crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Solid Vendor Management Leads To Solid Successes

In order to function properly, any business will need to procure certain pieces of equipment. Some of this equipment will be specialized to the business’ purpose, while some will be the sort that may be more commonly found in offices everywhere. This equipment must be procured from somewhere, and this is where vendors come in--but who in your organization is responsible for your vendor management?

A Two-Way Street
While you might consider your vendors to be an asset to your business, providing you with what you need to function, you have to remember that they are businesses as well. As a result, they are trying to profit from your relationship with them. However, the relationship between you and your vendor doesn’t have to have nonreciprocal benefits.

Rather than attempting to undercut their businesses by seeking discounts and cost cuts, form partnerships with your vendors. Be open with your needs so that they may better serve them, and contribute resources that can assist the vendor in fulfilling those needs. Instead of looking at your relationship with your vendor as a business transaction, look at it in terms of being a partnership--preferably a lengthy one. The longer you work with a vendor, the higher quality service you will likely receive, the friendlier your negotiations will be, and you will more likely develop a working relationship that focuses on maximum benefit for both parties.

Finding The Right Vendor
Of course, like any business relationship, there are good fits and bad fits. You will want to make sure that you are selective as you choose your vendor from your many options.

  • First, you will need to establish what you require from your vendor, based on the principles that are foundational to your business. Once you have done so, establish how you will rank each candidate you consider against each other in order to make your final call.
  • This can be made easier by creating a variety of bid documents to inform vendors of your business’ requirements. These can include:
    • Request for Quote, or RFQs. This is most useful when price is your largest concern.
    • Request for Information, or RFIs, can help you to get an insider’s look at the market as a whole to better inform your decision. If you like what you see, it is common that you would move on to the next variety of bid document.
    • Request for Proposals. RFPs are almost a practice run for the vendor to prove their worth. By presenting them with a problem, the RFP allows vendors to show you what they would do to resolve your issues. However, if you make the RFP too detailed, or not detailed enough, you could scare away prospects or receive inaccurate quotes back.

Negotiations Needed
At the end of the day, you will need to find a vendor who is willing to work with you to mutually achieve your goals along with theirs. To do so, you may have to compromise, but with clear and constant communication, you will likely find a vendor whom you can work with easily.

Ongoing Support
Purchasing a solution from a vendor isn’t typically the end of the relationship. In fact, when something goes wrong, it can take a lot of time to work through issues. Depending on your SLA (Service Level Agreement) you may need to put in a ticket and wait for a response, or sit through hold music and describe your issue to multiple support representatives until things get moving in the right direction. The last thing you want is your employees stuck in support purgatory while they wait for something to get fixed. Having a dedicated resource for managing vendors, who understands all of the various SLAs and warranties will go a long way.

Integrated Business Technologies can help with your technology vendors. We’ve been building relationships with various vendors throughout the industry. Not only are we accustomed to working with these vendors, but we can help hone in on the solutions your business needs. Give us a call at (918) 770-8738 for more information.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 24 September 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Privacy Managed Service Provider Business Management Tip of the Week Internet Microsoft Saving Money Cloud Productivity Business Computing Workplace Tips Backup IT Services Best Practices Hackers Hosted Solutions IT Support Network Business Mobile Devices Hardware Email Malware Software Small Business Data Communication Smartphones Upgrade Windows Server Mobile Device Management Microsoft Office Business Continuity VoIP Virtualization Disaster Recovery Google Efficiency Computer Miscellaneous Mobile Office Gadgets Vendor Management Innovation Social Media Quick Tips Windows 10 Mobile Computing Holiday WiFi Passwords BYOD Best Practice Bring Your Own Device Wireless Technology User Tips Trending Operating System Apple Users Spam Smartphone Remote Monitoring Alert Internet of Things Going Green The Internet of Things Content Filtering Remote Computing History Browser Big Data Office IT Solutions Lithium-ion Battery Save Money Managed IT services Current Events IT Consultant Information Technology Firewall Android Unified Threat Management Windows 8 Printer Tech Support Analytics Humor Data Management Facebook Saving Time Avoiding Downtime Hard Drives App Customer Relationship Management Gmail Marketing Customer Service Excel Hacking Computers Outsourced IT Phone System Collaboration Apps Application Network Security Virus Office Tips Retail Ransomware Phishing Maintenance Fax Server IT service Outlook Health Managed IT Business Growth Employer-Employee Relationship Router iPhone Password Inbound Marketing Administration Presentation Budget Automation Computer Repair Training Recovery Antivirus Social Running Cable Digital Payment Co-Managed IT Mobile Device Artificial Intelligence Data Backup VPN PowerPoint Risk Management Hiring/Firing Data Recovery Printing Display End of Support Tablet LiFi Website Statistics Files Intranet Business Intelligence Competition Network Congestion Downtime Two-factor Authentication Augmented Reality Search Virtual Desktop USB Piracy Business Owner Encryption Sports Hacker Proactive IT Point of Sale Programming User Mouse Analyitcs Money Education Help Desk Document Management Mobility User Error Safety Net Neutrality Licensing IBM Settings Hosted Solution Wireless Data storage Chrome Cybercrime File Sharing Save Time Social Networking Robot Entrepreneur Unified Communications Adminstration Halloween SaaS PC Care Undo 3D Alerts Value People 5G PDF eBay Scary Stories Telephony Leadership Redundancy Computing Remote Support Streaming Media New Additions Office 365 Monitors Skype Deep Learning Print Server Text Messaging Scam Project Management Domains Google Wallet Work Station Scheduling Congratulations Fun Writing LinkedIn Word Law Firm IT Video Surveillance Private Cloud Public Speaking Drones Windows 8.1 Update Recycling Cortana Social Engineering Best Available eWaste Buisness Identities Public Cloud Backups Knowledge Environment CIO Solid State Drive Bluetooth Sync Legal Online Currency Samsung Debate Experience Compliance Troubleshooting Heating/Cooling Alt Codes Computer Accessories Mobile Device Managment Macro Consumers Crowdfunding Regulations YouTube Typing Cybersecurity IP Address Google Drive Company Culture Twitter How To Bandwidth Refrigeration Cryptocurrency Disaster Gaming Console Touchscreen Google Docs Specifications Flexibility Software Tips Cost Management Bitcoin Digital Signature Memory communications Laptop Hacks Wearable Technology Conferencing Wi-Fi Documents

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code