Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Vendors Are A Huge Asset, Unless They’re Mismanaged


Procuring equipment is a necessary part of managing any business, but this is often easier said than done. Your organization works with multiple vendors, which could be both confusing and time-consuming. How does your business manage its vendors, and is there a way to make this easier and more efficient?

Vendor Management Goes Both Ways
You might consider your vendors as assets, but the fact remains that they are also businesses just like yours. This means that, while you are trying to profit from your relationship with them, they are also trying to profit from their relationship with you. This doesn’t mean that this has to be the extent of your relationship with your vendors, but be sure to keep in mind that, ultimately, you are both for-profit institutions.

Vendor management isn’t about trying to earn discounts, cut costs, and outsmart the vendors into giving you a deal that’s heavy-handed in your favor. Rather, you want to form a trusting relationship with them so that both of your needs are served adequately. Approaching vendor management in this way can help you better understand the role that vendors play in the success of your organization. Forming this kind of relationship might seem challenging, but you’ll notice that you will receive higher quality of service, friendlier negotiations, and a closer working relationship.

How to Find the Right Vendor
Just like any relationship in the business world, there will be good fits that help your business flourish, while there will be bad fits that will cause more friction than progress. We’ll help you choose the right vendors for your business’s needs.

  • Know what you want from your vendor. Once you’ve decided what role the vendor fulfills for your organization, you can then rank potential vendors in regard to how well they suit your needs.
  • Create some documents that you can use to inform vendors of what your business requires:
    • Request for Quote: This is helpful when pricing is the biggest pain point.
    • Request for Information: Put together this document to see, at a glance, information regarding the market. If what you see is ideal, move on to the next document.
    • Request for Proposals: This document allows the vendor to show how they can be beneficial to your organization. You present them with a problem that they then proceed to solve for you. If the document is too detailed or not detailed enough, you might get prospects that provide inaccurate quotes.

Negotiating with Vendors
Ultimately, you want a vendor who is willing to work with your organization to achieve mutual goals. Compromise is an important part of this process, as well as clear communications. After all, nobody wants to work with a vendor who is difficult to work with.

Ensure Ongoing Support As Needed
It’s usually the case that your relationship with a vendor won’t end after the purchase and implementation of a solution. You’ll generally form a service level agreement with your vendor of choice, which will determine how you receive service, how much is covered under your current contract, as well as what’s not covered. Unfortunately, in most cases, this means putting in a support ticket or holding for minutes on end while you’re waiting to get an issue resolved. You don’t have time to waste, so the ideal way to approach this dilemma is to have someone dedicated to dealing with vendors on your side. This way, you’ll always have access to someone who knows and understands your business’s SLAs and warranties, as well as someone who will make endless phone calls so that you don’t have to.

Computerware can be your go-to technology vendor management resource. To learn more about what we can do for your business, reach out to us at (703) 821-8200.

Does Your Network Management Seem Unmanageable?
Tip of the Week: A URL Can Help Give Away A Phishi...

