crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Solid Vendor Management Leads To Solid Successes

In order to function properly, any business will need to procure certain pieces of equipment. Some of this equipment will be specialized to the business’ purpose, while some will be the sort that may be more commonly found in offices everywhere. This equipment must be procured from somewhere, and this is where vendors come in--but who in your organization is responsible for your vendor management?

A Two-Way Street
While you might consider your vendors to be an asset to your business, providing you with what you need to function, you have to remember that they are businesses as well. As a result, they are trying to profit from your relationship with them. However, the relationship between you and your vendor doesn’t have to have nonreciprocal benefits.

Rather than attempting to undercut their businesses by seeking discounts and cost cuts, form partnerships with your vendors. Be open with your needs so that they may better serve them, and contribute resources that can assist the vendor in fulfilling those needs. Instead of looking at your relationship with your vendor as a business transaction, look at it in terms of being a partnership--preferably a lengthy one. The longer you work with a vendor, the higher quality service you will likely receive, the friendlier your negotiations will be, and you will more likely develop a working relationship that focuses on maximum benefit for both parties.

Finding The Right Vendor
Of course, like any business relationship, there are good fits and bad fits. You will want to make sure that you are selective as you choose your vendor from your many options.

  • First, you will need to establish what you require from your vendor, based on the principles that are foundational to your business. Once you have done so, establish how you will rank each candidate you consider against each other in order to make your final call.
  • This can be made easier by creating a variety of bid documents to inform vendors of your business’ requirements. These can include:
    • Request for Quote, or RFQs. This is most useful when price is your largest concern.
    • Request for Information, or RFIs, can help you to get an insider’s look at the market as a whole to better inform your decision. If you like what you see, it is common that you would move on to the next variety of bid document.
    • Request for Proposals. RFPs are almost a practice run for the vendor to prove their worth. By presenting them with a problem, the RFP allows vendors to show you what they would do to resolve your issues. However, if you make the RFP too detailed, or not detailed enough, you could scare away prospects or receive inaccurate quotes back.

Negotiations Needed
At the end of the day, you will need to find a vendor who is willing to work with you to mutually achieve your goals along with theirs. To do so, you may have to compromise, but with clear and constant communication, you will likely find a vendor whom you can work with easily.

Ongoing Support
Purchasing a solution from a vendor isn’t typically the end of the relationship. In fact, when something goes wrong, it can take a lot of time to work through issues. Depending on your SLA (Service Level Agreement) you may need to put in a ticket and wait for a response, or sit through hold music and describe your issue to multiple support representatives until things get moving in the right direction. The last thing you want is your employees stuck in support purgatory while they wait for something to get fixed. Having a dedicated resource for managing vendors, who understands all of the various SLAs and warranties will go a long way.

Integrated Business Technologies can help with your technology vendors. We’ve been building relationships with various vendors throughout the industry. Not only are we accustomed to working with these vendors, but we can help hone in on the solutions your business needs. Give us a call at (918) 770-8738 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 23 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Privacy Tip of the Week Managed Service Provider Business Management Microsoft Internet Saving Money Cloud Productivity Business Computing Workplace Tips IT Services Best Practices Backup Hackers Hosted Solutions IT Support Business Network Mobile Devices Hardware Malware Email Small Business Software Smartphones Data Communication Server Upgrade Windows Business Continuity Mobile Device Management Microsoft Office VoIP Virtualization Disaster Recovery Google Efficiency Computer Miscellaneous Mobile Office Vendor Management Gadgets Quick Tips Innovation Holiday Social Media WiFi Windows 10 BYOD User Tips Mobile Computing Bring Your Own Device Passwords Remote Monitoring Smartphone Best Practice Spam Android Wireless Technology Browser Trending Operating System Users Apple Content Filtering Remote Computing History Alert Going Green Internet of Things The Internet of Things Managed IT services Unified Threat Management Printer Big Data Office Information Technology Current Events Outsourced IT Data Management IT Solutions Save Money Lithium-ion Battery Firewall IT Consultant Network Security Ransomware Customer Relationship Management Windows 8 Gmail Managed IT Tech Support Humor Saving Time Analytics Avoiding Downtime Facebook Maintenance App Hard Drives Outlook Health Phishing IT service Digital Payment Artificial Intelligence Business Growth Marketing Risk Management Excel Employer-Employee Relationship Customer Service Hacking Computers Data Backup Phone System Apps Application Collaboration Virus Fax Server Office Tips Antivirus Retail Running Cable Social Mobile Device VPN PowerPoint Router Inbound Marketing Tablet Password iPhone Administration Presentation Training Two-factor Authentication Budget Automation Proactive IT Computer Repair User Error Mouse Co-Managed IT Recovery Analyitcs Money Education Document Management Data Recovery Safety Specifications Net Neutrality IBM Settings Licensing Wireless Chrome Hosted Solution Cybercrime Save Time File Sharing Data storage Social Networking Hiring/Firing Cybersecurity Display Project Management Robot Printing Mobility End of Support Website Office 365 Statistics LiFi Computing Intranet Competition Business Intelligence Network Congestion Downtime Files Augmented Reality Applications Search Piracy Virtual Desktop USB Business Owner Help Desk Sports Encryption Hacker User Programming Point of Sale Tip of the week IP Address Company Culture Technology Laws Twitter Regulations YouTube Typing Comparison Mobile Device Managment Disaster Touchscreen Google Drive Refrigeration Unified Threat Management How To Bandwidth Cryptocurrency Black Friday Productivity Adminstration Digital Signature Virtual Private Network 3D Google Docs Cost Management Access Control Memory Flexibility Bitcoin Laptop Cyber Monday Travel Wearable Technology Redundancy Wi-Fi Documents SharePoint Conferencing communications Hacks Scam Halloween Entrepreneur Alerts PC Care Undo 5G PDF Downloads People Value SaaS Scheduling Unified Communications eBay Scary Stories Networking Remote Support Leadership Skype Multi-Factor Security Streaming Media Government New Additions Text Messaging Print Server Software Tips Data Security Work Station Monitors Domains Fun LinkedIn Google Calendar Telephony Congratulations Deep Learning Video Surveillance Google Wallet Word Law Firm IT Windows 8.1 Update Techology Recycling Writing Public Speaking Cortana eWaste Best Available Legislation IT Support Drones Disaster Resistance Social Engineering Macro Buisness Identities Knowledge Environment Private Cloud Managed IT Services Backups Bluetooth Online Currency IT Consulting Samsung CIO Solid State Drive Experience Troubleshooting Software as a Service Debate Public Cloud Data loss Gaming Console Computer Accessories Legal Heating/Cooling Consumers Data Breach Crowdfunding Compliance Alt Codes Technology Tips Sync

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code