Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Vendors Are A Huge Asset, Unless They’re Mismanaged

b2ap3_large_vendor_management_400

Procuring equipment is a necessary part of managing any business, but this is often easier said than done. Your organization works with multiple vendors, which could be both confusing and time-consuming. How does your business manage its vendors, and is there a way to make this easier and more efficient?

Vendor Management Goes Both Ways
You might consider your vendors as assets, but the fact remains that they are also businesses just like yours. This means that, while you are trying to profit from your relationship with them, they are also trying to profit from their relationship with you. This doesn’t mean that this has to be the extent of your relationship with your vendors, but be sure to keep in mind that, ultimately, you are both for-profit institutions.

Vendor management isn’t about trying to earn discounts, cut costs, and outsmart the vendors into giving you a deal that’s heavy-handed in your favor. Rather, you want to form a trusting relationship with them so that both of your needs are served adequately. Approaching vendor management in this way can help you better understand the role that vendors play in the success of your organization. Forming this kind of relationship might seem challenging, but you’ll notice that you will receive higher quality of service, friendlier negotiations, and a closer working relationship.

How to Find the Right Vendor
Just like any relationship in the business world, there will be good fits that help your business flourish, while there will be bad fits that will cause more friction than progress. We’ll help you choose the right vendors for your business’s needs.

  • Know what you want from your vendor. Once you’ve decided what role the vendor fulfills for your organization, you can then rank potential vendors in regard to how well they suit your needs.
  • Create some documents that you can use to inform vendors of what your business requires:
    • Request for Quote: This is helpful when pricing is the biggest pain point.
    • Request for Information: Put together this document to see, at a glance, information regarding the market. If what you see is ideal, move on to the next document.
    • Request for Proposals: This document allows the vendor to show how they can be beneficial to your organization. You present them with a problem that they then proceed to solve for you. If the document is too detailed or not detailed enough, you might get prospects that provide inaccurate quotes.

Negotiating with Vendors
Ultimately, you want a vendor who is willing to work with your organization to achieve mutual goals. Compromise is an important part of this process, as well as clear communications. After all, nobody wants to work with a vendor who is difficult to work with.

Ensure Ongoing Support As Needed
It’s usually the case that your relationship with a vendor won’t end after the purchase and implementation of a solution. You’ll generally form a service level agreement with your vendor of choice, which will determine how you receive service, how much is covered under your current contract, as well as what’s not covered. Unfortunately, in most cases, this means putting in a support ticket or holding for minutes on end while you’re waiting to get an issue resolved. You don’t have time to waste, so the ideal way to approach this dilemma is to have someone dedicated to dealing with vendors on your side. This way, you’ll always have access to someone who knows and understands your business’s SLAs and warranties, as well as someone who will make endless phone calls so that you don’t have to.

Computerware can be your go-to technology vendor management resource. To learn more about what we can do for your business, reach out to us at (703) 821-8200.

Does Your Network Management Seem Unmanageable?
Tip of the Week: A URL Can Help Give Away A Phishi...

