SAS Institute launches new version of SRM

SAS Institute, the business intelligence software company, has unveiled the latest release of its supply-chain management...

SAS Institute, the business intelligence software company, has unveiled the latest release of its supply-chain management software.

SAS Solution for Supplier Relationship Management (SRM) Release 2.2 includes new supplier ranking capabilities, as well as enhanced spend analysis and score-carding to help companies make the most of their supplier relationships.

The supplier ranking capabilities would enable customers to reduce overall spend, mitigate supplier risk and improve their bottom lines, said Christine Kelly, SAS's global strategist for SRM.

The scorecard feature allows executives and others to select key performance indicators, pull together relevant supplier and purchasing data, and perform detailed analysis.

The spend analysis functionality aims to allow purchasing and commodity managers to review summarised supplier and commodity data.

With SRM, companies can collect, analyse and leverage all aspects of their supplier data and purchasing history to create an accurate overview of total spending, said Karen Peterson, a research director at analyst firm Gartner.

Companies can also rank their supplier base, match their business objectives with individual supplier performance, identify areas for cost consolidation and predict optimal procurement strategies, she added.



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Business intelligence software

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...