Executive Procurement Insight

How to Create an IT Tender Document - That Actually Gets You the Right IT Provider

Many IT outsourcing failures originate long before supplier selection - through poor governance, unclear operational ownership, unrealistic expectations, and weak procurement design.

0%
Agreements exceed budget expectations
0%
Supplier changes within 3 years
0%
Failures traced to poor scoping
The Real Problem

Why Most IT Tenders Are Designed to Fail

Most organisations approach IT procurement with a fundamentally flawed assumption: that selecting the right supplier is the primary determinant of long-term success. It is not. The quality of the tender document, the clarity of requirements, and the governance framework established during and after procurement determine operational outcomes far more than supplier capability alone.

Organisations focus heavily on monthly cost, comparing headline figures without understanding total cost of ownership. Operational ownership is often undefined - nobody is accountable for outcomes, only for activities. Requirements are incomplete or unrealistic, reflecting what the business wants, rather than what the organisation actually needs.

IT providers are frequently selected based on salesmanship rather than delivery maturity. The most compelling presentation wins, rather than the most operationally credible proposal.

"A successful implementation is not the same as a supportable service."
"Cheap procurement can become expensive operations."
"The quality of the tender and governance often determines the quality of the long-term supplier relationship."
Operational Failure Analysis

Why IT Outsourcing Relationships Fail

The root causes of IT outsourcing failure are consistent across organisations and sectors. Most are preventable through better procurement design.

Unclear Responsibilities

No defined ownership of services, escalations, or governance. When issues arise, accountability is absent.

Weak Onboarding

Transition is treated as a handover event rather than a structured operational programme. Knowledge gaps persist for months or indefinitely.

Undocumented Systems

Suppliers inherit environments they do not fully understand. Hidden technical debt surfaces after go-live.

Unsupported Platforms

Legacy or custom systems are challenging to support. The new supplier cannot deliver what was promised.

Unrealistic SLA Expectations

Headline SLA targets are agreed without understanding operational context. Breaches begin within weeks.

Fragmented Suppliers

Multiple vendors with no defined integration model create gaps in responsibility and finger-pointing during incidents.

Poor Governance

No regular service reviews, no escalation path, no structured process to on-board new systems or applications, no performance framework. The relationship drifts and confidence erodes.

Reactive Operational Model

The supplier waits for tickets. Proactive risk identification and prevention are absent from the service model.

Lack of Operational Readiness

The supplier is not ready to support the environment from day one. Ramp-up time is paid for by the client.

Insufficient Stakeholder Involvement

Key business stakeholders are excluded from procurement (by choice or by design). The chosen supplier does not understand business priorities.

Procurement Intelligence

What Buyers Think vs What Actually Matters

The questions organisations ask during procurement often reveal a fundamental misalignment between what is measured and what determines long-term operational success.

Buyer Thinks

"How many engineers do they have?"

Buyer Thinks

"They offer 24x7 support"

Buyer Thinks

"Unlimited support is included"

Buyer Thinks

"They promised a fast migration"

Buyer Thinks

"Lowest monthly cost"

Buyer Thinks

"They use AI-powered support"

Buyer Thinks

"Large support team"

Hidden Risk

The Hidden Costs Most IT Tenders Ignore

The headline monthly cost is rarely the most significant financial exposure in IT outsourcing. The costs that accumulate after go-live are typically invisible during procurement.

Onboarding Effort

Discovery, documentation, and knowledge transfer is rarely included in headline pricing. Expect 30-120 days of lower quality services, and additional costs.

Technical Debt Remediation

Inherited environments often require security patching, licence normalisation, and infrastructure cleanup before the service can operate properly.

Duplicated Tooling

Overlapping monitoring, security, and management platforms from previous suppliers create unnecessary cost and complexity.

Governance Overhead

Without defined internal governance, organisations spend significant time managing the supplier relationship rather than benefiting from it.

Security Remediation

Undiscovered vulnerabilities, misconfigurations, and compliance gaps surface during onboarding and require unplanned remediation investment.

Recurring Escalations

Unknown technology or poorly scoped services generate recurring escalations that consume internal resource and erode confidence in the supplier.

Fragmented Supplier Management

Managing multiple vendors without a primary accountability partner multiplies coordination cost and creates accountability gaps. Many organisations, to keep costs down, simply try to send all incidents and requests to IT as opposed to the most suitable vendor.

Operational Ownership Gaps

When responsibility boundaries are unclear, issues fall between suppliers. Resolution time increases and operational risk accumulates.

Typical Cost Distribution: Headline vs Total Cost of Ownership
Headline monthly support cost
40%
Onboarding and transition
20%
Technical debt remediation
18%
Governance and management overhead
12%
Recurring escalations and rework
10%
Wavex Framework

Suggested IT Tender Phases

A structured six-phase approach to IT procurement that prioritises operational success over headline cost. These phases are a starting point - this approach can be customised to your organisation's specific needs.

