Browse Definitions :
Definition

sales force automation (SFA)

Sales force automation (SFA) software is a type of program that automates business tasks such as inventory control, sales processing, and tracking of customer interactions, as well as analyzing sales forecasts and performance. Businesses may have a custom version developed specifically for their needs, or choose from among the increasing number of sales automation software products, such as Interact Commerce's ACT! and GoldMine Software's GoldMine. Sales automation software is sometimes called sales automation software, and sometimes called customer relations management ( CRM ) software.

SFA packages typically include a Web-ready database, an e-mail package, and customizable template s. A three-tiered architecture is typically used to separate the database, server, and application to reduce programming demands on clients. A module-based design is generally used, to allow users to customize the package to suit their needs.

In August 2000, Oracle released a free CRM software package, OracleSalesOnline.com which makes information - such as contacts, schedules, and performance tracking - available online through the included database program. The package is designed for medium-to-large enterprises with mobile work forces. All data and storage are based at an Oracle facility, similar to the application service provider ( ASP ) model, which means that data can be accessed from any Internet connection and that the client doesn't need special hardware or software. The Oracle package also includes online staff training.

This was last updated in January 2011

Join the conversation

3 comments

Send me notifications when other members comment.

Please create a username to comment.

We at Apata Concepts are going to try SugarCRM for our SFA. Anyone using SugarCRM? Whats your take?
Cancel
Is this possible with SFA to tracing some one mobile location while he is travelling.
Cancel
Automation has proved a triage to sales. I would like to add automating lead generation can save exhaustive hours spent in finding right prospects.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close