Business intelligence's central mission is to provide the business with the best quality data available for all forms of analyses, queries, reports, etc. It promises reasonable performance and response times, as well as easy or intuitive access to these analytic capabilities from nearly anywhere in the world. Of course, such a storehouse of immensely valuable information must have the highest security placed on it.
Let's look at a common scenario. Your sales representative is on the road. He (or she) is about to call on his customers and would like to know their history with the company and their overall profitability before calling on them. He accesses the corporate data warehouse and downloads the top 100 profitable customers' information as well as specific data on his customer calls. To access the data warehouse, he had to go through the usual procedures of logging in, entering his ID and password, having them authorized and so on, all to protect the precious information about the corporation's most valuable customers. Then what happens?
Register or login for access to this item and much more
All Information Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access