Be in the know...

The Malbek Blog

The go-to resource for contracting insights, best practices, and CLM industry related news. Don't miss out on the weekly content!

Main illustration for Malbek blog
Matt Patel

How to Submit a Contract Request in a Jiffy

This blog post covers the best way to request a contract using the latest template and follow it throught the review and approval process.

Becky Holloway

How Contract Management Empowers Sales Teams

The revenue that sales drives is the lifeblood of any company. Effectively managing the contracts for those sales deals will accelerate time to revenue.

Becky Holloway

10 Key Elements for CLM #10 – Artificial Intelligence

AI is everywhere these days. Think of the possibilities it brings to contract management from identifying most favorable terms to pricing recommendations.

Becky Holloway

The 3 Questions to Ask When Creating Your Contract Management RFP

The RFP process can be tricky. This webinar challenges you to ask yourself three key questions as you craft your RFP.

Becky Holloway

10 Key Elements for CLM #9 – Integrations

One of the biggest obstacles companies face is data silos. This is especially true with contracts, which draw on data across the organization.

Matt Patel

How to Survive Contract Management in a Do More with Less Environment

Contract management and corporate legal operations teams are increasingly facing growing contract volume without additional resources to ease the burden.

Becky Holloway

10 Key Elements for CLM #8 – Contract Insight

The information contained in contracts can be the key to understanding the success or failure of your business relationship with external parties.

Becky Holloway

Malbek Wins Best Managed Start-up of the Year

This year Malbek won most well-managed start-up company of the year at the the 22nd annual Venture Conference hosted by NJ Tech Council.

Becky Holloway

10 Key Elements for CLM #7 – Contract Security

Contracts contain some of the most sensitive information about a company, but contract safety can be compro­mised by an unauthorized person gaining access.