Optimization is Best of Breed
Sourcing optimization is a strategy for engaging suppliers in an enriched bidding process that performs better than any other. It gathers more information from the market and lets buyers decide afterwards how they would like to split business among suppliers to maximize value using scenario analysis. Optimization secures the best downstream outcome for the purchaser.
The more open and expressive competition format involves disaggregating demand into smaller Lots and inviting bidders to bid on bundles that allow them to play to their strengths. It is designed to maximize competitive tension among suppliers, while also enabling suppliers to 1) hedge their risks; 2) make reasoned bids and 3) play to their strengths.
Allowing suppliers to communicate capacity constraints also lets them bid on more work than they can service, increasing competition further.
A RFI can act as a qualification stage in a sourcing event. What makes optimization-backed sourcing superior to ordinary eSourcing is that the responses can be used within scenario analysis later, e.g. “what’s the added cost if we only award contracts to suppliers with a dangerous goods licences?”
RFQs and RFTs
Capture dozens, hundreds or even thousands of bids across lots. Collect package bids with contingent discounts in offline or online bidding processes.
Auctions are ideal for commodity goods or services where less strategic control, biasing or scenario analysis is required. Multi-lot eAuctions can facilitate package bidding so cost synergies are captured.
For commodity goods and services, multi-lot auctions can be a fast and effective mechanims for establishing a competitive clearing price.
Multi-lot auctions give granularity to bidders that make it clearer how they can win more business.
Auctions make it easy to justify award procedures and offer an audit trail.
Enterprise Grade Security
Encryption of Data at Rest
All data stored at rest in our infrastructure is fully encrypted using 256 bit ciphers.
Encryption of Data in Transport
Data moving from client to our servers and between Keelvar servers on internal systems is also encrypted.
Public Key Infrastructure
Keelvar has a public key infrastructure that can be used to authenticate and encrypt communications as required between trusted third parties and systems.
Global Product Support
Dallas: +1 214 585 1260
London: +44 203 290 2340
Cork: +353 21 234 0219
Sydney +61 2 8091 5234
Rio de Janeiro: +353 21 234 0219
Keelvar believes usability is important. Therefore every screen and workflow has been designed to be intuitive. We also embed training materials and guided tours within the product.
In addition, Keelvar provides a self-service Help Center containing articles and videos.
Live online and on-site training sessions are available.
Having help close to hand when and where needed is vital for any Enterprise grade system. We have a team of experts on hand that are ready to assist when required during European and US business hours.
Keelvar’s REST API can be used to hook into 3rd party systems with ease. Integrations can be facilitated in Enterprise agreements and tailored to customers specific requirements. Possible integrations include the following: