Sole Source Justification Tutorial

Author: John Honovich, Published on Mar 02, 2012

The sole source justification is a very powerful yet controversial way of specifying products. Vendors love them because it eliminates competition and all but guarantees higher profits. Users often want them to simplify complex contracting procedures. However, often these justifications are abused and manipulated. In this note, we dig into sole source justifications sharing a recent practical example betwee BRS Labs and a US city.

What It Is

*********, *********** *** ***** ***** ********* *** *********** ******* ********* to ****** *******. **** ******* ** ***** ********** *** ********* requires ******* *** **** *** ** *** ****** ****, ** any ********* **********. **** ** **** ** ****** **** ********* are *** ********** ** ******* *******, ********, *******, ***.

**** ****** ************** ***** ************* ** ********* *********** ******* *** approved ******** / ********. ** ** **, ***** ************* **** justify ******* * **** ******, ****** **** * ******* ** *******, *** meet *** ************'* *****. **** ****** ************* ************ ************* ** **** ************* ********.

*********, * **** ********** *** **** ** ******* * **** source:

  • ****** ******** - * ******* ** ******* **** ** ***** organization *** ******** ******* (*.*., ******** **** ********)
  • ********* ************* - **** *** ******* *** ** **** **** works **** **** *** ************ ******* *** (*.*., * *** already *********)
  • ****** - *** ******* ** ******* ** ****** **** ******* and ****** **** *** ****** *********** **** ****** (*.*., *******, natural *********, ***.)

*** ************ **** ****** *** *************, ********* **** *** **** of *** ****** ***** *********. ** **** ** *** ****** organization ** ******* ** ******* *** *************, ** ********* ** approved. ****** *** **** ****** ************** ********** ******** ** ********. Indeed, ** ** **** ********* *****, ***** ** ** *********.

Why ******* **** ****

* *********** *********** ******* ** ******* *** *******, **** ** they *** ********* ** ******:

  • ******: * ****** *** ******* *** **** * - * months ** ******, ************* *********** *** ***** ******* *** ****** it **** ********* *** *** *******.
  • ****** ********: **** *** ****** ** *********** *********, ******* **** **** pressure ** ****** ***** *******, *** ********* ***** *******.
  • **** ** ********: ** **** ******* ********* *** **** **** * ***** vendor **** ***** ** *** ***** * **** ********* ** alternative ********.

** ********, ** * ****** *** *** *** ***** ** sole ****** ***** ********, *** ****** ** *********** ********** *** business, *** ****** * ****** ***** *** *** ******* *** business ******.

Buyer **********

***** *********** ******* ** ******** ** ******* ******, ********** ** the ******* **** *** **** ****** ************* ******** ********** ** buyers ** ****:

  • *** **** **** ****: ****** ***** **** * ********* ****** *** **** **** a *********** ******* *** ***** **** ** ** **** ** unknown ******** **** ***** *** ** * ************ *** (****: this ** ************* *** ***** **** ***** ** ****** ****).
  • ****** ****: ******* * *********** *** *** ** ********* *** **** consuming *** *** *****. ** *** ***** '*****' **** **** want, **** ******** *** ********* **** **** *** *******.

Practical ********

******* ********* **** ** ******* ***** ** ********** ** ********* compatitability:

  • **********: **********, ******* ** ******** ************ **** ******** ****** ** sole ****** ******* *** ************* ** ***** ********. ****'* ********* ** *** **** ***** **** ******* *** * $***,*** USD *******. *** ***** **** ********* **** * ****** ******* ** patent ** *** ******* ** *** ***** ** *** *************.
  • ********* *************: ******* ** ***, ****** ******* ******** *** **** **** typcially ***** **** ** *** ********* ** ** *** ***********, often ** ******** **** ********* ** **********. **** ** **** because **** **** **** ********** **** ****** ********* ****** ** the **** ****** ************* ** ***** ******** ** *** ******.

Misuse *** *****?

*** *** **** ** ******** **** ****** **************, ********** **** it ***** ** '******' *********. * **** ******** ** **** aware ** *** ***** ** ******** ***** '******' ********. *** technology *****, ** ** **** ** **** ******** **** **** one ************ ***. ****, **** *** ****** ****** ** ****** as ** **, ****** *** *** ****** ** ******* ** questionable *****. ** * ****** *** *** ** *** **** excited ***** ***** ********* *** ********* ******, ********** **** ******** as '******' ** *** ****.

