Browse Definitions :
Definition

IT procurement software

IT procurement software is an application or product suite that automates and coordinates tasks involved with the acquisition of information technology-related products and services.

IT procurement products expand on the range of services provided by traditional procurement software, which automates processes related to physical goods such as purchasing materials and maintaining inventory.  Most IT procurement software can create and manage requests for quotations (RFQs), requests for proposals (RFPs), requests for information (RFIs) and tasks related to supplier relationship managment (SRM). Depending on the particular product, the software may also automate tasks related to market research, price negotiations, establishing terms and conditions for services, resolving invoice discrepancies and communicating the status of purchases with internal customers.  

Increasingly, IT procurement products are offered in the form of Software as a Service (SaaS). There are benefits and drawbacks to both the cloud-based and on-premises options. The SaaS procurement model is typically less expensive initially and faster and simpler to implement. On the other hand, on-premises software may enable more customization and may be easier to integrate with existing software.

See a tutorial on key issues and negotiation strategies in IT procurement:

This was last updated in April 2016

Continue Reading About IT procurement software

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close