Browse Definitions :
Definition

lead trajectory

A lead trajectory is a projected path of a lead or potential customer as it applies to a goal, such as signing the customer up for a service or making a sale. Using various analytical models, sales professionals track the progress of gathering potential customers and moving them through various stages toward an end goal.

Typically displayed in graphical format, a trajectory may be created to determine how many leads have been generated, converted or advanced. In addition, sales professionals may choose to track whether the leads are new, qualified, unqualified or canceled.

Some factors that sales teams track include number of leads over time, leads to date, average lead goal, lead source (for instance, was the potential customer discovered through outreach efforts such as email campaigns, social media or cold calls) and lead aging (the amount of time that has passed since a potential customer has shown any sign of activity). In most cases, once a predetermined amount of time has gone by, the lead is considered cold or cancelled.

Using this metric, sales professionals can adjust their goals over time and look for patterns that improve their sales methods or areas of weakness.

This was last updated in October 2018

Continue Reading About lead trajectory

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than...

  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

Close