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Business Computing Hackers Backup Managed Service Provider Productivity Workplace Tips Data Hardware Business Saving Money Malware Email IT Support IT Services Hosted Solutions Network Security Google Small Business Efficiency Smartphones Gadgets Quick Tips Mobile Devices User Tips Business Continuity Computer Disaster Recovery Virtualization Mobile Office Network Microsoft Office Server VoIP Social Media Mobile Device Management Smartphone Android Windows 10 Miscellaneous Upgrade Innovation Windows Ransomware Unified Threat Management Remote Monitoring Holiday Operating System Remote Computing Mobile Computing Passwords BYOD Collaboration Communication Apps WiFi Vendor Management Marketing Facebook The Internet of Things Firewall Analytics History Apple Managed IT services Users Cybersecurity Productivity communications Alert Data Management IT Support Managed IT Services Outsourced IT Save Money IT Consultant Internet of Things Phishing Gmail Bring Your Own Device Big data Office App Health Content Filtering BDR Spam Automation Mobile Device Outlook Browser Wireless Technology Maintenance Search Virus Managed IT Data Recovery Lithium-ion Battery Budget Windows 8 Hard Drives Antivirus Bandwidth Tech Support Data Backup Artificial Intelligence Hiring/Firing Information Technology Best Practice Going Green Recovery Employer-Employee Relationship Cost Management Update Phone System Help Desk Printer Hacking Office 365 Money Encryption IBM Document Management Training Government Cybercrime Saving Time Administration Risk Management Intranet Law Enforcement Data storage Legal Customer Service Two-factor Authentication Cloud Computing Travel Proactive IT Website Education SaaS Computers Humor VPN Save Time It Management Hard Drive Running Cable Networking Mobility DDoS Telephone Systems Computer Repair Windows 10 Disaster Word End of Support Cortana Password Securty Solid State Drive Hacker Access Control Downtime Flexibility Tablet Data Security Digital Payment Company Culture Laptop Data Loss Comparison Wireless Augmented Reality PowerPoint Fax Server Data Breach Social Networking Hosted Solution Project Management Twitter Robot Social Engineering Avoiding Downtime Compliance iPhone Black Market Business Intelligence User Current Events Business Growth Excel Automobile Network Congestion Scam Trending Gaming Console YouTube Settings Unified Communications Statistics How To Webcam Digital Websites Tech Terms Start Menu Streaming Media Politics Taxes Inbound Marketing Software as a Service Processors Uninterrupted Power Supply Vulnerabilities USB Presentation Cryptocurrency Mobile Technology Chrome Data Protection Google Docs Co-managed IT Router Virtual Desktop Google Maps Tech Term Cleaning Patch Management Computer Accessories Customer Relationship Management Documents Office Tips Bitcoin Programming Heating/Cooling Emails Regulations Paperless Office Lifestyle Redundancy Mouse Hack Blockchain Sports Text Messaging Computing Identity Theft Retail Private Cloud Experience eWaste IT service Value Virtual Reality Distributed Denial of Service Bluetooth Computing Infrastructure Public Cloud Net Neutrality Pain Points Safety Specifications User Error Business Technology Telephony Social Monitors Applications Digital Signature Advertising Time Management Video Surveillance Flash Saving ZTime Smart Tech Entertainment Google Wallet Windows 7 LinkedIn Google Calendar Motion Sickness Displays Fiber-Optic Mobile Security Archive Touchscreen Debate Tracking Banking Multi-Factor Security Drones Freedom of Information Analytic Best Practives Knowledge Technology Tips Point of Contact File Sharing Web Server Fraud Language UTM Permissions Microserver Public Speaking Workers Thin CLient Business Metrics Legislation News switches Access Entrepreneur Writing email scam Samsung Multi-factor Authentication HIPAA Business Managemenet Turn Key Leadership Chromebook Wireless Headphones Electronic Payment G Suite Fake News Trojan Organize Spyware Messenger Physical Security Tablets Work/Life Balance Device security Device Management IP Address Human Resources Download Sync Microsoft Excel IT consulting cache Books CCTV Business Cards Mobile Payment Skype online Currency Corporate Profile Microchip In Internet of Things CIO Windows XP Assessment Reading Piracy Teamwork HTML Storage Scalability Society Television VoIP Hacks PDF Micrsooft Harddrive Consultation Relocation Keyboard Meetings GPS Software License Best Available Cabling Devices SharePoint Product Reviews External Harddrive Domains Audit Notifications Administrator Tip of the week Read Ebay Reliable Computing Shortcut Supercomputer 3D IT Plan Worker Accountants Troubleshooting Machine Learning Music Evernote Smart Phones Get More Done Emergency Recycling Computer Care Staffing Environment Upgrades Virtual Assistant Printer Server LiFi Google Drive Pirating Information Competition Employer Employee Relationship Adminstration Migration Licensing Equifax Business Owner Data Warehousing Vulnerability Printing Electricity Rental Service Botnet Deep Learning Hard Drive Disposal Visible Light Communication Content Management Application Memory Desktop Wi-Fi Startup Windows Server 2008 Webinar Downloads WannaCry Computer Malfunction Unified Threat Management Upselling CrashOverride Nanotechnology 3D Printing Capital Productuvuty