1
Phase 1

Business Objectives & Governance

Define strategic IT objectives
Identify key stakeholders and governance structure
Document current state and desired outcomes, including what is currently working
Establish evaluation criteria and success metrics
Internal change management and controls to keep IT updated and able to deliver
2
Phase 2

Technical Discovery & Risk Identification

Document current environment in full
Identify technical debt and supportability constraints
Map integration dependencies and critical systems
Assess security posture and compliance obligations
3
Phase 3

Supplier Evaluation

Issue structured tender document
Assess operational maturity - not just tooling
Evaluate onboarding and transition capability
Reference check on operational delivery - not sales
4
Phase 4

Operational Readiness

Define acceptance criteria for go-live
Agree documentation and knowledge transfer requirements
Establish governance and reporting framework
Define escalation paths and accountability model
5
Phase 5

Transition & Onboarding

Execute structured onboarding programme
Parallel running and stabilisation period
Knowledge transfer and documentation completion
Post-transition review and issue resolution
6
Phase 6

Continuous Improvement & Governance

Regular governance and service reviews
Operational maturity assessments
Technology roadmap alignment
Proactive risk identification and remediation

Download the IT Tender Template

A structured template aligned to the Wavex framework - ready to adapt for your organisation.

Download Template
Supplier Assessment

Reactive Supplier vs Strategic Operational Partner

The distinction between a reactive supplier and a strategic operational partner is rarely visible during procurement. It becomes apparent within the first 90 days of the relationship.

Reactive Supplier

Waits for tickets to arrive
Focuses on SLA closure metrics
Limited visibility and reporting
Reactive onboarding - inherits problems
Little governance involvement
Fragmented support model
Operational surprises at renewal
Little strategic input

Strategic Operational Partner

Proactively identifies risk before issues occur
Focuses on operational outcomes and business impact
Executive reporting and real-time operational dashboards
Structured onboarding with documented environment
Active governance participation and service reviews
Unified operational accountability
Continuous improvement and roadmap alignment
Strategic technology partnership and advisory
"The most successful outsourcing relationships are operational partnerships built on visibility, governance, accountability, and continuous improvement."

Good IT Procurement Is About Long-Term Operational Success

The organisations that achieve the best long-term outcomes from IT outsourcing share a common characteristic: they treat procurement as the foundation of an operational partnership, not a commodity purchasing exercise.

Governance Matters

Defined ownership, accountability, and governance frameworks determine long-term service quality more than any SLA metric.

Onboarding Matters

The quality of transition and onboarding determines the operational baseline from which the entire relationship operates.

Operational Maturity Matters

How a supplier manages, monitors, and improves your environment matters more than the tools they deploy.

Supportability Matters

Systems must be assessed for supportability before go-live. Inheriting unsupported complexity creates long-term operational debt.

Visibility Matters

Real-time operational visibility enables informed decisions, proactive risk management, and genuine accountability.

Partnership Matters

The most successful IT relationships are operational partnerships built on shared accountability and continuous improvement.

"The most successful IT partnerships are rarely built on the cheapest proposal. They are usually built on operational clarity, governance maturity, and shared accountability."
Frequently Asked Questions

IT Tender Questions Answered

Common questions from organisations starting an IT procurement process.

What is an IT tender document?+

An IT tender document is a formal request issued to potential IT suppliers that sets out your organisation's requirements, environment, and evaluation criteria. It gives suppliers the information they need to submit a structured proposal, and gives you a consistent basis for comparison. A well-written tender covers technical requirements, service expectations, governance and reporting requirements, security obligations, and commercial parameters.

When should I run an IT tender?+

Common triggers include an upcoming contract renewal (typically 6-12 months before expiry), dissatisfaction with your current provider, a significant change in your organisation's size or technology requirements, a merger or acquisition, or a strategic decision to move from in-house IT to a managed service model. Running a tender too close to a contract end date is a common mistake - it reduces your negotiating position and limits the time available for a structured transition.

How long does an IT tender process take?+

A well-structured IT tender typically takes 8-16 weeks from initial scoping to contract signature, depending on the complexity of your environment and the number of suppliers being evaluated. Organisations that rush the process - particularly the requirements definition and evaluation stages - frequently encounter problems post-contract. Allow additional time for transition planning and onboarding, which typically adds a further 30-90 days before the new supplier is fully operational.

How many IT suppliers should I invite to tender?+

Three to five suppliers is the most effective range for most organisations. Fewer than three limits comparison and negotiating leverage. More than five creates disproportionate evaluation overhead and can reduce the quality of responses, as suppliers invest less effort when they perceive low probability of success. Shortlist based on operational maturity and sector experience, not just headline pricing.

