TrustRadius: an HG Insights company

Tabillo

Score7.3 out of 10

1 Reviews and Ratings

Features

Top Performing Features

  • Custom fields

    Users can create custom fields to store additional information on standard and custom objects.

    Category average: 8.4

  • Role-based user permissions

    Permissions to perform actions or access or modify data are assigned to roles, which are then assigned to users, reducing complexity of administration.

    Category average: 8.6

  • Customer data management / contact management

    The software acts as a single source for all customer data and enables users to access that data efficiently.

    Category average: 8.6

  • Workflow management

    The software helps automate parts of the sales process, such as sending emails, updating contact records, and following approval processes.

    Category average: 8.2

Sales Force Automation

This is the technique of using software to automate certain sales-related tasks.

  • Customer data management / contact management

    The software acts as a single source for all customer data and enables users to access that data efficiently.

    Category average: 8.6

  • Workflow management

    The software helps automate parts of the sales process, such as sending emails, updating contact records, and following approval processes.

    Category average: 8.2

CRM Project Management

This component of CRM software helps users initiate, plan, collaborate on, execute, track, and close projects.

  • Task management

    This includes the ability to plan, track, collaborate and report on tasks.

    Category average: 8.2

  • Reporting

    Software provides a broad range of standard and the ability to build custom reports.

    Category average: 8.1

Customization

This addresses a company’s ability to configure the software to fit its specific use case and workflow.

  • Custom fields

    Users can create custom fields to store additional information on standard and custom objects.

    Category average: 8.4

Security

This component helps a company minimize the security risks by controlling access to the software and its data, and encouraging best practices among users.

  • Role-based user permissions

    Permissions to perform actions or access or modify data are assigned to roles, which are then assigned to users, reducing complexity of administration.

    Category average: 8.6