+
SECURITY Brought to you by
M
ost of us describe it as a work in progress. to help them serve their clients more effectively. There is
FOUR IP
That ever expanding circle of trust we call the seldom a week that goes by that a manufacturer has not
security consultant and vendor relationship. asked for an opportunity to stop by our office to bring us
The fact that the lines of communication up to date on their technology and often times their prod-
are sometimes garbled between the two worlds presents uct development roadmap, says this consultant.
a problem that eventually affects the client. Over the past While another consultant admits that some manufac-
several years we have seen many technology vendors who tures do this better than others, he appreciates the effort.
CAMERAS
have been diligent in their efforts to embrace relation- Sometimes these update visits almost become a sales
ships with industry consultants. There is not only room call. We discourage that. What we are looking for is an
for improvement, but a critical need to have this happen. interactive discussion about the technologies and their
As technology morphs from analog to digital and ser- applications and what the manufacturer is doing to sup-
vices rise from buried cables to the cloud, a cohesive part- port their integrators and end users.he says.
EoC Adapters
together we can
eBridge4SK
Download the free Altronix App! Find out how you can help by emailing us at
pr@mission500.org, or calling George Fletcher
directly at 305-321-3193.
By Dr. Armelle Fe
SPECIAL FEATURES: If localization is not well-planed it will lead to frustration
6 Top 10 best presentation practices
By Chris Peterson
among your employees and customers. This will serve as
a primer on how to best expand your global interests.
sharp detailed WDR (130dB)
Connection Integrators
Nearly 300 integrator firms...and growing
Search by vertical, location, and key manufacturers
The security industry's Manufacturers
the power of technology
definitive resource for Over 1000 manufacturers
Samsung video surveillance solutions set the benchmark for exceptional performance and added
designed,engineered, Search by 125 product categories
value. With innovative technologies like WiseNetIII that provides proprietary imaging technologies
and specified projects and Design Tools
to capture the smallest details and all the speed you need for efficient networked IP systems.
products Access an array of useful tools from across the industry
Cameras, storage, wireless, power, and more
Resources
Technical Articles
Codes, Protocols, and Standards
Guide to Industry Certifications
presenting to architects,
a few days before your presenta- conversation with the audience
tion. I once observed a thermal about these weaknesses. Dont
imaging sales person present to celebrate your weaknesses, but be
P
mal imaging and he wasnt famil- it doesnt really matter. This will
iar with some of the terms unique help the specifier develop an area
You must be resenting to an audi- This audience is completely differ-
to the technology. A simple glos- where your product can be ideally
ence is the most pow- ent in need, interest, and personal-
able to present erful action taken by ity. However, many times the old
a sales professional. PowerPoint that was just given to a
in way that Regardless of the doz- facilities manager at a university is
ens of communication methods at shined up on the screen in front of
resonates with a our fingertips today, public speaking a half dozen people who will never
is still the most influential mode of use the product but might need it as
specifier in order transferring emotion. The problem part of a larger design.
objectives
poor presenters.
In the security industry, present- 2. Dont make your presenta-
tion over-the-top in tech-
nical jargon. A common mistake
ing to a specifier is a skill that can
separate one company from their made by good sales people with
competitors -- if done correctly. The great intentions is to take the sales
objective of pursuing relationships presentation and make it super
with architects, engineers and con- techy for the smart guys. It
sultants is to have your products doesnt matter how intelligent your
specified into more projects. In audience is, reading data off of a
order to achieve your objective, you chart will put them to sleep. Even
must be able to present in a way that though this audience has different
resonates with the specifier. Below needs than an end-user, they still
are 10 best practices for presenting need to hear entertaining stories
to specifiers in the security industry. in an organized and logical order
(For this article, Ive given the best to hold their attention. Dont bore
practices for presenting to specifiers them with your really cool words
and graphs. sary would have solved this prob- positioned, and will place you at
as a whole rather than break it down
lem and kept the presentation very the top of the list of credible sales
3.
to architects, engineers, and consul-
Send a glossary of special fluid. Also, consider how profes- professionals.
tants.)
terms and other helpful sional this small gesture makes
4.
for the specifier. Im amazed
knowledge of many technologies. Share the good and the better for retaining attention of an
how many sales people give the
Being up to date on the special bad about your offer- audience than telling a story that
same presentation to an A&E firm
terms from all the different technol- ing. If your product was perfect is emotionally relevant. Have fun
as they give to an end-user or VAR.
ogies is almost impossible. Develop for all applications, your compa- and make fun of yourself. Dont
6 SECURITY A&E March 2014 www.SecurityInfoWatch.com www.SecurityInfoWatch.com Security A&e March 2014 7
The All New MicroDome .
just tell them about the wide temper- port process. How do you support
ature range that your widget can han- your reseller, what is your warranty,
dle; tell them a story about the demo how do you handle version control
you did in Chicago last January when and compatibility? Tell a story about
your watch stopped but your wid- your product failing and how your
get kept working -- but you missed company handled it by following your
your flight because of your watch. process. Dont talk about how cus-
Tell stories that are true and relevant, tomer-centric you are or how service
and your audience will love you for is the number one priority in your
In the security it. Stories will help your audience company everyone at every com-
remember you months in the future pany in every industry states this. Easy Spring Arm
industry, presenting when they might need to specify your Discuss the written policy and tell
Installation for Flush
Mount Models
separate one
cussing technical detail dur-
ing the presentation. I think its a
universal requirement: every pre-
8. Let the audience know how
to work with your company.
All of us like to think that our prod-
company from their Worlds Smallest All-in-One H.264 Day/Night
sentation has to have that guy in the ucts are so cool that the specifiers
competitors if back who wants to show everyone will break through walls to work with 1.35 Megapixel and WDR Dome IP Cameras
how smart he is by dragging you into us. However, if its not fairly easy to
done correctly. The the weeds of technical details. Dont work with your company, theyll find
Arecont Vision introduces MicroDome
megapixel IP cameras. These small,
objective of pursuing let it happen. There are many tech- someone comparable. During your ultra low profile cameras offer the great
niques to overcoming this trap, but presentation, show them the multiple features of Arecont Vision megapixel
relationships with the best thing you can do is acknowl- ways to work with you and take it technology like superior image quality,
edge and promise. Be prepared with a step further. Call the 800 num- excellent compression and fast frame
architects, engineers rates. An innovative spring arm design
material to distribute after the pre- ber where a live person answers, call Digital Zoom Field of View
and consultants is to sentation, acknowledge the question up your website and show them the makes installation a snap: simply slide
the camera through the hole and secure the magnetized
with appreciation, and promise that specifier section where all the draw-
have your products the material youll give them after ings, pricing, and specifications can
cover ring with a single screw. Every model comes equipped
with a mechanical day/night switcher, and pixel binning
specified into more the presentation will answer all the be found, and make sure they all have on 3- and 5-megapixel models deliver excellent low-light
technical questions. Finally, let the your contact information. capabilities. Add optional true Wide Dynamic Range and
projects. smart guy in the back know that difficult lighting conditions are overcome with MicroDome.
9. If appropriate, bring demo The ultra low profile of the MicroDome allows for discreet surveillance.
youre happy to discuss this with him Sometimes smaller is indeed better!
in detail after the presentation. No equipment and samples.
