Verified Document

Customer Information Secure And Assessing Term Paper

The Cincom CRM system also has areas where the sales teams can also enter in total contract value and the total budget for a given initiative as well. Both internally gained financial information from within the customer and the reported financial results, more easily obtained if the customer is publicly held, go into deciding which customers are the most worth investing in over time. There are also analyses completed of the churn characteristics of certain customers. These profiles of high probability churn clients are used for narrowing down the customers who are going to be invested in for the long-term as well. The company also looks at the average lifecycles of the customers' enterprise systems, creating an index of opportunity by system type over the life of a customer relationship. All of these factors are used for rank-ordering new prospect sales and for defining where up-sell and new contract renewals need to be focused. In aggregate, this approach has worked very well to prioritize sales person's time and efforts, leading to greater sales over time within...

Over time, the company looks to create more focused metrics on the value their systems deliver, including the Return on Investment (ROI) of their enterprise resource planning, channel management and product configuration systems.
Conclusion and CRM Bottom Line

The sales cycles for enterprise software are typically long, involve many different groups and functional areas, and often require intensive amounts of expertise and information to be shared. The CRM systems at Cincom Systems are specifically designed to support these types of sales cycles, specifically focusing on how to position the company as a trusted advisor in its key markets. The company's culture is very much focused on measurable performance and as a result, there is an abundance of scorecards, metrics of performance and Six Sigma assessments of processes. Cincom looks to translate all their customer knowledge into a competitive advantage by being more focused and responsive to changing enterprise software buyers' needs over time through CRM.

Cite this Document:
Copy Bibliography Citation

Related Documents

Information Technology Holds Great Promise for Improving
Words: 3297 Length: 12 Document Type: Term Paper

Information Technology holds great promise for improving the way a government serves its citizens in various services it conducts to the citizens. This rapid adoption of information technology has produced substantial benefits to the citizens, tax payers, and businesses alike. It is therefore recommended for every particular government to develop digital services to streamline all its operations. One area where governments should enhance its key functions is the establishment of

Customer Expectations in the Hospitality
Words: 8123 Length: 30 Document Type: Thesis

For any hospitality services business to attain the role of trusted advisor they must consistently keep these elements of the proposed Services Expectation Model synchronized with each other. The approaches companies take to create Cooperative Advantage of accomplishing improved organizational performance on the one hand and superior customer value on the other require the prerequisite of their being a tightly coupled integration between Validation and Reinforcement of Trust and Social

Information Security Training Program
Words: 3414 Length: 12 Document Type: Research Paper

Federal Information Security Management Act (FISMA) The Federal Information Security Management Act places emphasis on the importance of training and awareness program and states under section 3544 (b).(4).(A), (B) that "security awareness training to inform personnel, including contractors and other users of information systems that support the operations and assets of the agency of- information security risks associated with their activities; and their responsibilities in complying with agency policies and procedures

Information Security Management
Words: 1948 Length: 7 Document Type: Conclusion

Security Management During the span of one's college career, a select number of courses become something more than a simple requirement to be satisfied to assure graduation; these are moments in a student's educational process which make the most lasting impacts. In my personal case, the lessons I have learned as part of my studies in ISSC680 will likely be remembered in those terms, as my eventual career will find

Customer Satisfaction and Loyalty in
Words: 5232 Length: 20 Document Type: Term Paper

2 of the respondents were self-employed and 11.2% of respondent were white-collar workers with 1.2% of respondents being blue-collar workers. The following chart shows the factor analysis results with VARIMAX rotation of traveler's perceptions of hotel attributes in the study of Choi and Chu (2000). Factor Analysis Results with VARIMAX Rotation of Traveler's Perceptions of Hotel Attributes Source: Choi and Chu (2000) The following chart shows a 'regression analysis results of hotel factors

Information Technology IT Security Breaches
Words: 1851 Length: 5 Document Type: Research Paper

IPad Security Breach Assessing the Impact of the Apple iPad Security Breach Discuss Goatse Security firm possible objectives when they hacked into AT&T's Website. Goatse Security and firms like them are on a mission to expose what they see as lies and misleading claims of companies who claim to have much greater levels of security and stability in their products than they actually do. While the accounts of the iPad incident have been

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now