Anda di halaman 1dari 15

AE

+
SECURITY Brought to you by

March 2014 Vol. 2/No. 1

Best Practices for making an


Impression with A&Es
You must be able to present in a way
that resonates with a specifier in order
to reach your objectives

ALSO IN THIS ISSUE:


Should I Recommend My Competition?
Why Bigger Isnt Always Better
Cyber Security Has No Borders
Expanding into Foreign Markets
By Steve Lasky, Editorial Director of Cygnus Security Media

Every consultant needs some


skin in the game

M
ost of us describe it as a work in progress. to help them serve their clients more effectively. There is

FOUR IP
That ever expanding circle of trust we call the seldom a week that goes by that a manufacturer has not
security consultant and vendor relationship. asked for an opportunity to stop by our office to bring us
The fact that the lines of communication up to date on their technology and often times their prod-
are sometimes garbled between the two worlds presents uct development roadmap, says this consultant.
a problem that eventually affects the client. Over the past While another consultant admits that some manufac-
several years we have seen many technology vendors who tures do this better than others, he appreciates the effort.

CAMERAS
have been diligent in their efforts to embrace relation- Sometimes these update visits almost become a sales
ships with industry consultants. There is not only room call. We discourage that. What we are looking for is an
for improvement, but a critical need to have this happen. interactive discussion about the technologies and their
As technology morphs from analog to digital and ser- applications and what the manufacturer is doing to sup-
vices rise from buried cables to the cloud, a cohesive part- port their integrators and end users.he says.

OVER ONE COAX


nership will ensure consultants have skin in the game. Collaborative relationships can result in vendors tak-
Talking to several top industry consultants, the consen- ing a number of new product enhancements to R&D.
sus seems to reflect a roadmap of cooperation. As more and more manufacturers make their web sites
One consultant tells me that the key to this enhanced A&E-friendly, providing access for updated specifica-
relationship is that vendors have developed a better under- tions, data sheets, and even three dimensional drawings,
standing what consultants do and are providing resources everyone in the industry wins.

EoC Adapters
together we can
eBridge4SK

- Upgrade coax infrastructure to IP


- Expand surveillance coverage
educate inspire nourish heal
- Reduce cost of ownership
By supporting Mission 500, you can join the legions of security professionals who
are donating their time and resources to help improve the lives of children around
the world. Just $35 a month provides food, education and healthcare services to a
child in need. A small investment in our collective future. Together with Mission 500
we can make a difference.
More than just power.
Made in the U.S.A. - altronix.com - Lifetime Warranty

Download the free Altronix App! Find out how you can help by emailing us at
pr@mission500.org, or calling George Fletcher
directly at 305-321-3193.

Request information: www.securityinfowatch.com/10487869


Request information: www.securityinfowatch.com/10212790 www.SecurityInfoWatch.com Security A&e March 2014 3
5906MP-1 STE A&E supplement Mission 500 ad RA 7 x 4.875
AE
+
SECURITY

16 Why bigger isnt always better when


selecting an access control partner
MARCH 2014 By Robert Laughlin
Galaxy Control Systems president Robert Laughlin
offers a personal view related to his experiences of the
advantages of working with small to mid-sized access
3 Editors Introduction: control technology vendors.
Every consultant needs some skin
in the game 18 Expanding into foreign markets requires
a total commitment
high-speed frame rate (1080p@60fps)

By Dr. Armelle Fe
SPECIAL FEATURES: If localization is not well-planed it will lead to frustration
6 Top 10 best presentation practices
By Chris Peterson
among your employees and customers. This will serve as
a primer on how to best expand your global interests.
sharp detailed WDR (130dB)

You must be able to present in way that resonates


with a specifier in order to reach your objectives.
24 Cyber security has no borders
By Ayel Vogel
exceptional low light

12 Should I recommend my competition?


By Ray Coulombe
A sound cyber security strategy is no longer optional,
but an imperative foundation any organization.
It takes moxie to step out of the box and, if neces- However, the severity and complexity of cyber secu-
sary, recommend a competitors solution. rity make it impossible to specify a simple solution.

capture the smallest details


Consultants
The Over 1500 validated consultants in over 500 companies
...and growing
Security Consultant Search by vertical and location

Connection Integrators
Nearly 300 integrator firms...and growing
Search by vertical, location, and key manufacturers
The security industry's Manufacturers
the power of technology
definitive resource for Over 1000 manufacturers
Samsung video surveillance solutions set the benchmark for exceptional performance and added
designed,engineered, Search by 125 product categories
value. With innovative technologies like WiseNetIII that provides proprietary imaging technologies
and specified projects and Design Tools
to capture the smallest details and all the speed you need for efficient networked IP systems.
products Access an array of useful tools from across the industry
Cameras, storage, wireless, power, and more

Resources
Technical Articles
Codes, Protocols, and Standards
Guide to Industry Certifications

Project of the Day


Everyday...a new bidding project, with link to plans
and specs

For information visit www.securityspecifiers.com or email info@securityspecifiers.com


1.877.213.1222 samsung-security.com
Request information: www.securityinfowatch.com/10300750
4 SECURITY A&E March 2014 www.SecurityInfoWatch.com Request information: www.securityinfowatch.com/10215711
By Chris Peterson, President, Vector Firm

Top 10 best practices in


a glossary of terms for your tech- ny wouldnt need you to help sell
nology and email it (and any other it. Prepare a list of your products
helpful material) to the audience limitations and invite a candid

presenting to architects,
a few days before your presenta- conversation with the audience
tion. I once observed a thermal about these weaknesses. Dont
imaging sales person present to celebrate your weaknesses, but be

engineers and consultants


a consultant with a strong video honest and confident about them.
background. Unfortunately, his Explain where this affects the
experience was minimal in ther- products performance and where

P
mal imaging and he wasnt famil- it doesnt really matter. This will
iar with some of the terms unique help the specifier develop an area
You must be resenting to an audi- This audience is completely differ-
to the technology. A simple glos- where your product can be ideally
ence is the most pow- ent in need, interest, and personal-
able to present erful action taken by ity. However, many times the old
a sales professional. PowerPoint that was just given to a
in way that Regardless of the doz- facilities manager at a university is
ens of communication methods at shined up on the screen in front of
resonates with a our fingertips today, public speaking a half dozen people who will never
is still the most influential mode of use the product but might need it as
specifier in order transferring emotion. The problem part of a larger design.

