Browse Definitions :
Definition

IT procurement software

Contributor(s): Matthew Haughn

IT procurement software is an application or product suite that automates and coordinates tasks involved with the acquisition of information technology-related products and services.

IT procurement products expand on the range of services provided by traditional procurement software, which automates processes related to physical goods such as purchasing materials and maintaining inventory.  Most IT procurement software can create and manage requests for quotations (RFQs), requests for proposals (RFPs), requests for information (RFIs) and tasks related to supplier relationship managment (SRM). Depending on the particular product, the software may also automate tasks related to market research, price negotiations, establishing terms and conditions for services, resolving invoice discrepancies and communicating the status of purchases with internal customers.  

Increasingly, IT procurement products are offered in the form of Software as a Service (SaaS). There are benefits and drawbacks to both the cloud-based and on-premises options. The SaaS procurement model is typically less expensive initially and faster and simpler to implement. On the other hand, on-premises software may enable more customization and may be easier to integrate with existing software.

See a tutorial on key issues and negotiation strategies in IT procurement:

This was last updated in April 2016

Continue Reading About IT procurement software

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • reverse brute-force attack

    A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple ...

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • primary storage (main storage)

    Primary storage is the collective methods and technologies used to capture and retain digital information that is in active use ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close