Feeds

Outsourcing firms squeezed till their pips squeak

More bang, less buck

Internet Security Threat Report 2014

IT outsourcers are facing a torrid time with nitpicking customers demanding more and paying less for their services. The numbers of deals are increasing, but they are worth less than before, and they don't last so long.

That's according to separate reports from IDC and Technology Partners International (TPI), an outsourcing consultant. Deals with a total contract value (TCV) of $1bn-plus are at their lowest point in four years, according to TPI. And deals over $50m are at their lowest point since the third quarter of 2002.

"There have been an increasing number of smaller, single process contracts compared with larger, multi-process contracts in recent years," Peter Allen, TPI partner, said. Its numbers are taken from its work with outsourcers and from publicly available information.

IDC has picked up on the same trend, recording a 3.1 per cent drop in TCV of the 100 biggest worldwide deals in 2005 to $67.9bn. Mega-deals, with $1bn plus TCV, and deals ranging from $500m to $1bn were both down. Contracts worth less than $250m more than doubled - 23 up from eight.

Deals are changing as the number of service suppliers increases, giving customers greater choice and so creating price pressure. That's becoming important as many early adopters of outsourcing renew their initial contracts, and are unwilling to become locked in again for long periods. Also, having shifted over people or assets, the need for an expensive contract lasting seven-to-10 years is gone. Companies are moving toward five-year deals.

According to Allen, service suppliers are now under pressure to demonstrate their value at an early stage. "They have to be clear in their service offering because contracts are not as open ended as they were in past. They need to demonstrate value early. After three years, businesses are in position to go another way," he told The Register.

The changes appear to favor India's suppliers, who are smaller, nimbler and more competitive on price than the big US and European rivals. Indian companies won eight per cent of contracts awarded in the quarter to September 30, up from two per cent last year. They also have 25 per cent of the TCV in application development and maintenance and are beginning to sign contracts in infrastructure.

IDC noted networking and desktop deals climbed substantially during 2005 from 14.6 per cent of total IT outsourcing deal value in 2004 to 32.4 per cent.®

Secure remote control for conventional and virtual desktops

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.