** ** **** ********* *** *********** *********** *** ******* ***** justifications ** ***** ********* ** *** ******** ** '******'. *********, the ******** ***** ** ******** **** *** ***** ** *** buying ************. *******, **** ** ************** ********** *** ******* **** technological ********* **** *********** ****** ***** *** **** ** ******* niche *******. *** *******, ** *** *** **** ****, ** BRS **** ***** *** **** ******** **** *** **** *** needs ** *** ** **** ***** *******? ************** ***** ******? ***** ******* ** ******* ****** ***** ********* implementations **** *** ***** ******* ** ****? **** *** ** as ****** ******* ** ** **** *** ** ** ************ determine.

**** ****** ************** *** ******** ***** **** **** ** ** carefully ********** ***, **** *********, ******** ** **** ********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Tutorials

Selling and Valuing Security Integrators on May 12, 2017
This ia a tutorial in how to (1) determine your security integrator's value and (2) to sell your security integrator. If you own an integrator,...
Duress Codes For Alarms Systems on May 02, 2017
An alarm system can call for help in the event of an attempted break in, but only if it is armed. If an adversary forces an authorized user to...
Burglar Alarm Strobes Guide on Mar 31, 2017
Strobes provide visual notification of alarm incidents, as sirens are used to give audible notification. Using a strobe gives alarm users and alarm...
Burglar Alarm Sirens Guide on Mar 27, 2017
Sirens are used to alert users to an alarm condition. In this note, we examine how to choose, locate, and install alarm sirens, including Siren...
Glass Break Sensor Tutorial on Mar 21, 2017
Burglars often break glass windows to get into a house. Using glass break detectors in conjunction with alarm contacts is a good way to protect the...
Alarm Panic Switches Tutorial on Mar 16, 2017
Panic switches allow silently triggering an alarm system when it is otherwise disarmed. In this tutorial we explain and contrast the 7 most common...
Environmental Sensors For Burglar Alarm Tutorials on Mar 15, 2017
Intrusion detection systems can be used to alert users to environmental issues. By connecting sensors that monitor the heat, humidity, and...
Alarm Contacts Tutorial on Mar 07, 2017
Contacts are the devices that tell an alarm panel when an entryway is open or closed. The act of opening or closing an entryway, such as a door or...
Alarm Motion Detector Tutorial on Mar 06, 2017
Sensors designed to detect movement are a good way to protect large, open areas. In this tutorial, we examine motion detectors,...
Glass Doors and Access Control Tutorial on Feb 22, 2017
The biggest challenge for many access control systems are glass doors. Here's what happens when a maglock is improperly installed to an existing...

Most Recent Industry Reports

Avigilon VP Communications Exits on Jun 27, 2017
In 2016, Avigilon hired an executive, Darren Seed to: build and maintain strategic relationships with the investment community and to...
Hikvision H.265+ Tested on Jun 27, 2017
Hikvision, which in the past few years released H.264+ (see test results) has now released H.265+, that claims even greater bandwidth savings. We...
Milestone / Canon Launch Cloud Startup Arcus Global on Jun 27, 2017
Milestone has spun off a business, Arcus Global, funded by their parent company Canon. The new company aims to transform the VSaaS market with an...
Biometrics Pros and Cons For Electronic Access Control on Jun 26, 2017
Biometrics has been long sought as an alternative to the security risks of cards, pins and passwords. While biometrics has improved somewhat over...
Manufacturer Sales People Are Very Important - Statistics on Jun 26, 2017
IPVM's new integrator statistics show what sales people say regularly: Sales people are very important. From 150 integrator...
No Personal Opinions About Work on Jun 26, 2017
One rising trend is the tendency for people to disclaim their statements on work related topics as their own 'opinions' or 'personal...
Importance of Sales To Integrators - Statistics on Jun 23, 2017
One of the top trends in the industry over the past few years has been the rise of across-the-board sales (e.g.: Hikvision Sales, Dahua Sale,...
Deep Learning Surveillance Startups Deep Problem on Jun 23, 2017
The undeniably good news for the video surveillance market is that we are seeing the rise of more startups than in many years. The cause of this...
Avigilon Announces RADAR-Based Presence Detector on Jun 22, 2017
RADAR is gaining momentum within physical security. Two months after Axis announced a network radar detector, Avigilon has announced a RADAR-Based...
Covert Cloud Camera Service Launching (KJB) on Jun 22, 2017
Cloud IP cameras, for consumers, has become increasingly commonplace. However, covert cameras, lag there, with few options. Now, North America's...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact