Académique Documents
Professionnel Documents
Culture Documents
On
Inside Sales
By
Cendura Corporation
Inside Sales Team
COMPANY ................................................................................................................................................... 5
THE CENDURA SALES HIERARCHY ................................................................................................... 5
THE INSIDE SALES PROCESS ................................................................................................................ 6
OUTSIDE SALES TARGETED ACCOUNTS: ..................................................................................................... 6
Objective ................................................................................................................................................. 6
Process for Inside Sales for Outside Sales Rep ...................................................................................... 6
INSIDE SALES TARGETED ACCOUNTS:......................................................................................................... 7
Objective ................................................................................................................................................. 7
Process ................................................................................................................................................... 7
EMAIL CAMPAIGNS ..................................................................................................................................... 7
Objective ................................................................................................................................................. 7
Process ................................................................................................................................................... 7
INSIDE SALES COLD CALLING ..................................................................................................................... 8
Objective ................................................................................................................................................. 8
Process ................................................................................................................................................... 8
ON-GOING RESEARCH ................................................................................................................................. 8
Objective ................................................................................................................................................. 8
Process ................................................................................................................................................... 8
INSIDE SALES COLD CALLING PROCESS AND TACTICS ................................................................................ 9
SALES FORCE.COM ...................................................................................................................................... 9
PROCESS OVERVIEW ............................................................................................................................. 12
PROCESS OVERVIEW: INTRODUCTION ....................................................................................................... 13
Scenario I: Voicemail ........................................................................................................................... 13
Scenario II: Gatekeeper........................................................................................................................ 13
Scenario III: Targeted Contact............................................................................................................. 14
A SAMPLE SCRIPT ..................................................................................................................................... 15
PROCESS OVERVIEW: ESTABLISHING CREDIBILITY ................................................................................... 16
PROCESS OVERVIEW: OVERCOMING OBJECTIONS ..................................................................................... 16
PROCESS OVERVIEW: SCHEDULING THE MEETING .................................................................................... 18
PROCESS OVERVIEW: THE RESEARCH ASPECT .......................................................................................... 19
Introduction........................................................................................................................................... 19
Email Campaigns.................................................................................................................................. 19
ALIGNING MESSAGING WITH THE AUDIENCE ............................................................................ 19
EXECUTIVE MANAGEMENT ....................................................................................................................... 19
Regulatory Compliance ......................................................................................................................... 20
Disaster Readiness ............................................................................................................................... 21
IT Infrastructure Library (ITIL) ............................................................................................................ 21
ORGANIZATIONS BELOW EXECUTIVE MANAGEMENT ................................................................................ 22
Operations ............................................................................................................................................... 22
Application Support .................................................................................................................................... 22
Planning .................................................................................................................................................. 22
Staging and Verification .............................................................................................................................. 22
TERRITORY DEFINITION..................................................................................................................... 24
Cendura Corporation was founded in 2002 with the express purpose of helping IT
organizations reduce the escalating costs of managing and supporting complex,
distributed applications. Its core product is Cohesion, a platform for change,
configuration and compliance, which is used by Global 2000 IT organizations to
gain control of their application infrastructure
Its customers are members of the Global 2000 and include VeriSign, Homestore,
Medtronic, Fidelity Investments, HSBC, Volkswagen etc. to name a few.
VP FIELD OPS
DIRECTOR VP Sales
VP STRATEGIC INSIDE
ALLIANCES SALES
INSIDE SALES-
STRATEGIC ALLIANCE
PACIFIC
ZONE MOUNTAIN EAST
& CENTRAL ZONE
This activity is shown in green in the above diagram. The goal is to provide
research support to the outside sales representative in support of his or her own
lead generation activities.
On a weekly basis, the outside sales rep may provide a list of his or her targeted
accounts that he or she will try to penetrate in the coming weeks. The researcher
will then use that list to focus on the following activities:
• Note in the account information that this account has been targeted, by
whom, and when
• Notify the outside sales representative when the information for that given
account is complete to the best of the researcher’s capability
• Any account that has been recently (within 2 months time) targeted by an
outside sales representative ideally should not be contacted by email or
telephone.
Objective
This activity is shown in orange in the above diagram. The goal is to provide
research support to the inside sales representative in support of his or her own
lead generation activities
Process
The process is identical to the Outside Sales Targeted Accounts activity. If there
is overlap between an inside sales and outside sales targeted account list, the
outside sales list has priority.