to reach your is that most professionals today are

objectives
poor presenters.
In the security industry, present- 2. Dont make your presenta-
tion over-the-top in tech-
nical jargon. A common mistake
ing to a specifier is a skill that can
separate one company from their made by good sales people with
competitors -- if done correctly. The great intentions is to take the sales
objective of pursuing relationships presentation and make it super
with architects, engineers and con- techy for the smart guys. It
sultants is to have your products doesnt matter how intelligent your
specified into more projects. In audience is, reading data off of a
order to achieve your objective, you chart will put them to sleep. Even
must be able to present in a way that though this audience has different
resonates with the specifier. Below needs than an end-user, they still
are 10 best practices for presenting need to hear entertaining stories
to specifiers in the security industry. in an organized and logical order
(For this article, Ive given the best to hold their attention. Dont bore
practices for presenting to specifiers them with your really cool words
and graphs. sary would have solved this prob- positioned, and will place you at
as a whole rather than break it down
lem and kept the presentation very the top of the list of credible sales

3.
to architects, engineers, and consul-
Send a glossary of special fluid. Also, consider how profes- professionals.
tants.)
terms and other helpful sional this small gesture makes

1. Customize your presentation


material ahead of time. Designing
security projects requires a broad
you appear.
5. Share real stories and
examples. There is nothing

4.
for the specifier. Im amazed
knowledge of many technologies. Share the good and the better for retaining attention of an
how many sales people give the
Being up to date on the special bad about your offer- audience than telling a story that
same presentation to an A&E firm
terms from all the different technol- ing. If your product was perfect is emotionally relevant. Have fun
as they give to an end-user or VAR.
ogies is almost impossible. Develop for all applications, your compa- and make fun of yourself. Dont

6 SECURITY A&E March 2014 www.SecurityInfoWatch.com www.SecurityInfoWatch.com Security A&e March 2014 7
The All New MicroDome .

just tell them about the wide temper- port process. How do you support
ature range that your widget can han- your reseller, what is your warranty,
dle; tell them a story about the demo how do you handle version control
you did in Chicago last January when and compatibility? Tell a story about
your watch stopped but your wid- your product failing and how your
get kept working -- but you missed company handled it by following your
your flight because of your watch. process. Dont talk about how cus-
Tell stories that are true and relevant, tomer-centric you are or how service
and your audience will love you for is the number one priority in your
In the security it. Stories will help your audience company everyone at every com-
remember you months in the future pany in every industry states this. Easy Spring Arm
industry, presenting when they might need to specify your Discuss the written policy and tell
Installation for Flush
Mount Models

to a specifier is product. them a story about how it has been


practiced. New Indoor/Outdoor
a skill that can
6. Dont get caught up in dis- Ready Surface Mount
Models

separate one
cussing technical detail dur-
ing the presentation. I think its a
universal requirement: every pre-
8. Let the audience know how
to work with your company.
All of us like to think that our prod-
company from their Worlds Smallest All-in-One H.264 Day/Night
sentation has to have that guy in the ucts are so cool that the specifiers
competitors if back who wants to show everyone will break through walls to work with 1.35 Megapixel and WDR Dome IP Cameras
how smart he is by dragging you into us. However, if its not fairly easy to
done correctly. The the weeds of technical details. Dont work with your company, theyll find
Arecont Vision introduces MicroDome
megapixel IP cameras. These small,
objective of pursuing let it happen. There are many tech- someone comparable. During your ultra low profile cameras offer the great
niques to overcoming this trap, but presentation, show them the multiple features of Arecont Vision megapixel
relationships with the best thing you can do is acknowl- ways to work with you and take it technology like superior image quality,
edge and promise. Be prepared with a step further. Call the 800 num- excellent compression and fast frame
architects, engineers rates. An innovative spring arm design
material to distribute after the pre- ber where a live person answers, call Digital Zoom Field of View

and consultants is to sentation, acknowledge the question up your website and show them the makes installation a snap: simply slide
the camera through the hole and secure the magnetized
with appreciation, and promise that specifier section where all the draw-
have your products the material youll give them after ings, pricing, and specifications can
cover ring with a single screw. Every model comes equipped
with a mechanical day/night switcher, and pixel binning
specified into more the presentation will answer all the be found, and make sure they all have on 3- and 5-megapixel models deliver excellent low-light
technical questions. Finally, let the your contact information. capabilities. Add optional true Wide Dynamic Range and
projects. smart guy in the back know that difficult lighting conditions are overcome with MicroDome.

9. If appropriate, bring demo The ultra low profile of the MicroDome allows for discreet surveillance.
youre happy to discuss this with him Sometimes smaller is indeed better!
in detail after the presentation. No equipment and samples.
matter how technical the audience, Retention of information is direct-
once you fall into this trap, youve ly related to the number of senses PoE PoEPoE PoE PoE PoE

lost them (except the guy in the back that are stimulated. If you can bring
of the room). something to touch, feel, and see, the Ultra Low Profile
UltraUltra
LowUltra
DesignDesign
Low Low
Profile
Profile
Design
Design
Profile
Ultra UltraProfile
Low
andDesign
Low
All-in-One
Design
Integrated
and and
Profile
All-in-One
PoE
All-in-One
All-in-One
Integrated
Lens
PoE PoE
Integrated
True
with
and Integrated
Lens
and
Lens
Day/Night
All-in-One True
PoEAll-in-One
PoE True
Day/Night
Mechanical
withLens
Integrated
and
Lens with
True
PoEDay/Night
Mechanical
Integrated with
Mechanical
Integrated
Day/Night
True Integrated
Day/Night
True
Microphone
LensMechanical
with
Integrated
Microphone
Integrated
Day/Night
Microphone
Mechanical
with Microphone
Mechanical
Integrated
Vandal Integrated
Vandal
and
Microphone
Proof
Vandal
Weather
and
Vandal
Microphone
IK-10
ProofProof
and
IK-10
and
Weather
Proof
IP66
IK-10
Weather
and
Vandal
andIK-10
and
IP66
Proof
Pixel
on
IP66
and
and Binning
Weather
Vandal
3
Proof
IK-10and
IP66
Pixel
and Pixel
Weather
on5MP
IK-10
and
Binning
3IP66
on
and
Mode
Pixel
Binning
Weather
Models
3 on
and and
5MP
Mode
Binning
3 5MP
IP66and
Pixel
Mode
Models
on
5MP
Binning
Mode
Wide
Pixel Binning
Models
3 and
on
Models
Dynamic
Wide
Mode
Available
35MP
Wide
andModels
Dynamic
Mode
Range
Wide
Available
5MP
Dynamic
onAvailable
Models
AV2456
Dynamic
Range
Available
on AV2456
Range
on AV2456
Range
on AV2456
IR Cut Filter
IR Cut
IR Filter
Cut (-F
IR Filter Models)
Cut Filter (-F Models)
(-F
IR CutIRFilter Models)
(-F
Cut Filter Models)
(-F
Rated Models)
(-F
(-S
RatedModels)
Models)
Rated
(-SRated
Models)
(-S Models)
(-S
Rated
Models)
Rated
(-S Models)
(-S Models) and AV3456
and and
AV3456
Models
AV3456
and Models
AV3456
Models
Models
audience will remember you in much

7. Discuss your sales and sup-


port process. Its not all
about your product. If you do not
more detail than your competitor
that runs through a PowerPoint.
+1.818.937.0700 | 877.CAMERA.8

10. During the presenta- avsales@arecontvision.com


support their client, it reflects very
poorly on the specifier. Toward the tion, establish a protocol
end of the presentation, discuss your of ongoing education. One lunch
sales model and your post-sales sup- and learn wont do it. If you want Made in the USA

www.arecontvision.com
Please visit www.arecontvision.com for more information. Copyright 2014 Arecont Vision.
8 Security A&e March 2014 www.SecurityInfoWatch.com
Request information: www.securityinfowatch.com/10215742
resistance from your organization.
However, there is no better method
of winning business than being spec-
ified into a project. Working with
architects, engineers and consultants
will help position you for success, but
regularly presenting to them in a tai-
lored, entertaining, and informative
manner will completely separate you
from your competitors. Regardless
of the hard work and internal push- INTEGRATE
back, press forward and implement PHYSICAL
these 10 best practices. I promise the ACCESS
rewards will be worth it. CONTROL
SYSTEMS AUTHENTICATE
About the author:
Chris Peterson has
IDENTITIES
CENTRAL
nearly 20 years of ID
experience in sales REPOSITORY
leadership, with a
focus on creating strategic sales
processes. Before embarking on a
career in sales process consulting, AUTOMATED
WORK FLOW
Mr. Peterson developed a philoso-
phy of repeatability and refinement
AUTOMATED
for the sales professional. He has
become an expert in customizing
PHYSICAL
CRM methodologies and systems IDENTITY
to optimize the efficiency and effec- MANAGEMENT
A common mistake to make an impact in the world of
tiveness of todays sales profes- seamless identity management and physical access
architects, engineers and consultants,
sional. Combining technology and
made by good youll have to bring them value on a in one solution
an understanding of the sales and
consistent basis and this doesnt REAL-TIME
sales people with mean the same presentation over and
customer service personalities, Mr. COMPLIANCE SAFE is an innovative software solution that integrates diverse
Peterson has been able to implement INTEGRATES security systems with identity management onto a unified
great intentions is over again. As youre wrapping up
programs that are fully utilized by WITH policy-based platform. SAFE ensures that every employee,
your next presentation with a specifi- EXISTING contractor, vendor and visitor has clearly defined and controlled
the client-facing teams and man-
to take the sales er, let them know that youll be bring- INFRASTRUCTURE access privileges. And SAFE is fully automated with comprehensive
agement, with a result of improved
management and reporting features. Its the most efficient way
presentation and ing valuable information a few times
efficiency, higher closing ratios, and
to manage the lifecycle of identities and their access across
per year. Ask them for ideas for top-
reduced customer attrition. your enterprise in order to maintain compliance 24/7.
make it super techy ics and for the best way to schedule
Mr. Peterson has created sales Make your world SAFE with Quantum Secure.
these meetings. It will end your pre-
for the smart guys. sentation with a feeling of a contin-
processes in many industries, includ-
ing aerospace, automotive, defense, quantumsecure.com info@quantumsecure.com
ued relationship rather than the end-
healthcare, IT, security, and tele-
ing to a meeting.
communications. Mr. Peterson can
be reached at cpeterson@vectorfirm.
Implementing these best practices
com.
will require extra effort and possible
Request information: www.securityinfowatch.com/10214753
10 Security A&e March 2014 www.SecurityInfoWatch.com
By Ray Coulombe, founder and managing director of SecuritySpecifiers.com

Should I Recommend
Applicable reference standards and codes improper applications for product/system
CAD libraries Communicate identified market trends
BIM libraries to product/system manufacturer

My Competition?
Training videos Nurturing the consultant and product
Technology tutorials rep relationship

In the old days, much of this would be res- All of the above action items suggest that
ident in a three-ring binder sitting in a con- the Product Representative can be a valu-
For a manufacturer, an A&E program ference room or hallway bookcase. Today, able member of the project team; a position
achieved through helpful actions and not hol-
is a commitment to the future however, companies should be focused on
low sales promises. A good product rep A consultants

T
myriad vendor web portals providing access
to totally up-to-date information. knows his product
oo often, people sell what they have instead of focusing on time is
knows his completion
solving the customer or client problem. It takes moxie to The Construction Specification Institute
step out of the box and, if necessary, recommend a com- understands his companys roadmap valuable, but
(CSI) recently published its Practice Guide
petitors solution. For a manufacturer, an A&E program for Construction Product Representation. Its has managements confidence some of that
is a commitment to the future, and a short term hit can Task Items cover the following areas span- gets answers in a timely fashion
yield big long term benefits. ning several project stages: time should
tells the truth
Lets start at the beginning. Whats the real purpose of an A&E pro-
gram for manufacturers? The expected answer is to get products speci-
Meet with designer/design team; learn
Good representatives provide this. Good
be allocated to
and understand project design intent.
fied. But, if given the choice between the following expanded answers,
Determine projects product/system/
consultants demand it. understanding
which would you pick? So, lets envision a scenario where a con-
A. Get products specified on a current project
material needs.
sultant has been provided by a large client the product
B. Get products regularly specified Recommend product/system solutions/ with an unusual set of circumstances that
applications to meet project requirements. demand some very specific product fea-
and technology
Answer A is winning the battle. Answer B is winning the war.
Winning the war requires building a serious long-term trusted rela- Provide timely and accurate responses to tures. As it so happens, his favorite product solutions
tionship with a security consultant or engineer. Just as good friendships product selection questions. rep is due in for a meeting that day. The
and marriages take time, hard work, and addressing problems head on, Provide/edit specification sections for consultant relates his need, and the rep available
that same commitment is a must for establishing long term consultant realizes that not only does he not have a
project specific products/systems/materials. to them, in
relationships. Solid relationships are bi-directional and need a spirit of product with the required features, but a
Provide drawings and calculations to
commitment on the part of each partner to make them work.
address project requirements.
key competitor does. What are his choices? addition to
A consultants time is valuable, but some of that time should be allo- Fib - Tell the consultant that the product
cated to understanding the product and technology solutions available
Provide budget pricing. can do the job. This is really a problem if the applying those
Suggest ancillary products compatible representative has no idea what his prod-
to them, in addition to applying those solutions in a project environ- solutions
ment. One representing a security product should be sensitive to the with specified products/systems/materials. ucts can do. Unfortunately, this happens too
consultants time and needs by consistently delivering the goods -- Estimate product/system/material often, and lack of product knowledge benefits in a project
timely, accurate product and application information. lead-time. neither party. Message to manufacturers:
train your people on product and conduct. environment.
Identify codes, rules, regulations, and
Making the design phase work jurisdictional requirements applicable to
Fib - Tell the consultant its coming out
In the design phase, a product rep should make sure that the consult- next quarter. Manufacturers must provide
the product/system/material.
ing firm has a full product care package that includes: accurate product roadmaps to their rep-
Provide product/system/material storage,
resentatives to avoid overcommitting to a
Properly formatted specifications handling, installation, and maintenance
schedule. Conversely, reps must bring feed-
Current data sheets, with specifications consistent across related requirements.
back back to their manufacturers on sched-
documents Provide and interpret applicable prod- ule and emerging technical requirements as
Operation and installation manuals uct/system/material warranties critical inputs to roadmap planning.
Design guides Inform customers of proper and Fib - Say nothing like that exists nor

12 SECURITY A&E March 2014 www.SecurityInfoWatch.com www.SecurityInfoWatch.com Security A&e March 2014 13
is likely to exist. Product reps must understand the by listening and really understanding the nature of Recommend - Point out competitive products that value when a rep is truly trying to do the right thing.
current technology and competitive landscapes. This the requirement. Through his knowledge, experience, meet the consultants need. Lets digress to the title of Rewarding his honesty and good intention by placing
requires not only manufacturer training, but also per- research, and company resources, he should attempt to this article. This takes guts (or stupidity, depending him in the role of a trusted advisor encourages the
sonal diligence and study. What is the current state put alternative solutions on the table for discussion. on your point of view) and isnt likely to happen very right kind of behavior and enables a potentially valu-
of the art in technology? Where does my product fit? Engineer - Persuade his company to develop and often. And a product representative probably wouldnt able resource. This is enhanced even further if the
How will these evolve over time? Discussing these meet the technical and schedule requirements of the tell management if he went this route. However, this company he represents has a track record of successful
issues with consultants and getting their perspectives project. Generally, this will only happen if the technical could be great way to build trust and confidence, not to projects and products that work; useful literature and
can lead to fruitful discussions, mutual respect, and hurdles are modest, resources are available to address mention taking a giant step in the relationships devel- design information and tools; design support; strong
areas for further investigation. them, and the product rep has enough internal cred- opment. And what has really been lost? The compa- integrator partners; and a collaborative attitude.
Stall - Commit to get something designed in time ibility to stimulate action. It may also occur if someone nys product has not been unknowingly mis-specified Thats a company and a representative you can work
for the project. This is easier said than done, since few has made a strategic judgment that the company must or misapplied. Promised time schedules wont be bro- with.
reps can commit to a project on their own. Bringing in participate in the project for competitive position, ken, the company avoids an opportunity to fail, and the
one with the authority to commit or getting it on the prestige, marketing, or future business reasons. opportunity may come back around in another way. About the author: Ray Coulombe
company agenda for product discussions are feasible, Partner - Convince his company to collaborate with On the consultants part, when a product rep takes is Founder and Managing
and may lead to a viable approach that will address the a third party to license, private label, or technically the riskier higher path, his behavior should be recog- Director of SecuritySpecifiers.com
current need. Also, valuable new products may emerge cooperate to present a viable solution. In todays world nized and valued. Most consultants have been burned and RepsForSecurity.com, and
from the dialog. of APIs, standard interfaces, and protocols, it might be by slick sales behavior in the past and may be skepti- P r i nc ip a l Co nsu l tan t fo r G i l w e l l
Engineer - Review the project requirements to deter- possible to append a capability to a product that deliv- cal of a manufacturers claims that something is just Technology Services. Ray can be reached at ray@
mine possible alternative solutions. Rarely is there only ers a solution. Engineering resources are still required around the corner or will soon be in production, ready SecuritySpecifiers.com through LinkedIn at www.
solution to a security project requirement. If consul- and companies with strong partner programs are in the to roll in time to support the project. linkedin.com/in/raycoulombe or followed on
tant ego is not a factor, the rep can play a valuable role best position to pursue this avenue. However, successful consultants recognize and Twitter@RayCoulombe.

Store, manage and control keys, cards and small assets more securely and efficiently with KeyWatcher Touch.
Access is limited to authorized users, and all transactions are recorded with detailed reports available. The system
will even automatically email transactional information to any user at any time. And
KeyWatchers convenient touchscreen makes removing and returning keys easier than ever.
With our modular design and full scalability, its easy to see how we keep making key
management better. Thats Morse Watchmans outside the box thinking right inside the box.

morsewatchmans.com 800.423.8256

Request information: www.securityinfowatch.com/10214428

14 Security A&e March 2014 www.SecurityInfoWatch.com www.SecurityInfoWatch.com Security A&e March 2014 15

5586MP-5 STE A&E Supplement MW Touch 2013 half spread RA 16 x 4.875


By Robert Laughlin, president, Galaxy Control Systems

Why bigger isnt always better typically built this way from the start. The fact is that all customers want
to feel as if they are your most important customer and that you inti-

when selecting an access


mately understand their needs and connect to them.

