Browse Definitions :
Definition

Crystal Reports

Crystal Reports is a popular Windows-based report writer solution that allows a developer to create reports and dashboards from a variety of data sources with a minimum of code to write. Crystal Reports is owned and developed by SAP.

As a business intelligence application for individual users or small and medium-size businesses (SMBs), SAP Crystal Reports 2020 is designed to work with databases to help users analyze and interpret important information. While users can create simple reports, the software also offers comprehensive tools needed to produce complex or specialized reports.

Crystal Reports is designed to produce reports from virtually any data source. Formulas, cross-tabs, sub-reports and conditional formatting help make sense of data and uncover important relationships that might otherwise be hidden. Data visualization tools such as geographic maps and graphs communicate information visually to help in understanding data analysis.

Crystal Reports can publish in a variety of formats including Microsoft Word and Excel, e-mail and over the Web. Advanced Web reporting allows all members of in a workgroup view and update shared reports inside a web browser.

Application and web developers can save time and meet their user’s needs by integrating the report processing power of Crystal Reports into their applications. Adding reporting to applications is aided by support for .NET and Java.

Top competitors of Crystal Reports include Logi Analytics, Tableau Desktop, Cognos Analytics, Sisense and Chartio.

This was last updated in February 2019

Continue Reading About Crystal Reports

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

Close