Email Campaigns
Objective
This activity is shown in blue in the above diagram. The goal is to generate
awareness and leads through email campaigns.
Process
This activity is shown in red. The goal is to cold call contacts in SalesForce with
the intent to obtain a qualified meeting for an outside sales representative
Process
• The inside sales representative can use research services to make sure
contact information is up-to-date in SalesForce (his or her targeted
account list).
• The inside sales representative will work his or her way through the
prospective account, find an appropriate interested contact, and qualify
them. Upon qualification, the inside sales representative will schedule a
presentation and demo for the outside sales representative.
On-going Research
Objective
This activity is not specifically called out in the above diagram. The goal is to
maintain the current data in SalesForce and increase the database.
Process
As time allows, the researcher (inside Sales rep) will perform the following
activities:
The sales pitch is the most important and crucial phase of generating interest,
qualifying the contact, and scheduling the first meeting. It is very important to
focus on the following:
Keeping the above in mind, each cold call can be separated into three phases
• Introduction
• Probing
Sales Force.com
Salesforce.com is the marketing database that has been adopted by Cendura. Each
inside sales representative is given a log in ID and Password by which she can
access the database. The database provides a comprehensive collection of all of
Cendura’s activities in terms of
• Leads created
• Contacts uploaded with their relevant contact information
• Leads that have been converted into Accounts & Account status
• Events undergone in respect to individual contact/accounts
• Opportunities by the company
The inside sales rep has to log each and every activity undertaken for a particular
lead/account into SalesForce. This is done under the section “Activity History”. It is
an important source of view for the outside sales rep incase he would like to know
the status on a particular lead/Account.
All emails ideally should be sent through Sales Force.com. This would not only
present the activities that have been done under a lead, but can also help the
inside sales rep to identify who has/has not taken interest in the email. Pertaining
to the interest level that a contact has taken in the email, the inside sales rep can
target that contact..
Salesforce.com has been integrated with Outlook calendars of the outside sales rep
to ensure smooth coordination between inside and outside sales rep. When booking
a meeting/remote demo, the inside sales rep should check the calendar of the
outside sales rep before setting a date. Ideally the inside sales rep can take two
dates for the meeting, which can be confirmed back with the prospect, after
confirmation from the outside sales rep.
Inside Sales rep should also remove all duplicate accounts through the use of the
“Find Duplicate” button. By pressing this button, all possible duplicate accounts
shall be revealed. The inside sales rep can check up to maximum three duplicate
accounts and merge the relevant information. Please note that information once
merged and saved cannot be undone. So one has to be very careful while merging
accounts.
When inputting new contact information one can use the “clone” button to do so,
and change the relevant fields like name, title, phone no, email ID etc. Incase of
further information to an existing contact, use the “Edit” button to input more
information.
The Reports section displays various kinds of reports to the Inside and outside sales
rep. Popular reports are:
• Inbound Web Lead report: all incoming requests made to the company
• Weekly meeting report
• Weekly Demonar/Webinar report 9incase of Demonars / Webinars that are
hosted by the company from time to time)
• HTML email status report (gives an idea of the number of times an email
has been opened by a prospect)
Update
contact
info on
SF
Update Docume
contact nt event
info on info in
SF SF
Confirm
email.
Update
SF if
needed
Docume
Business Development Manual nt info in
12
SF
Process Overview: Introduction
The remainder of this section focuses on how to deal with each of these scenarios
Scenario I: Voicemail
In general, the best practice would be not to leave a voicemail. However, of the
case arises, then follow the practice below.
When you reach voicemail instead of the targeted contact, you should leave a
message. The message should be tailored to the profile of the targeted contact.
For example, if you are calling on a contact with a CIO title, the message will be
very different than calling on a Database Administrator or Director of IT
Operations. Advice on messaging for different audiences follows in a later section.
• Tell them what you can do for them and keep in mind the profile of the
contact. For example, “Cohesion can improve the success of moving new
applications and upgrades from testing into production.”
If you cannot get past the gatekeeper, consider the following actions:
• Ask for the contact’s email, and then follow-up by email as described in a
later section
• Ask the gatekeeper to pass the message along asking for a return call
If after you explain the intent of the call, the gatekeeper says your target contact
will be uninterested or has different responsibilities, then ask the gatekeeper who
is the best person to contact. The same is true if the gatekeeper tells you the
target contact is no longer with the company or has moved into another position.
In either case probe for the following:
When you finally make contact with the target, you follow a similar process as is
described in the voicemail section of this document. Start with the introduction,
and proceed. The key difference is agilely reacting to the contact to keep the
momentum of the conversation and continue to generate interest. If the contact
tries to put you off, some of the following may be good strategies:
• If the contact claims to be the wrong person, ask who the right person is
A Sample Script
From experience, we know that a live contact will never let your get through a
script, so the following three examples are starting points. By internalizing what
problems Cohesion solves and the value it delivers, you will be able to react to
the target contact. The following is a guide of key points to make in your
discussion with the target contact:
There are two ways to establish credibility when you reach the target contact.
The first is to reference our impressive customer list. The second is to refer to
recent coverage by the media or analysts.
The most current features and mentions by media and analysts are referenced on
our website. It should become habit to look at the website on a regular basis, so
that you can use the most recent coverage. Another strategy is to cite ROI. This
can drag you into a discussion of “how.” Since Cendura’s strategy is not to
engage in the “how” and use that as the impetus to schedule the first meeting,
you should avoid using ROI as a means to establish credibility.
• Try to understand what will be different in six month’s time. The answer is
very important.
• If the target contact indicates that this is when budget will become
available or a compelling event will occur (such as the start of a project),
then it is likely that a re-engagement could lead to a prospective lead. In
this event, it is still important to probe as much as possible. For example,
staff and responsibilities change over time, especially in six months;
therefore, having several qualified contacts within the target account offers
a higher probably of success for future follow-up.
Scenario II: “I’m too busy to talk right now. Send me some literature.”
• A good strategy here is to agree to send the literature, ask for the email
address, and continue to probe. For example, you might suggest that
• If the target is unwilling to commit to a follow-up, you can try to probe for
another contact that would have time in the nearer term.
Scenario IV: “My Company doesn’t have the problems that Cohesion
solves.”
This is very unlikely based on our experiences in the field. In a later section of
this document, we focus on messages and value propositions related to different
organizations within IT, so when this objection arises, probe on other propositions.
Most of our prospects do not have budget allocated, so consider the following
scenarios:
• Argue that they should evaluate Cohesion for possible inclusion in the next
budgeting cycle.
• Follow-up with the target contact after the meeting is confirmed: 24-48
hours prior to the meeting, phone the target contact and remind them of
the meeting.
Introduction
• You receive no response for which you may call the contact with a follow
up message to your email
Email Campaigns
The following are good rules of thumb when creating an email campaign:
• Do not send bulk emails. Tailor them to the target contact. Through
research, you should be able to determine something about the account or
even the contact.
• “Sign” the email. This is important for the live follow-up phone call
• Tailor the body of the email to the target contact. As discussed earlier,
there are certain messages that will resonate with different audiences. This
is discussed in a later section. You can begin with some of the sample
scripts mentioned in this document and place differing degrees of
emphasis depending on the target contact.
Executive Management
For example, a possible email strategy would be to use one of our management
reports as part of the email, and ask the target contact “if getting a daily report
like this one would help them stay on top of Security Policy Compliance.”
Regulatory Compliance
Disaster Readiness
The Goal
• Use reports and/or exported snapshots to capture and share the sate of
the production environment; this can serve as the basis for disaster
readiness planning
The Goal:
• This allows role-, group-, and user-based access control across the
enterprise, exposing selected subsets of Cohesion data to all
The following is a breakdown of the value propositions that resonate with different
audiences within a typical IT organization. An understanding of these will allow
you to target your message to your audience.
Operations
Application Support
Planning
• Disaster readiness
• Capture the desired state of the application or upgrade in staging; use that
Canada
NF Canada Canada
QC MB AB
SK BC
1. Key officials:
CIO (Chief Information Officer), Director/VP of IT, QA, Application Support,
Application Architecture, Operations (web based firms, whose operations are web
based), MIS etc. A few more are listed under the section ”Target Audience”
Generally only some high ranking officials like CIO and few directors might be
listed in company’s website (corporate sections or Investor Relations or Annual
Reports).
For other officials, search using Google. Key words to be used in Google:
- Company name + official designation
If the key official is sought out from site other than the Company’s own website,
then do take note of the date of the source where the information is being
retrieved from. If the information is from an old source then the person might not
be in the same position as indicated
Resources:
List of Companies
• Lead generation document containing Fortune 1000 list of companies
• http://www.jobbankusa.com/fort5index.html – Fortune 500 list, old list.
• List of CIO’s and other key officials
• http://www.informationweek.com/855/rank.htm
2. Addresses:
+Resources:
Addresses and phone numbers:
Company’s web site, their Annual Reports
http://finance.yahoo.com/ - You will get lots of other information regarding the
company from this.
Business Development Manual 26
3. Email address of the officials:
Search for any email address in company’s website to get an idea of the format
used for assigning email addresses. Email addresses can be found in the following
locations in any site:
• Press releases
• News releases
• Contact
• Investor relations
• Careers
Once the format has been found out, it is easy to ascertain the email Id of the
concerned person. Google can also be used to find out the format of the personal
email ID. Once can directly type in the format on Google, to find out the email ID.
Eg: @abcd.com.
The results usually follow up after second or third result page. If there are no
results then try the “Search within results” in Google. Use the same search -
@abcd.com again when searching within results.
The company may also use different email formats like: @abcd.com or
@corp.abcd.com or @abcd-corp.com or @ab.com etc. Try to find out alternative
email addresses, by going through the company’s web site or randomly searching
in Google.
• FirstName.LastName@abcd.com
• FirstName.MiddleNameInitial.LastName@abcd.com
• LastName.FirstName @abcd.com
• FirstName_LastName@abcd.com
• FirstNameInitial + LastName@abcd.com
• FirstName + LastNameInitial@abcd.com
• Eg: Name: Amit Singh: email: asing@abcd.com
• Name: Mike Mat: email: mmat@abcd.com
• Often nick names may be used in email addresses or vice versa
Few examples:
• Robert = Bob
• Eugene = Gene
• Lawrence = Larry
• Thomas = Tom
• Richard = Dick
Resources:
Email address formats:
• Company’s web site; PR/News section; Annual Reports
• http://finance.yahoo.com/ - You will get lots of other information
regarding the company from this.
Resources:
Company’s IT environment:
http://www.port80software.com/, gives the info about the web servers used for
the company’s website.
• All leads within a territory should be managed by the Inside Sales Rep
assigned to that territory. This holds true even though the headquarters
location for that company may be located out of territory.
The following policy and procedures is intended to clarify the rules for prospecting
for Inside Sales, outside ones defined territory.
• Additionally the Inside Sales Rep shall document in Sale Force and note in
the Description Field of the Lead that the contact is part of an out of
territory project. Both Inside Sales Reps shall share this information with
their corresponding field reps.
• If however, the Inside Sales rep discovers, in the process of qualifying the
out of territory contact that there is another project, and in the territory of
this prospect, then the inside sales would notify the corresponding Inside
Sales of such and hand ownership of that opportunity to that rep.If these
out of territory contacts require out of territory selling then the field rep
will engage the other field rep.
Cendura Product
What are Intelligent Application Blueprints?
Cohesion offers out of the box value with its extensive Blueprint library, allowing
you to begin managing your distributed applications immediately without lengthy
configuration integration.
• Audit the entire application enterprise for compliance with best practices
and operational standards (Gold Standard Configuration)
• Detect change: planned or unplanned
Cohesion
What is Cohesion?
It is a
The Cohesion architecture is the application itself, with a JDBC compliant DB. The
application can be run as a multi-tiered application, with a web server, app server,
and a DB server.
We recommend that you have 1GB of RAM for the Cohesion server and follow the
Vendor recommended requirements for the DB.
Cohesion has built in user access with individual rights and responsibilities. The
user access can be managed through Cohesion, or the can be integrated with
LDAP or active directory for single point of Administration.
Since Cohesion is written in Java, it can run on a Windows, Linux, or Sun based
servers.
• Windows
• Linux
• Sun
• AIX
• HP-UX
• Network Components via SNMP
• Any Components via SNMP
Cohesion can communicate with hosts which are located in different subnets, or
across firewalls. This is done via:
• Direct Communication
• Port-Forwarding
• SSH through a Port
• Pass-through Agents (one agent communicates with others in the DMZ,
and only it communicates with the server)
What is a Blueprint?
All web access (for applications such as Cohesion) is through a 128-bit SSL
connection over HTTP. This mechanism encrypts all the user requests and
responses between the Cendura system and the Web client.
Cohesion collects every detail about a host in your environment. All of the detail
(CMOS version of a Host) is real and comes directly from the source, by doing this
we have complied a DB with all of the information necessary for asset
management. What Cohesion provides is reporting capabilities and integration
capabilities which can help in managing your asset management.
After discovering all of the detail on a host, we can provide reports in HTML, CSV,
or XML. The data collect can be exported directly or integrated through an API
(currently custom) into your asset management product.
There is a job scheduler built into the Cohesion, which allows the user to specify
the how often they would like to update our DB.
Cendura recommends that clients “refresh” the data on a nightly basis, during a
maintenance window (12am – 4am).
Cohesion has a reporting framework, which allows us to create any report on the
data which we have collected. In addition all information in the CMDB is
exportable, in HTML, CSV, or XML.
Cohesion has business attributes which allow IT to manage each host. Those
business attributes specify the following and can be customized:
Cohesion has approximately 150 + blueprints that have been built into it. New
blueprints are added regularly and existing blueprints are kept in tandem with the
latest software releases. Some of the most common blueprints are:
Enterprise Applications
• PeopleSoft 8
• Microsoft Active Directory Server
• Microsoft Exchange
• Siebel
• Sun Java Directory Server
Applications Platforms:
• BEA Tuxedo
Web Servers
Messaging Systems
• Microsoft MQ Server
• IBM Websphere MQ Series 5
Operating Systems
• HP-UX
• IBM AIX 4.3.3+
• IBM AIX 5.1+
• Red Hat Linux 7
• Red Hat Linux 8
• Sun Solaris 2.6
• Sun Solaris 7
• Sun Solaris 8
• Sun Solaris 9
• Microsoft Windows NT 4
• Microsoft Windows 2000
• Microsoft Windows 2003
Business Development Manual 35
Relational Databases
Networking Devices
Platforms we support
Cohesion Server
• Sun Solaris 8
• Red hat Linux 7.2x and 7.3x
• Microsoft Windows 2000 server (with SP3 or higher)
Cohesion Database
Cohesion Agent
• Solaris 7,8, 9
• Linux
• AIX 4.3.3
• AIX 5L V5.1
• AIX 5.2 (64 bits)
• HP-UX11i
• Windows NT 4.0
Business Development Manual 36
• Windows 2000
• Windows 2003
Target market?
Cohesion supports heterogeneous and dynamic IT environments. Therefore
organizations that comply with such kind of environments are potential buyers for
Cohesion. The Cohesion product fits into almost every vertical industry that is in
the business place today. Some popular verticals may be as follows (please note
that this list is not comprehensive)
The Target market needs to be identified around the following two guidelines
(please note that these are guidelines and intuition and gut feeling also plays an
important role in determining a target organization)
Executives
• CIO
• VP of IT
• VP of Architecture
• VP of Application Development
• Chief Security Officer
• VP of Security
• VP Enterprise Operations
Mid-Level Managers
• Director of IT
• Dir of Architecture
• Director of Infrastructure
• Dir/ Manager of Business Continuity
• Applications Architect
• Manager System Architecture
• Director of Security
• Dir or Manager of Disaster Recovery
• Dir of IT Strategy (Calling the shots on ITIL)
Development and QA
Contact Characteristics
Qualification Questions
• How are they managing their complex distributed applications today?
• Do they have a heterogeneous mix of servers? What types?
• How are these servers and applications developed, tested and then
deployed into production?
• How many changes are made to these applications per month/annum?
• How do they manage changes to these applications?
• How long does it take them to identify and resolve miss-configured
parameters within a complex application today?
• What about a 5, 10, 50, 500 server web application environment?
• Can they automatically identify exactly where the changes are?
• What is the failure rate for newly deployed environments?
• Would they like to reduce this and save money and time?
• What about monitoring their installed software licenses?
Cendura recently took part in the Gartner IT Expo held at Florida, to showcase its
innovative foray into Application & Configuration Management.
As per Gartner Reports, Cohesion has been identified as a solution that can really
help organizations reduce operational and management costs through its
Configuration Management applications. To add to that, is the fact, that Cohesion
has been nominated as an "innovative, impactful and intriguing solution" to meet
new market demands and requirements. Cohesion with is innovative ICM
(Intelligent Configuration Management) engine, is built to provide all levels of
active change and configuration management, enabling on-the-spot problem
correction and management across a heterogeneous infrastructure."
Cohesion was designed to save time and reduce costs within the enterprise IT
organizations by significantly improving application reliability, availability and
performance, reducing application down time and maximizing the staff associated
with managing complex, distributed applications by:
We would appreciate the opportunity to meet with you to present our company
and our technology in greater detail. In this regard, please let me know on a
suitable date and time when we can meet you or have a discussion with you via
phone.
Best regards,
1
Gartner, “Cool Vendors in Configuration Management”, Donna Scott et al.,
March 2004.
2
Ibid.
Business Development Manual 42
http://www.cendura.com/solutions/manplat.html
I would really appreciate the opportunity to meet with you or one of your staff
members to determine if you have any interest in learning more about Application
Configuration Management, our company and our solutions. Either way, as a
professional courtesy would you mind contacting me at either 630.400.5030 or
firstname.lastname@cendura.com .
Hello and wish you a very Good Morning! I hope you have received our earlier
mail, outlining our company, Cendura Corporation (www. cendura.com) and
products and services.
As per Gartner Reports, Cohesion has been identified as a solution that can really
help organizations reduce operational and management costs through its
Configuration Management applications.
We would appreciate the opportunity to meet with you to present our company
and our technology in greater detail. In this regard, please let me know on a
suitable date and time when we can meet you or have a discussion with you via
phone.
Best regards
Cendura would like to wish you and yours the very best this holiday season and
hope you have a prosperous new year at ________________ .
We are excited about the coming advances to our Cohesion platform next year as
we extend our leadership in providing continuous IT control. I personally look
forward to furthering our relationship.
Competitor Analysis
Direct Competitors
• Relicore
• Troux
• Moonlight
• Cyanea
• CompassAI
• Covalent
• Marimba
• Novadigm
• Dirig
• Wily
• Mercury
• Tonic
• BMC PATROL
• IBM Tivoli
• HP OpenView
• CA Unicenter
(with (with
BMC Marimba) Remedy)
IBM/Tivoli
(with
HP/Openview Novadigm)
(with
Mercury Appilog)
Veritas
EMC
CA
Compuware
Quest
Datacenter Modeling Vendors
Troux
mValent
Collation
nlayers
Change Management & Operational Tool Vendors
Relicore
ConfigureSoft
Cendura
Configuratio Datacenter Patch Applicatio Traditional Help Desk
n Modeling Distributio n Manageme
Managemen n Performan nt Console
t ce
» Optimize: setup and enforce change management and compliance rules. View
application dependencies. Correct or re-configure applications to meet new
business requirements
Business Continuity and Disaster Readiness are about taking proactive measures
to make sure that business-critical applications and systems are stable and highly
available. Cendura is differentiated by covering virtually all hardware platforms,
operating systems, software stacks, and business applications used across the
Fortune 2000.
This single view into your heterogeneous environment provides you the unmated
ability to control what happens across your infrastructure. Disaster readiness not
only drives the need for having a perfect configuration state of your application or
service but having the ability to rollback to that perfect state. Cendura is the
To ensure business continuity and disaster readiness, Cendura gives you the
power to:
• Isolate potential problems,
• Enforce rules and policies that mitigate disaster,
• Undo unwanted changes,
• Compare against a perfectly configured state
• Actively make changes on the server
• Schedule changes in a batch job
• Detect and correct changes between
o points in time (what changed in the last week, day or hour)
o application states (compare my web servers across the
infrastructure)
o hosts (compare two servers and all the applications that run on
them)
o operating systems (compare two Linux environments)
Many companies are using IT service delivery processes such as ITIL and CMM as
the first step in getting compliant; however, process improvement will only take a
company so far and will not ensure that after IT configurations and changes occur
that applications and systems are still compliant.
Just waiting for the quarterly compliance audit is really too late – companies need
a proactive solution. In this environment, quickly detecting when IT systems and
applications become non-compliant and correcting it is essential.
Not only can you use Cohesion to quickly attain ‘compliance assurance’ for your
IT controls, but the IT group can add policies to enhance and extend IT Controls
to cover your enterprise’s best practices and respond to new rules and regulations.
