If you want to lease IT equipment, you have many options with regard to potential lessors (the leasing companies). In fact, some manufacturers lease equipment directly to their customers … or do they?
When leasing IT equipment, the lessor (the company providing the equipment) has one main obligation. However, most leases overlook this critical aspect completely, exposing the lessee (the organization leasing the equipment) to unnecessary risk.
Evaluating vendor proposals is one of the most critical aspects of the RFP process, secondary only to negotiations. The ironic thing is that we've seen too many clients try to abbreviate this activity, take short cuts, or even avoid it altogether. Providing ample time for your team to review the vendor RFP responses is critical to a quality review process, while not rushing the evaluation process ensures that you understand their complete offer and proposal.
SortSpoke’s novel approach to machine learning answers a longstanding problem in financial services – how to efficiently extract critical data from inbound, unstructured documents at 100% data quality.
Check your contracts and you will find that the vast majority contain a force majeure clause. This provision states the conditions by which a party does not have to perform under the contract if it experiences an event beyond the party’s control.
If you are experiencing pressure to lower your IT expense, a reverse auction might be a quick, efficient answer to ensure you are getting a competitive price.
Project Zero is changing its vulnerability disclosure policy to give software developers more time to patch vulnerabilities. The policy is now shifted to a stringent 90-day policy.
A Citrix vulnerability first discovered on December 17, 2019 is being continually exploited by ransomware attackers despite patching attempts by Citrix.
Can a vendor management initiative influence organizational performance? The concise answer to this question is yes. However, this influence doesn’t occur overnight.
On January 15, 2020, the Department of Defense (DoD) issued an open call to vendors to fulfill a contract to help improve their technology and inventory management.
Announced on December 31, 2019, BeyondTrust named Tenable as the successor to its Vulnerability Management suite.
Cybersecurity firm Bishop Fox identified eight vulnerabilities in ConnectWise’s remote control and remote access software.
Whether you are using Info-Tech’s Commodity, Operational, Strategic, Tactical (C.O.S.T.) model to classify your vendors or you arbitrarily label high spend/critical vendors as strategic, it begs the question: “Does your vendor truly view you as a strategic customer?”
Many contract reviewers and negotiators often assume that terms and conditions applicable to both parties must be identical or mirror each other. Nothing could be further from reality.
Extending a product’s desktop functionality and user experience to a mobile platform is not always a guaranteed success. Kronos is experiencing mixed reviews for its Kronos Workforce Mobile.
Coupa, a leading source-to-pay (S2P) provider, announces planned acquisition of Exari, a leading CLM provider, for $215M in cash as contract lifecycle management (CLM) consolidation continues.
The global demand for contract lifecycle management (CLM) solutions is estimated to increase at a compounded annual growth rate of 14% over the next 5 years. If accurate, the total spend for CLM will more than double by 2024.