Browse Definitions :
Definition

sales force automation (SFA)

Sales force automation (SFA) software is programming that streamlines the collection, analysis and distribution of data in a sales pipeline.

The goal of SFA software is to get the right data to the right people at the right time, and reduce the number of administrative tasks that sales representatives and their managers have to perform manually. For example, sales reps can use SFA software to set up push notifications when a qualified sales lead visits the company's website and an email nurturing campaign to move the lead through the sales funnel.

Managers can use SFA software to monitor sales people's activity and productivity, and use that information to produce marketing plans and sales forecasts.

Depending upon the size and needs of the sales team in question, SFA software may be purchased as a stand-alone app, a cloud service, or a component of a larger customer relationship management (CRM) software suite. Enterprise-level software is usually designed to integrate with core financial applications and includes sales functions such as contact management, territory management and opportunity management.

SFA software can be developed specifically for a vertical industry's needs, or it can be selected from among the increasing number of sales automation software products, such as Zendesk Sell or Shuttle, a lead collection, tracking and distribution software designed by Lunar. No matter what the delivery model, SFA packages usually include a Web-ready database, an e-mail package and customizable templates. A three-tiered architecture is typically used to separate the database, server, and application to reduce programming demands on clients. A module-based design is generally used, to allow users to customize the package to suit their needs.

This was last updated in November 2018
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

Close