics Data storage Sports Paperless Office Competition Point of Sale Robot Network Congestion HIPAA Unified Communications Downtime Printing Scam End of Support LiFi Search Computing IBM Virtual Desktop USB Tip of the week Business Owner Mobility File Sharing Writing Heating/Cooling Server Management Consumers IT Consulting Crowdfunding Conferencing Smart Technology Cloud Computing Drones Social Engineering Buisness PC Care Data Breach Telephony Value Distributed Denial of Service Identities IP Address eBay Software Tips Hotspot Backups Remote Support Multi-Factor Security CIO Leadership Refrigeration Disaster Vulnerability Technology Laws Skype Macro Streaming Media Managed IT Service Solid State Drive New Additions Text Messaging Print Server Language Legal Virtual Private Network Compliance Work Station Google Calendar Cost Management Digital Signature Unified Threat Management LinkedIn Memory Private Cloud Break Fix Alt Codes Congratulations Video Surveillance Laptop Infrastructure Law Firm IT Computing Infrastructure Windows 8.1 Update Regulations Recycling Legislation YouTube Gaming Console Documents Access Control Best Available Public Cloud Dark Web Typing Google Drive Halloween Entrepreneur IT Support Cooperation How To Undo PDF SharePoint People Sync Data Warehousing Cryptocurrency 5G Google Docs Scary Stories Bluetooth Staff Business Technology Online Currency Software as a Service Downloads Mobile Device Managment Microsoft Excel Bitcoin Computer Accessories Adminstration Data loss Operations 3D Networking Technology Tips communications Domains Fun Productivity Blockchain Hacks Word IT Management Company Culture Twitter Comparison Public Speaking Cortana eWaste Travel Permissions IT Technicians Touchscreen Windows 10 Techology Virtual Reality Black Friday Knowledge Environment Scheduling Fraud Mirgation Monitors Disaster Resistance Samsung SaaS Cyber Monday Deep Learning Experience Troubleshooting Debate Internet Exlporer Google Wallet

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...