Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Vendors Are A Huge Asset, Unless They’re Mismanaged

b2ap3_large_vendor_management_400

Procuring equipment is a necessary part of managing any business, but this is often easier said than done. Your organization works with multiple vendors, which could be both confusing and time-consuming. How does your business manage its vendors, and is there a way to make this easier and more efficient?

Vendor Management Goes Both Ways
You might consider your vendors as assets, but the fact remains that they are also businesses just like yours. This means that, while you are trying to profit from your relationship with them, they are also trying to profit from their relationship with you. This doesn’t mean that this has to be the extent of your relationship with your vendors, but be sure to keep in mind that, ultimately, you are both for-profit institutions.

Vendor management isn’t about trying to earn discounts, cut costs, and outsmart the vendors into giving you a deal that’s heavy-handed in your favor. Rather, you want to form a trusting relationship with them so that both of your needs are served adequately. Approaching vendor management in this way can help you better understand the role that vendors play in the success of your organization. Forming this kind of relationship might seem challenging, but you’ll notice that you will receive higher quality of service, friendlier negotiations, and a closer working relationship.

How to Find the Right Vendor
Just like any relationship in the business world, there will be good fits that help your business flourish, while there will be bad fits that will cause more friction than progress. We’ll help you choose the right vendors for your business’s needs.

  • Know what you want from your vendor. Once you’ve decided what role the vendor fulfills for your organization, you can then rank potential vendors in regard to how well they suit your needs.
  • Create some documents that you can use to inform vendors of what your business requires:
    • Request for Quote: This is helpful when pricing is the biggest pain point.
    • Request for Information: Put together this document to see, at a glance, information regarding the market. If what you see is ideal, move on to the next document.
    • Request for Proposals: This document allows the vendor to show how they can be beneficial to your organization. You present them with a problem that they then proceed to solve for you. If the document is too detailed or not detailed enough, you might get prospects that provide inaccurate quotes.

Negotiating with Vendors
Ultimately, you want a vendor who is willing to work with your organization to achieve mutual goals. Compromise is an important part of this process, as well as clear communications. After all, nobody wants to work with a vendor who is difficult to work with.

Ensure Ongoing Support As Needed
It’s usually the case that your relationship with a vendor won’t end after the purchase and implementation of a solution. You’ll generally form a service level agreement with your vendor of choice, which will determine how you receive service, how much is covered under your current contract, as well as what’s not covered. Unfortunately, in most cases, this means putting in a support ticket or holding for minutes on end while you’re waiting to get an issue resolved. You don’t have time to waste, so the ideal way to approach this dilemma is to have someone dedicated to dealing with vendors on your side. This way, you’ll always have access to someone who knows and understands your business’s SLAs and warranties, as well as someone who will make endless phone calls so that you don’t have to.

Computerware can be your go-to technology vendor management resource. To learn more about what we can do for your business, reach out to us at (703) 821-8200.

Does Your Network Management Seem Unmanageable?
Tip of the Week: A URL Can Help Give Away A Phishi...

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Software Workplace Tips Backup Hackers Productivity Business Computing Data Saving Money Hardware Business Malware IT Support Email IT Services Hosted Solutions Google Efficiency Quick Tips Smartphones Small Business Gadgets Business Continuity Mobile Devices Mobile Office Disaster Recovery Computer User Tips Network Security Network Virtualization Microsoft Office Server VoIP Miscellaneous Upgrade Social Media Windows 10 Mobile Device Management Windows Unified Threat Management Ransomware Smartphone Android Innovation Operating System Remote Computing Passwords BYOD Communication Remote Monitoring WiFi Vendor Management Apps The Internet of Things Holiday Mobile Computing Marketing Facebook Users History Managed IT services Collaboration Firewall Data Management Analytics Apple Alert IT Consultant Outsourced IT Save Money IT Support Productivity Phishing Content Filtering Automation Bring Your Own Device Health Office Big data Managed IT Services Virus App Artificial Intelligence Hiring/Firing Best Practice Windows 8 Spam Going Green BDR Tech Support Browser Wireless Technology Search Managed IT communications Outlook Budget Lithium-ion Battery Hard Drives Help Desk Antivirus Internet of Things Phone System Encryption Information Technology IBM Gmail Printer Recovery Data Backup Employer-Employee Relationship Cybersecurity Update Maintenance Travel Proactive IT Education SaaS Computers Bandwidth Save Time Money Running Cable Mobile Device Document Management Humor Government Saving Time Law Enforcement It Management Data storage Legal Customer Service Administration PowerPoint Website Social Networking VPN Hosted Solution Twitter Data Recovery Hacking iPhone Office 365 Black Market Business Intelligence User Fax Server Networking Telephone Systems DDoS Computer Repair Training Disaster Avoiding Downtime Word Risk Management Intranet Password Securty Cost Management Current Events Hacker Solid State Drive Hard Drive Flexibility Tablet Mobility Digital Payment Two-factor Authentication Windows 10 Wireless Paperless Office Sports Start Menu Computing Text Messaging Taxes Software as a Service Retail Robot Access Control Uninterrupted Power Supply Experience IT service Compliance Co-managed IT Patch Management Google Maps Net Neutrality Cloud Computing Safety Business Growth Lifestyle Monitors Social Hack Telephony Project Management Trending Network Congestion YouTube Settings Unified Communications Statistics Cybercrime End of Support Public Cloud Cortana Pain Points Streaming Media Politics Inbound Marketing User Error Downtime Excel Processors USB Chrome Presentation Laptop Scam Company Culture Automobile Google Docs Gaming Console Virtual Desktop Router Computer Accessories Documents Comparison Programming Customer Relationship Management How To Webcam Office Tips Heating/Cooling Augmented Reality Mouse Workers Microserver Society Storage Websites PDF Tech Terms Hacks Micrsooft Relocation GPS Keyboard Best Available Access Product Reviews Samsung Identity Theft Turn Key Domains Trojan eWaste Read Mobile Technology G Suite Notifications Physical Security Reliable Computing 3D Organize Shortcut Value Spyware Ebay Recycling Tablets Virtual Reality Music Troubleshooting Upgrades Environment Data Security Data Protection Mobile Payment Sync Social Engineering Staffing CCTV Adminstration Bluetooth Competition LiFi cache Pirating Information Computing Infrastructure Business Owner Deep Learning Data Loss Corporate Profile In Internet of Things Rental Service Emails Memory Application Visible Light Communication Content Management Assessment Redundancy Scalability Wi-Fi Specifications Harddrive Data Breach VoIP Meetings Flash Advertising Digital Signature Consultation Video Surveillance Entertainment Cabling Saving ZTime Private Cloud External Harddrive Google Wallet LinkedIn Displays Audit Administrator Supercomputer Archive Debate Get More Done Emergency Analytic Worker Machine Learning Banking Smart Phones Drones Printer Server Computer Care Point of Contact Distributed Denial of Service File Sharing Employer Employee Relationship Language Public Speaking Permissions Google Drive Licensing Thin CLient Business Metrics Writing Entrepreneur switches Printing Electricity Botnet Business Managemenet HIPAA Electronic Payment Business Technology Leadership Chromebook Upselling Webinar Downloads WannaCry Computer Malfunction Messenger Device Management Work/Life Balance IP Address Cryptocurrency Time Management Download Human Resources IT consulting Google Calendar Motion Sickness Books Skype Tracking Cleaning online Currency Touchscreen Best Practives CIO Knowledge Microchip Regulations Windows XP Technology Tips Teamwork Digital Web Server Reading Television Capital Productuvuty Vulnerability 3D Printing CrashOverride

hp supplies medallionLarge2017