Communicating clearly and with substance

control partner In this day of instantaneous and constant communications, why is


it that personal connections sometimes seem more difficult than ever

W
before? Perhaps its the reluctance of todays workers to pick up the

Smaller vendors eve seen an increase in the number of conglomerates formed


in the security industry over the past several years. Conversely,
telephone and actually speak with customers, or the fact that individuals
are more tasked than they were in prior years with a relentless assault of
can be more weve seen some conglomerates dissolved and broken back communications 24/7/365.
down into individual and often privately held companies. This seems to be more the case with the larger companies, as the num-
flexible and open Needless to say its an interesting cycle, especially from the ber of internal interactions at a large company typically increases to reply
perspective of an independent access control company playing in the same market . to important issues. Many smaller companies are modeled to be more
to customization At the end of the day though, one needs to look at the business ramifications that streamlined and can react faster to questions and issues simply because
customers face when dealing with big versus small to medium sized technology they are not as layered. The people who sold the system are typically
for their providers. Given the nature of access control systems and the on-going service and accountable for supporting their customers and can spend more time com-
support these systems demand to ensure continuous and reliable operation, small municating electronically, over the phone or in person. At the end of the
customers to medium size access control partners can often deliver more advantages given day, customers want to know that they have a go-to person they can rely
their technology focus and customer relations. Heres some food for thought. on when they need them most which typically is when something goes
wrong. Small/medium companies generally deliver clearer and more
Innovation is big at small companies direct lines of communication, which expedites information sharing.
Every facility and installation is different. Even franchised businesses that fol-
low the same construction and design models are never quite the same from one Making timely decisions
to the next. Consequently, off-the-shelf access control solutions rarely provide the Decision-making processes in smaller organizations are often dramati-
specific versatility and desired functionality that customers are looking for in their cally different from those in their larger counterparts. Big organizations
particular situation. Its no secret that some big companies have problems dealing are typically layered with varying levels of specialists to cover basic sup-
with anything that could be conceived as customized and typically leave that task port functions. This may delay important decisions since the personnel
to the installing dealer or customers internal techies. authorized to resolve important issues need time to collect data and
Small/medium access control solution providers have built their businesses review it before taking action. Dealing with committees in a bureaucracy
Note: Galaxy Control
on catering to the specific needs of customers and their installations of all slows down progress. Small/medium size businesses tend to react faster
Systems President Robert
sizes and geographies. The same holds true in terms of software development. as employees know their customers and their systems better, and have
Laughlin offers a personal
Competing against big companies marketing budgets and sophisticated sales shorter reporting paths to decision makers.
view related to his experi-
pitches requires small/medium technology providers to be innovative in terms of
ences of the advantages of
developing new solutions, while at the same time being conscious of a customers Small/medium business attract team members
working with small to mid-
investment in existing legacy technologies. Providing new solutions to longstand- One of the inherent complaints individuals make about working in
sized access control technol-
ing problems that can be implemented on legacy and future access control system large companies is that they may get lost in the machinery of big busi-
ogy vendors based on his
deployments is innovative. Rip and replacement solutions are not. ness environments. Small/medium sized businesses attract people who
many years as one of the
thrive in environments where they feel like they are part of a team. And
industrys most respected
Making personal connections thats great for customer relations, especially in technical areas where
technology pioneers.
Its interesting to note that some big companies frequently invest big dollars the intricacies of a system make all the difference in terms of service
trying to emulate the intimate relationships that small companies establish with and support. This not only boosts customer confidence, it helps further
their customers. And the focus on customer service is a trending issue which develop longstanding relationships, and helping customers keep their
continues to be well represented in social media with big and small brands alike. systems running smoothly.
Most small/medium sized independent companies dont need to work on build-
ing personal relationships with their reseller partners and customers as they are (continued on page 26)

16 SECURITY A&E March 2014 www.SecurityInfoWatch.com www.SecurityInfoWatch.com Security A&e March 2014 17
By Dr. Armelle Fe

Expanding into foreign markets


such as documentation, think of it in ization is pseudo-translation (also
terms of writing for localization, which called pseudo-localization). This
we will discuss in more detail in a process is a software testing method

requires a total understanding future article. Then, there is globaliza-


tion (abbreviated as G giving you
used for testing the various interna-
tionalization aspects of software. Lets

of the environment
time to count Alright! G11n, youre round out the -ation family with
good!!!), which is simply about lever- Translation memory (abbreviated as
aging a thing to several different coun- T Are you thinking T15y? Nope, it
tries. would not follow the Letter-number-n

T
Now, let me throw in another pattern; it is simply TM). Throughout
-ation, one you are most likely famil- the localization project and after (and
If localization is he limits
of my lan-
Before embarking on such
a rewarding journey, it is best to
iar with: translation. This one is easy here we would be talking about trans-
and the Merriam-Webster definition lation memory management), a TM
not well-planed guage mean understand what translation,
is perfect: a rendering from one lan- helps capture and store segments,
the limits of localization and all these -ation
guage into another. A partner to local- which can be sentences, paragraphs or
it will lead to my world. words mean, who the key players
-- Austrian-British philosopher, are and the processes that will take
frustration Ludwig Wittgenstein (1889-1951) your products there. This is the
In our ever-broadening world, first installment in a series aimed
among your limits often are an impediment to at giving you an understanding of
growth. I have stated the obvious. the voyage so you can embark on it
employees and But how can you go about growing confidently, leading your team to
your business in this big, wide, ever
customers expanding world? One of the many
success.

answers is localization. So what is localization?


You have heard this word; you Lets start with defining these
know it has to do with translat- -ation words! What is localization?
ing your products into other lan- In essence, localization is the pro-
guages. You know that translated cess of adapting your product or the
products will increase your pres- services you offer to a specific lan-
ence worldwide, augment your sales guage and to the cultures utilizing
and enhance customer satisfaction. this language so you achieve a local
However, having heard about well- look-and-feel. Often abbreviated as
known localization disasters (such L10n (l for the first letter; n for the
as the infamous Nova car market- last one; and 10 for the 10 letters
ed for a Spanish-speaking client contained between the l and the n),
that really would rather not buy a localization is best implemented
no-go car), you might feel a little after proper internationalization
apprehensive about going beyond (also known as I18n; and yes, you
the limits of your world, your lan- got it, you know what this means).
guage. You know that if localiza- Internationalization, in the soft-
tion is not well-planed it will lead ware industry, is the process of
to frustration among your employ- designing a software application in
ees and customers, cost you more such ways that it can be adapted
money and headaches than needed to various languages and regions
and could really jeopardize the in- without having to make further
country integrity of your brand. engineering changes. And for items

18 SECURITY A&E March 2014 www.SecurityInfoWatch.com www.SecurityInfoWatch.com Security A&e March 2014 19
sentence-like units, in a database in mainly ensure the quality of the through many hands and be seen About the author:
order to assist human translators. translations, although their involve- by many eyes. A general process Dr. Armelle Fe is a
Another term to define as it per- ment may be greater. The relation- that could apply to just about any multi-lingual local-
tains to the process is Quality ship you will develop with this team kind of content, be it software, user ization professional
Assurance. In our context, Quality is paramount to the initial and con- guides, marketing documents, web with 20 years of expe-
Assurance (a process which involves tinued success of your project. Your sites, looks like this: rience, including 14 in the security
several key steps) can be defined in-house quality assurance team will 1. Content is written and a glos- industry. Educated in both France
as testing of the translated files to also play a crucial role in determin- sary is developed in parallel and the U.S., she has lived and trav-
Before ensure they function as intended and ing the readiness of your product for 2. Pseudo-localization takes eled around the world, and has a
checking the translation during lin- your intended market(s). The review- place (this is particularly relevant sharp understanding of doing busi-
embarking on guistic and terminology reviews. er of the translated content will verify in the software field) ness in a foreign environment.
that the translator has applied your 3. Content is exported for quota-
such a rewarding Should you have questions or need a
How to make the process requirements and produced a qual- tion little help with readying your prod-
journey, it is best work ity translation. You may look at these 4. Translation takes place uct for the market, or various mar-
When embarking on a localization four main players as puzzle pieces 5. Review follows (and we will kets you intend to offer your services
to understand project, it is essential that you sur- that your project manager will ensure see this review entails several steps and products to, feel free to contact
are put together to fit perfectly for and takes several forms depending
what translation, round yourself with a team that will her at armellefee@netzero.com.
work with localization in mind. All the right picture to appear. Some in on the type of content being veri-
localization and all on board will have to play their part the industry may argue that project fied)
knowing that what they create or do management would lie on your LSPs 6. Changes are implemented as
these -ation words will need to flow as effortlessly as side, but I am a firm advocate of hav- needed (ideally, you would have
mean, who the key possible throughout the process. We ing someone in-house manage the steps 4, 5 and 6 completed for the
will touch on the process, but first, localization project. This managers glossary and then performed for weatherproof push buttons
players are and the lets take a look at the key players involvement may vary depending on the content itself); and finally
that will form your winning team. the complexity of the tasks at hand, 7. Release your localized prod-
processes that will but his or her role is essential: main- uct and harvest the fruits of your
I like to place them in five cate-
take your products gories: content writers, translators, ly, ensure quality, adherence to bud- teams hard work! Wait, one last
quality assurance engineers, review- get and deadlines. thing to keep in mind, and this
there. ers and project managers. Content may have needed to start already
writers, such as software develop- Content is king somewhere along the aforemen-
ers, technical publication writers Onto the last topic I would like to tioned process: get ready for the
and marketing writers, will need to familiarize you with in this first arti- next version!
write in such ways as to facilitate the cle of the series: process. Processes If you were not familiar with
upcoming translation of the content are ultimately unique to your needs, localization, I hope that these few
they will deliver. In a separate issue but there are general threads that words have given you a general
Ch uck,
understanding of what your local- thes e for Dortronics new 5276 heavy duty weatherproof
we will look at the many guidelines apply to just about any project. First W e can us e
n r ooms push button switches are designed to
that ensure the translatability of and foremost, write with localiza- ization journey might look like. a ll wash dow
rated ! withstand the abuse of daily use and they
content; but for now, suffice to say tion in mind. In future articles, we Localization is fun, really! Well, theyre IP 6 5 look great too. Theyre manufactured with
that if your content is designed as an will look more closely at what one I love it, I am passionate about Doug brushed stainless steel which can be custom
afterthought to localization, you are needs to do so that the content is eas- it, and I love working with all engraved to meet your specific needs,
available with illuminated rings for easy location
more than likely to experience vari- ier to translate (which usually means involved in this process because it
and IP65 rated for harsh environments.
ous challenges that are likely to have cheaper, too). is such a rewarding feeling to see
a negative impact on quality, time to But let us just say for now that this my clients reach their globalization dortronics.com sales@dortronics.com 1.800.906.0137

market and budget. means that when the content is cre- goals! The world is waiting for you.
The Language Service Provider ated, remember that someone will Surround yourself with the right
(LSP) you will partner with will translate it and your content will go team and go out there and win it!
Request information: www.securityinfowatch.com/10213494

5636MP-2 STE A&E supplement


20 Security A&e March 2014 www.SecurityInfoWatch.com www.SecurityInfoWatch.com Dortronics 5276 Series Pushbutton ad RA 4.625 x 4.875
Security A&e March 2014 21
By Ayel Vogel, president, AMID Strategies

and technology trends, and imple- the ICS (industrial control sys- information, under which circum-
mentation of procedures. All of tems) person. The goal of the CSO, stances and conditions. This ele-
these must be integrated with the working with the cyber security ment includes the authorization
physical security system (to pro- consultant, is to identify a single, software as well as the protocols
tect against cyber-threats involving unified solution that meets the and procedures for accessing
physical intrusion). requirementsand protects the data.
This is where security consul- interestsof all three stakehold- Intrusion Detection and Pre-
tants and experts come in. ers, rather than providing dispa- vention Systems (IDS/IPS)
Id like to make this point crys- rate solutions for network intru- appliances placed on the corpo-
tal clear: serious cyber security sion, integration with the physical rate network that monitor network
requires very specific expertise, security system and detection of traffic to identify, log, block and
the kind that most IT managers malicious behaviors in the ICS sys- report malicious activity.
do not possess. You need to hire a tem. Device Protection software
consultant with experience in your In general, cyber security can be tools that reside on network-con-
(or very similar) industry, who will broken down to a number of inter- nected devices to detect viruses
work with your IT manager (or twined elements: and other malware.