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Hackers Managed Service Provider Business Computing Workplace Tips Productivity Backup Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Smartphones Small Business Gadgets Quick Tips Network Security Mobile Devices Business Continuity User Tips Mobile Office Computer Disaster Recovery Network Virtualization Microsoft Office Server VoIP Social Media Mobile Device Management Windows 10 Miscellaneous Upgrade Android Windows Unified Threat Management Smartphone Ransomware Passwords Innovation Holiday Operating System Remote Computing BYOD Remote Monitoring Communication WiFi Mobile Computing Vendor Management Marketing The Internet of Things Apps Facebook Collaboration Firewall Managed IT services Analytics History Users Data Management Alert IT Support Apple Phishing Outsourced IT IT Consultant Save Money Cybersecurity Managed IT Services Automation Gmail App Content Filtering Big data Bring Your Own Device Office Health Productivity Outlook Hard Drives Hiring/Firing Virus Artificial Intelligence Best Practice Browser BDR Spam Going Green Managed IT Windows 8 Wireless Technology communications Search Budget Tech Support Lithium-ion Battery Encryption Help Desk Office 365 Antivirus Money Maintenance Phone System Information Technology Recovery Data Backup Employer-Employee Relationship IBM Mobile Device Cost Management Printer Update Internet of Things Bandwidth Proactive IT Save Time Computers Networking Administration Running Cable Government Law Enforcement Risk Management Document Management Data storage It Management Saving Time Hard Drive Legal Humor Customer Service SaaS Travel Education Excel Comparison Black Market Hacking PowerPoint Data Recovery Social Networking Business Growth VPN Twitter User Telephone Systems Training Disaster End of Support DDoS iPhone Project Management Business Intelligence Securty Solid State Drive Word Flexibility Cortana Password Fax Server Computer Repair Hacker Mobility Tablet Intranet Two-factor Authentication Avoiding Downtime Windows 10 Wireless Hosted Solution Website Robot Current Events Digital Payment User Error Router Taxes Computer Accessories Compliance Retail Social Engineering Software as a Service Access Control Uninterrupted Power Supply Experience Customer Relationship Management eWaste Computing Infrastructure Augmented Reality Mouse Gaming Console Data Security Webcam Bitcoin Text Messaging Monitors Google Maps Telephony Patch Management Cloud Computing YouTube Safety Specifications Settings Unified Communications Hack Social Net Neutrality Network Congestion Cybercrime Politics Co-managed IT Distributed Denial of Service Trending Public Cloud Lifestyle Cryptocurrency Laptop Google Docs Statistics Processors Downtime USB Presentation Office Tips Scam Automobile Company Culture Paperless Office Streaming Media Virtual Desktop Sports Inbound Marketing Computing How To Documents Programming Digital Heating/Cooling Pain Points Chrome IT service Start Menu Best Available Virtual Reality Access Music Fake News Keyboard Vulnerabilities Samsung Domains Upselling Product Reviews Webinar online Currency Upgrades Bluetooth LiFi Mobile Technology G Suite Read Shortcut Value Spyware Microsoft Excel Physical Security Business Cards Tablets Troubleshooting Rental Service Deep Learning Memory Data Protection Visible Light Communication Staffing Mobile Payment Sync Environment Competition GPS Wi-Fi Best Practives cache CCTV Business Owner Microserver Data Loss Flash Corporate Profile Advertising Television In Internet of Things Application 3D Assessment Google Wallet Blockchain Emails Ebay Displays Recycling Scalability Redundancy Turn Key Data Breach VoIP SharePoint Adminstration Digital Signature Banking Trojan Consultation Drones Tip of the week Meetings Pirating Information Cabling Private Cloud Entertainment File Sharing Organize Audit Language Permissions Evernote Administrator Business Metrics Content Management Virtual Assistant Supercomputer Writing Worker switches Machine Learning Analytic Emergency Computer Care Data Warehousing Video Surveillance Public Speaking Chromebook Google Drive Hard Drive Disposal Employer Employee Relationship Vulnerability LinkedIn Licensing Saving ZTime Messenger Printing Work/Life Balance Electricity Windows Server 2008 Botnet Entrepreneur Debate HIPAA Harddrive Download Business Managemenet Archive Unified Threat Management Business Technology IT consulting Electronic Payment Books External Harddrive Downloads WannaCry Point of Contact Cleaning Windows 7 Computer Malfunction Fiber-Optic CIO IP Address Microchip Time Management Regulations Windows XP Human Resources Thin CLient Reading Smart Phones Google Calendar Get More Done Society Freedom of Information Motion Sickness Fraud Tracking Hacks Skype Printer Server Touchscreen Micrsooft Knowledge Leadership Relocation Teamwork Technology Tips Identity Theft News Web Server email scam Workers Device Management Storage Notifications Websites Tech Terms PDF Reliable Computing Piracy Software License Capital Productuvuty 3D Printing CrashOverride

hp supplies medallionLarge2017