What should an IT tender document include?+

A comprehensive IT tender should cover: your current environment (infrastructure, applications, user count, locations), service requirements (support hours, response times, escalation paths), security and compliance obligations, governance and reporting expectations, transition and onboarding requirements, commercial parameters (budget range, contract term, pricing model), and evaluation criteria with weightings. Many organisations underinvest in the requirements definition stage, which is the single most common cause of post-contract disappointment.

How do I evaluate IT tender responses fairly?+

Define your evaluation criteria and weightings before issuing the tender - not after receiving responses. Typical criteria include operational maturity, technical capability, onboarding approach, governance and reporting quality, security posture, commercial value, and cultural fit. Avoid over-weighting price at the expense of operational indicators. Reference checks with existing clients are one of the most reliable indicators of delivery quality and should be a mandatory part of the evaluation process.

What are the most common mistakes in IT tenders?+

The most common mistakes are: issuing a tender without a clear requirements document, over-weighting price in the evaluation, failing to involve key internal stakeholders (often with conflicting priorities which should be consolidated), not assessing transition and onboarding capability, selecting based on polished sales deck quality rather than operational delivery evidence, having weak internal governance, and not defining reporting expectations before contract signature. Many organisations also underestimate the transition period and do not build adequate stabilisation time into the project plan.

How do I switch IT provider without disruption?+

Structured transition planning is the most important factor. This includes a detailed knowledge transfer process, parallel running where possible, a defined stabilisation period after go-live, and clear escalation paths during the transition. The new supplier should be expected to document your environment fully before taking over operational responsibility. Organisations that treat the transition as a simple handover event - rather than a structured operational programme - consistently experience the most disruption. Read our full guide: Switching IT Provider Without Disruption.

Should I use a procurement consultant for an IT tender?+

For complex environments or organisations without internal procurement expertise, a specialist IT procurement consultant can add significant value - particularly in requirements definition, supplier evaluation, and contract negotiation. However, the most important factor is having sufficient internal stakeholder involvement. Be careful if the consultant simply uses their default tender document which may not capture true business goals. A consultant cannot substitute for the operational knowledge held by your business teams. The best outcomes come from a combination of internal expertise and external process support.

How do I write a good IT tender document?+

Start with a clear description of your current environment and the outcomes you are trying to achieve - not just a list of services. Define your requirements in terms of business outcomes, not just technical specifications. Include your governance and reporting expectations explicitly. Be honest about the complexity of your environment, including known technical debt and supportability challenges. Suppliers who understand the real environment will provide more accurate proposals and are less likely to encounter surprises post-contract. And remember, asking IT providers a lot of questions, will create large responses, and reviewing five 50 page tender responses is an extremely time-consuming exercise, and rarely delivers the best results (if lots of questions are required, consider a RFI > RFP tender model).

What is the difference between an RFP and an IT tender?+

In practice, the terms are often used interchangeably in the UK IT market. A Request for Proposal (RFP) typically implies a more structured evaluation process with defined scoring criteria, while a tender may be more open-ended. For most SME and mid-market IT procurement exercises, the distinction is less important than the quality of the requirements document and the rigour of the evaluation process.

How do I assess an IT supplier's security maturity?+

Ask for evidence of certifications (Cyber Essentials Plus, ISO 27001), and what risk frameworks are used, but do not treat certification as a substitute for operational assessment. Review their security incident response process, ask how they handle vulnerability disclosure, and assess their approach to patching and endpoint management. For regulated environments, ask specifically how they support your compliance obligations. Reference checks with existing clients in similar sectors are particularly valuable for assessing real-world security delivery.

Should I use an RFI before issuing a full IT tender?+

A Request for Information (RFI) followed by a Request for Proposal (RFP) is a well-established two-stage approach that can significantly improve the quality of your procurement process. The RFI stage asks suppliers a focused set of yes/no or short-answer questions to establish whether they meet your base requirements - security certifications, sector experience, minimum support coverage, key platform capabilities. Only suppliers who meet those base requirements proceed to the full tender stage. This approach keeps proposals smaller and more focused, reduces evaluation overhead, and ensures you are not spending time reviewing detailed proposals from suppliers who cannot meet your fundamental requirements. One important caution: be careful about excluding suppliers on peripheral yes/no questions that do not reflect genuine operational requirements. An RFI should filter on genuine blockers, not create artificial barriers that eliminate otherwise strong candidates.

Invite Wavex to Respond to Your IT Tender

If you are running an IT tender process, we welcome the opportunity to demonstrate our suitability. Share your requirements with us and we will provide a structured, transparent response that gives you a clear basis for comparison.