Cohesion helps you to automatically discover and inventory all of the software,
configuration, and settings on their servers AND keep it up to date without
manual intervention. (Let us Imagine the power of having an organization’s entire
servers configuration information systematically collected and stored in a single
repository for everyone from the CIO to the Sys Admin to reach.")
With that level of data at one’s fingertips, one could query for nearly any type of
information about their servers: patch levels, software versions, numbers of hosts,
security consistency, etc.
This is extremely valuable for SOX reporting, compliance analysis, asset tracking,
etc.
Database sites
• www.google.com
• www.hoovers.com
• www.forbes.com
• http://www.varbusiness.com/
• http://directory.crmz.com/
• http://www.informationweek.com
• http://biz.yahoo.com/special/largest04.html
Business Development Manual 54
• www.iprofiledatabase.net/
• Database provided by Peter Nash
• www.inc.com
• http://www.corporateinformation.com/ (free registration)
Time Zone
http://www.time.gov/
Area code
Time
zone
Area
Region Offset Description
Code
(from
UTC)
52
MX -6 Mexico: Mexico City area (country code + city code)
55
N New Jersey: Jersey City, Hackensack (see split 973,
201 NJ -5
overlay 551)
202 DC -5 Washington, D.C.
Connecticut: Fairfield County and New Haven County;
203 CT -5
Bridgeport, New Haven (see 860)
204 MB -6 Canada: Manitoba
Central Alabama (including Birmingham; excludes the
205 AL -6 southeastern corner of Alabama and the deep south; see
splits 256 and 334)
W Washington state: Seattle and Bainbridge Island (see
206 WA -8
splits 253, 360, 425; overlay 564)
207 ME -5 Maine
208 ID -7/-8 Idaho
209 CA -8 Cent. California: Stockton (see split 559)
210 TX -6 S Texas: San Antonio (see also splits 830, 956)
211 -- -- Local community info / referral services
212 NY -5 New York City, New York (Manhattan; see 646, 718)
213 CA -8 S California: Los Angeles (see 310, 323, 626, 818)
214 TX -6 Texas: Dallas Metro (overlays 469/972)
215 PA -5 SE Pennsylvania: Philadelphia (see overlays 267)
VeriSign, Inc. delivers critical infrastructure services that make the Internet and
telecommunications networks more intelligent, reliable, and secure. Every day,
VeriSign helps thousands of businesses and millions of consumers connect,
communicate, and transact with confidence. www.verisign.com.
"Cohesion's ability to automatically discover and track the state of our application
development environment allows us to make decisions based on facts, not
assumptions. We can quickly identify attributes of our applications and hosts,
isolate unplanned configuration changes, re-allocate and more effectively re-
deploy our IT assets. To us, knowledge is efficiency and with Cendura, we can
now do more with our current resources." — Joe Green, Quality Assurance
Director VeriSign, Inc.
"In the past, we had to dedicate a team of engineers to manually run scripts on
each server each week to identify and resolve configuration inconsistencies.
During our growth over the past seven years, we have acquired many different
technologies to support our sites. It is our policy to standardize our large
environment to serve our market. With Cendura, we now have the confidence in
knowing what we have, maintaining standard operational policies and efficiencies,
and easily resolving any issues that arise – automatically." — Marty Frame,
Senior Vice President of Product and Technology Homestore, Inc.
"Over the past year, visitors to LastMinuteTravel.com have tripled. This increased
customer demand has driven us to scale our software and hardware infrastructure,
and issue new site releases approximately once a week. Open source products
have allowed us to deploy quickly, but the environment becomes more complex
with a wide and varied array of application components. With its application
discovery and problem identification capabilities, Cohesion from Cendura gives us
the ability to set Web and application server configuration standards. We have
spent 20% less time troubleshooting and have redirected those resources to
develop new products for our customers." — Chris Meystrik, Chief Technology
Officer Last Minute Travel, Inc.
Once known primarily as a mutual fund company, Fidelity has adapted and
evolved over the years to meet the changing needs of its customers. Today, that
evolution is reflected in its menu of products and services. In addition to more
than 300 Fidelity mutual funds, they also offer discount brokerage services,
retirement services, estate planning, wealth management, securities execution
and clearance, life insurance and much, much more.