Cyber security has


the A&E consultant at a projects User Authorization the com- Ne tw o rk S e pa ra t i o n a n d
inception stage). partmentalization of information Secure Data Switching - separa-
You hardly ever hear a custom- that defines who can access which tion between different functional
er say, We dont know what we

no borders
dont know. Thats the right atti-
tude, because in fact, they dont
know what they need, said Joseph
Baker, partner at Atriade, a Jersey 1107 series maglocks

I
City, N.J.-based professional tech-

A sound cyber n the broadest term, cyber


security is defined as the
ture facilities, as well as a variety of
ransom-ware, malware and other
nology consulting firm. In an ideal
world, he said, customers would
security strategy method of protecting a com- worms and viruses. In addition, an ask you to hack into their systems
puter system, including all attack can open up a company to and expose vulnerabilities, but in
is no longer networks and connected lawsuits from customers, partners most cases, all they ask for is com-
devices, from illegal intrusion and and other parties. pliance with whichever regulations
optional, but malicious activity, as well as from The severity and complexity of apply to them.
human error and natural disasters. cyber security make it impossible to In addition, since the organiza-
an imperative In practice, we need to assume specify a simple solution. There is tion has different stakeholders,
that every computer network com- no magic-bullet software or fire- each protecting their own interests, Jack,
foundation ponent in every organization may wall that can protect an organiza- an executive (usually the CSO) These new sl im
Dortronics Systems new 1107 Series Maglocks
offer smart features in a slim configuration at a
competitive price.
for any be a target for intrusion and cyber- tion from all cyber attacks; more- needs to be involved at the highest maglocks look 1107xD Slim Line Magnetic Locks are only 1-1/4
crime. A cyber-attack can be dev- over, a balance needs to be main- level to fully understand the secu- as great as deep and deliver fail-safe operation, releasing
instantly upon command or loss of power.
organization astating to the organization and its tained between securing operations rity risks and integrate a collabora- they operate. 1107xEDR Delayed Egress Actuating Locks
customers. An attack can take the and allowing the organization to operate with the 7101-P Delayed Egress Panel, and
tive strategy that would bring all Ed employ an actuator which senses door movement.
form of stolen financial informa- function smoothly. the stakeholders together. 1107 Series Maglocks are NFPA Life Safety and
BOCA compliant, tested to UL294 & feature limited
tion, industrial espionage, politi- What is needed, then, is a com- For example, the stakeholders lifetime warranties, and are proudly made in the USA.
cally- or financially-driven denial- prehensive cyber security strategy/ for a cyber security implemen-
of-service (DoS/DDoS) attacks and methodology, which prescribes an tation in a typical electric utility dortronics.com sales@dortronics.com 1.800.906.0137

damages to SCADA-controlled man- ongoing risk assessment, aware- include the network/IT manager,
ufacturing processes or infrastruc- ness of the newest security tools the physical security manager and
Request information: www.securityinfowatch.com/10213494
5635MP-3 STE A&E Supplement Dortronics 1107 Series ad RA 4.625 x 4.875
22 SECURITY A&E March 2014 www.SecurityInfoWatch.com www.SecurityInfoWatch.com Security A&e March 2014 23
networks and securing inter-network tection Partners International, and man, even if the hackers were SCADA. In fact, the best strategies production between different sites,
connections. author of Integrated Security Sys- able to enter the HVAC network, are to make critical infrastructure to prevent overloading the genera-
Encryption both stored data tems Design: Concepts, Specifica- and wreaked havoc there, they networks disappear by becoming tor turbines at a single site.
and data communication need to be tions, and Implementation (Butter- shouldnt have been able to access invisible to hackers, and to closely Isolating a threat within an
adequately encrypted. Remember, worth-Heinemann, 2007). He noted customers credit card data. Exac- protect inter-network data switch- internal network is done by plac-
however, that data encryption is the that the best cyber security scheme is erbating the problem is the fact ing for untypical behaviors. ing smart switches at each site or
last defense against cyber threats, worthless if, for example, passwords that U.S. credit card issuers have The greatest challenge in the internal network. These switches,
since no data should ever been have are stored unencrypted in plain text yet to adapt smart credit cards, event of a cyber-attack is to con- which double as communication
exposed to intruders from the start. on an employees laptop that can which greatly reduce credit card tain the propagation of the threat gateways and a SCADA-specific
The CSOs job These elements are not optional or be stolen; if the server room is not fraud. from one site to another through high-throughput IPS (Intrusion
interchangeableeach and every one adequately protected; or if securi- As I mentioned, inter-network the internal network, said Ilan Prevention) solution, analyze the
is to evaluate the needs to be set in place to assure the ty cameras login passwords are not switching protection is a common Barda, CEO of RADiFlow Ltd., behavior of the incoming SCADA
proper protection of data and data changed routinely (or at all). All of vulnerability in many corporate IP which manufactures secure indus- protocols (adjusted to a set base-
repercussions of traffic. these are real-life occurrences. environments. The larger, more trial ethernet solutions for criti- line), and are able to immediately
Sometimes, vulnerabilities are piled To illustrate his point, Norman
each and every complex and more geographically cal infrastructure SCADA applica- react upon identifying stray behav-
onto an initially secure computer net- brings the example of the current distributed the network, the more tions. This is due to the opera- iors, which are in turn logged and
addition to the work through expansions and added CyberLocker virus which has to it is susceptible to hackingand
tional interdependency between reported.
functionality. For example, many date infected a quarter of a million nowhere is the danger more appar-
sites. For example, an electricity Unfortunately, I cant emphasize
system, and ensure municipalities in recent years have computers around the world. Once ent than in infrastructure, utility
grid that is dependent on sharing enough that when it comes to cyber
implemented Safe City practices, infected, and unless ransom was paid and power generation installations.
that every device with hundreds or even thousands in Bitcoin, the virus encrypts and These large-scale distributed sys-
is connected to of cameras canvassing the city cen- disables the entire network SAN, tems often involve dozens of criti-
ter, roads and public buildings. The attached storage, internal, worksta- cal facilities across multiple states.
a secure switch camera, recording server and opera- tions. Whats even more shocking, In the case of failure the potential
tor networks use standard switches the virus propagates through email, for damage is immense, as recent-
designed to detect for automation and communication, exploiting employees reluctance to ly demonstrated by the Stuxnet
creating a huge security threat at the comply with the most basic rule of
and block any attack, which caused uranium-

FOUR IP
gateways to the municipal network. online behavior. enrichment centrifuges in Iran to
unusual network This makes each camera location a Another example is the recent self-destruct.

