Having CRM, using CRM, and being happy with CRM are all very different, yet related, topics. One of the hardest aspects of a CRM system to quantify is user happiness–how do you measure satisfaction? You could rely solely on internet reviews, but there’s a lot of marketing spin out there. Those reviews may not give you an accurate picture of what “Bob in sales” really thinks of the system. (more…)
When it comes to convenience and flexibility, especially for a mobile sales force, it’s hard to beat web applications. And when it comes to web applications, it’s difficult to ignore Google App’s growing presence in the enterprise application space.
Google’s suite of web-based products allows for an unprecedented level of coordination and collaboration on a wide variety of projects, and is a natural fit for cloud-based CRM solutions. (more…)
While both groups have the same basic goal — to purchase a product — they typically have very different needs and motivations. These differences should be used to inform your customer service approach toward each segment. (more…)
Your enterprise CRM system has a lot of features designed to streamline your business processes — some of which you may not have explored yet. Workflow automation is one of the more popular features, as it eliminates the need to perform a lot of tasks manually. Within a simple user interface you can easily set up rules to automate many of your day-to-day tasks. (more…)
It’s not an unreasonable requirement by any stretch — all major enterprise CRM vendors offer dashboards of some type — but a dashboard in and of itself is not a true requirement. The real requirement is what kind of information a dashboard should display. (more…)
Mobile devices are becoming ubiquitous across the sales landscape. As noted in a previous blog post, CRM vendors are betting big on an increasing demand for mobile access to CRM data.
To meet that demand, enterprise CRM vendors have responded to the growth of mobile computing by creating a host of applications for mobile devices.
Usernames and passwords have long been the preferred method of securing applications from unauthorized access. Two-factor authentication (TFA) expands on this method, and provides for exponentially stronger security (more…)
As businesses continue to deploy more related, yet independent, applications, single-sign on (SSO) authentication becomes more important. SSO provides a single entry point for end users wishing to access multiple applications (more…)