When Your Vendor is a Big Dog Who Exits the Industry – What Now?
August 20, 2019
Recently there has been massive upheaval in the IT Asset Management Industry. Executives of one company were sentenced to prison for illegal exports of e-waste. Another very large company, Arrow, just days ago has left the industry completely. After going on an acquisitions frenzy in 2014 where they consolidated about a half dozen of the nation’s largest ITAM vendors, they decided to get out of the ITAM business, leaving hundreds of companies without a service provider. To say that organizations are scrambling to find new qualified vendors is an understatement.
Many have criticized former Arrow clients for having one vendor, thereby having a single point of failure. They posit that if these companies had used a multi-vendor approach, they wouldn’t be scrambling to find a new vendor under so much pressure and duress. They have also criticized Gartner for recommending that it was best practice to use a sole source vendor in the first place. While I believe there are clients for whom multiple vendors make sense, I also don’t subscribe to a one-size-fits-all approach to ITAM vendor selection.
One issue that deserves continued respectful debate is the idea of sole source vs. multi-vendor solutions. For global companies, the multi-vendor approach makes good business sense. It also makes good sense from a regulatory perspective as data protection regulations abroad require specialized expertise. For the U.S. based mid-market companies that my company tends to service, I am opposed (generally) to multi-vendor solutions. As a business owner, it can present liability so high as not to be worth taking on the client. Let me share the story of why we fired our largest client about five years ago.
After being the sole source vendor to a healthcare client for almost 10 years, we were notified that the client would be moving to a 2-vendor system. Reclamere, because of our extensive security expertise, insurance, and certifications would get all data-containing devices. To save money, a local “e-cycler” would get all the scrap. We immediately began asking questions such as:
- Who will determine what devices are “data containing”?
- How will the materials be kept securely segregated?
- How will the inventory of materials taken by each vendor be verified against the inventory of materials the client directed to each vendor?
- In the event of a security incident, how would the client determine which vendor was responsible?
- In the event of a security incident, how would each vendor defend itself against false claims?