DEVICES
potential point of intrusion into the cyber-attack on Target and two other Most such installations employ
behavior. network. The CSOs job is to evaluate major retailers, which compromised SCADA (supervisory control and
the repercussions of each and every over 40 million credit cards. The data acquisition) industrial con-
addition to the system, and ensure attack allegedly involved obtaining
that every device is connected to a access authorization from the data
trol systems (ICS), computer-con-
trolled systems for monitoring and
ONE ETHERNET CABLE
secure switch designed to detect and centers HVAC vendor (probably by controlling industrial processes.

block any unusual network behavior. calling the vendor and impersonating However, SCADA systems pose a PoE Solutions

Ive observed many cases where an IT department official.) Intru- unique cyber security challenge.
NetWay4ESK
there is over-reliance on securing the sion used to mean entering a facility Joseph Baker explained: SCADA
- 4 port managed switch with midspan injector
network perimeter incoming and through a manhole -- todays man- is an antiquated, serial-based pro- - Expand surveillance coverage
outgoing data, as well as on encryp- holes can be in Eastern Europe or tocol for automating and collect- - Built-in IP management
tionwhile neglecting two major vul- anywhere in the world, he warned. ing data in closed-environment ...plus much more!
nerabilities: lax protocols for data You have to have each and every industrial control systems. It had
access and inter-network switching. base covered. no security designed in from the
The weakest link in cyber secu- The Target attack also reveals onsetand yet is it used to run the More than just power.
rity today is corporations social another commonplace vulnerability: most critical applications. Made in the U.S.A. - altronix.com - Lifetime Warranty
engineering, said Thomas L. Nor- insecure inter-network switches. In As such, there are very few
man, CPP/PSP/CSC, CEO at Pro- the Target case, according to Nor- intrinsic approaches to secure
Request information: www.securityinfowatch.com/10212790

24 Security A&e March 2014 www.SecurityInfoWatch.com www.SecurityInfoWatch.com Security A&e March 2014 25
security, many critical infrastructure networks in the
U.S. are still far from airtight.
Looking ahead, an important driving force behind
Bigger isnt always better
(continued from page 17)
Our customers always come first.
Thats why our access control solutions
stronger data protection is the advent of new stan-
Small/medium businesses operate on the
dards, which provide a roadmap for setting up cyber
front lines
security mechanisms and protocols. These include Top level executives at big companies are typically not
directly involved with customers and everyday manage-

are scalable and backward compatible,


the NIST Security Framework, created by executive
order of the Obama administration and finalized in ment issues. But they are the people making decisions
February 2014, aimed at addressing and managing that affect their customers present and future systems.
cybersecurity risk in a cost-effective way based on At small/medium businesses, upper level management is

with an unconditional 2-year warranty.


business needs without placing additional regula- usually in touch with their customers and aware of trends
that impact technology implementations. This results from
tory requirements on businesses (www.nist.gov/
having first-hand conversations with customers and field
cyberframework/); NERC (North American Electric
personnel, auditing service calls and visiting customers in
Reliability Corporation) cyber security standards,
the field.
relevant to the electricity generation and transport

Its that simple.


industries (www.nerc.com); and the ISO/IEC 27000
Owners have skin in the game
series of non-binding standards for different infra-
structure verticals, among others. Dealing with the owners of a small/medium size com-
That said, cyber security standards pose the risk pany is far different than dealing with employees at big
of over-reliance. According to Thomas Norman, they companies. There is no question that the mindset is differ-
are both a solution and vulnerability. While they ent from owner to employee. Deal with an owner and you
are far more likely to achieve satisfaction as they want you
provide a roadmap to securing systems from multiple
as a customer for life not for a single sale or project. And
points of entry, we should remember that they only
ownership mindset often carries over in small/medium
protect from known threats.
businesses to employees who flourish in environments that
In spite of the over $88 billion spent on cyber
promote entrepreneurial thinking. This type of corporate
security in 2013more than double than in 2006,
culture drives customer service, support and satisfaction
according to the Ponemon Institutetheres no sign
best. Its another characteristic that big business strives to
that cyber attacks are on the wane. And with little
emulate that is integral in most small/medium businesses.
international cooperation and real enforcement, it
Theres no doubt that big business plays a critical role
is incumbent upon the individual CSO and secu-
in evolving technologies like access control. But small to
rity consultant to keep up with the latest threats and
mid-sized companies strive to retain the small/medium
solutions, and better educate customers. Information
company attributes that have helped its national growth
about new threats can be found in publications such
and will serve its continued global growth. By structur-
as CSO Magazine and Janes, government agencies
ing an international network of systems integrators and
publications, and by simple web searches.
installing dealers, Galaxy has successfully modeled its
As the world becomes more and more reliant on
customer support and technology development strate-
interconnected computer networks, I predict that the
gies after those which have been applied since its earli-
threat of cyber attacks will, unfortunately, increase
est beginnings. The key is to remember that success and
in volume and severity. I urge you to do whatever
growth dont necessarily mean you have to be big or even
needed to not be the next victim.
act big. Treat every customer like theyre your biggest
customer and the rest will take care of itself.
About the author: Ayel Vogel is pres-
ident of AMID Strategies. He has more
About the author: Robert Loughlin is
than 20 years of sales, marketing and
management experience in the home-
president and founder of Galaxy Con- access control solutions with stellar performance
trol Systems. He is veteran of more than
land security industry. For more infor-
three decades in the security industry.
mation, visit www.amidstrategies..com.
800.445.5560 custserv@galaxysys.com
26 Security A&e March 2014 www.SecurityInfoWatch.com Request information: www.securityinfowatch.com/ 10213742
Leading the Way
in Megapixel Video.
Cutting-edge Innovations
Superior Performance
Broadest Selection of Megapixel Cameras

Protect Your Business While Increasing ROI


Arecont Vision megapixel technology delivers superior image quality and reduces overall system costs by covering larger
areas with fewer cameras. Excellent Image Quality + Camera Reduction = Terrific Return on Investment. Megapixel technology
provides a new way of monitoring security systems, allowing less personnel to view more at once and zoom in for details of
live or recorded video.

Forensic Zooming Reduced Overall Dual Encoder True Day/Night Multi-Streaming Integrated Motorized Lens Wide Dynamic Range Flexible Cropping
System Cost H.264/MJPEG with IR Cut Filter with Remote Focus and Zoom up to 100dB at
Full Resolution

+1.818.937.0700 | 877.CAMERA.8
avsales@arecontvision.com

Made in the USA

www.arecontvision.com
Please visit www.arecontvision.com for more information. Copyright 2014 Arecont Vision.

Request information: www.securityinfowatch.com/10215742

Anda mungkin juga menyukai