The more complicated your needs, the harder it is to use Birst.
March 01, 2018

The more complicated your needs, the harder it is to use Birst.

Jeremy Schichor | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User

Overall Satisfaction with Birst

Birst is used across my organization, but particularly by the sales and marketing departments. It is used to track pipeline flow from impressions to revenue.
  • Birst's SQL-like language is conveniently familiar for experienced developers
  • Birst integrates well with Salesforce and external CSV data sources.
  • Birst's support staff is reasonably responsive, if not always able to provide a satisfactory result.
  • Birst contains several sub-systems with similar, but signifcantly incompatible, syntax and functionalities. This leads to confusion and difficulty.
  • Birst provides insufficient control over how charts are rendered and how dashboard prompts are displayed and used. This has lead to significant dissatisfaction on the part of those for whom I've developed dashboards.
  • Significant parts of Birst resemble a relational database, but cannot be made to function like one. This results in jumping through complicated hoops to construct the fact tables for a multiple-relation data system.
Birst's ETL is better suited to our purposes than Alooma's stream-based processing.
Birst's designer is more mature and meets or needs better than Periscope's reporting functionality, at the time I investigated it.
Birst is excellent for simple reports backed by a straightforward data structure. It is less helpful for complex reports with highly permutative prompts, based on a complicated data structure with poor data hygiene.

Infor Birst Feature Ratings

Pixel Perfect reports
6
Customizable dashboards
7
Report Formatting Templates
6
Drill-down analysis
8
Formatting capabilities
5
Integration with R or other statistical packages
8
Report sharing and collaboration
8
Publish to PDF
8
Report Delivery Scheduling
7
Pre-built visualization formats (heatmaps, scatter plots etc.)
9
Multi-User Support (named login)
9
Role-Based Security Model
8
Multiple Access Permission Levels (Create, Read, Delete)
8