matter how technical the audience, Retention of information is direct-
once you fall into this trap, youve ly related to the number of senses PoE PoEPoE PoE PoE PoE
lost them (except the guy in the back that are stimulated. If you can bring
of the room). something to touch, feel, and see, the Ultra Low Profile
UltraUltra
LowUltra
DesignDesign
Low Low
Profile
Profile
Design
Design
Profile
Ultra UltraProfile
Low
andDesign
Low
All-in-One
Design
Integrated
and and
Profile
All-in-One
PoE
All-in-One
All-in-One
Integrated
Lens
PoE PoE
Integrated
True
with
and Integrated
Lens
and
Lens
Day/Night
All-in-One True
PoEAll-in-One
PoE True
Day/Night
Mechanical
withLens
Integrated
and
Lens with
True
PoEDay/Night
Mechanical
Integrated with
Mechanical
Integrated
Day/Night
True Integrated
Day/Night
True
Microphone
LensMechanical
with
Integrated
Microphone
Integrated
Day/Night
Microphone
Mechanical
with Microphone
Mechanical
Integrated
Vandal Integrated
Vandal
and
Microphone
Proof
Vandal
Weather
and
Vandal
Microphone
IK-10
ProofProof
and
IK-10
and
Weather
Proof
IP66
IK-10
Weather
and
Vandal
andIK-10
and
IP66
Proof
Pixel
on
IP66
and
and Binning
Weather
Vandal
3
Proof
IK-10and
IP66
Pixel
and Pixel
Weather
on5MP
IK-10
and
Binning
3IP66
on
and
Mode
Pixel
Binning
Weather
Models
3 on
and and
5MP
Mode
Binning
3 5MP
IP66and
Pixel
Mode
Models
on
5MP
Binning
Mode
Wide
Pixel Binning
Models
3 and
on
Models
Dynamic
Wide
Mode
Available
35MP
Wide
andModels
Dynamic
Mode
Range
Wide
Available
5MP
Dynamic
onAvailable
Models
AV2456
Dynamic
Range
Available
on AV2456
Range
on AV2456
Range
on AV2456
IR Cut Filter
IR Cut
IR Filter
Cut (-F
IR Filter Models)
Cut Filter (-F Models)
(-F
IR CutIRFilter Models)
(-F
Cut Filter Models)
(-F
Rated Models)
(-F
(-S
RatedModels)
Models)
Rated
(-SRated
Models)
(-S Models)
(-S
Rated
Models)
Rated
(-S Models)
(-S Models) and AV3456
and and
AV3456
Models
AV3456
and Models
AV3456
Models
Models
audience will remember you in much
www.arecontvision.com
Please visit www.arecontvision.com for more information. Copyright 2014 Arecont Vision.
8 Security A&e March 2014 www.SecurityInfoWatch.com
Request information: www.securityinfowatch.com/10215742
resistance from your organization.
However, there is no better method
of winning business than being spec-
ified into a project. Working with
architects, engineers and consultants
will help position you for success, but
regularly presenting to them in a tai-
lored, entertaining, and informative
manner will completely separate you
from your competitors. Regardless
of the hard work and internal push- INTEGRATE
back, press forward and implement PHYSICAL
these 10 best practices. I promise the ACCESS
rewards will be worth it. CONTROL
SYSTEMS AUTHENTICATE
About the author:
Chris Peterson has
IDENTITIES
CENTRAL
nearly 20 years of ID
experience in sales REPOSITORY
leadership, with a
focus on creating strategic sales
processes. Before embarking on a
career in sales process consulting, AUTOMATED
WORK FLOW
Mr. Peterson developed a philoso-
phy of repeatability and refinement
AUTOMATED
for the sales professional. He has
become an expert in customizing
PHYSICAL
CRM methodologies and systems IDENTITY
to optimize the efficiency and effec- MANAGEMENT
A common mistake to make an impact in the world of
tiveness of todays sales profes- seamless identity management and physical access
architects, engineers and consultants,
sional. Combining technology and
made by good youll have to bring them value on a in one solution
an understanding of the sales and
consistent basis and this doesnt REAL-TIME
sales people with mean the same presentation over and
customer service personalities, Mr. COMPLIANCE SAFE is an innovative software solution that integrates diverse
Peterson has been able to implement INTEGRATES security systems with identity management onto a unified
great intentions is over again. As youre wrapping up
programs that are fully utilized by WITH policy-based platform. SAFE ensures that every employee,
your next presentation with a specifi- EXISTING contractor, vendor and visitor has clearly defined and controlled
the client-facing teams and man-
to take the sales er, let them know that youll be bring- INFRASTRUCTURE access privileges. And SAFE is fully automated with comprehensive
agement, with a result of improved
management and reporting features. Its the most efficient way
presentation and ing valuable information a few times
efficiency, higher closing ratios, and
to manage the lifecycle of identities and their access across
per year. Ask them for ideas for top-
reduced customer attrition. your enterprise in order to maintain compliance 24/7.
make it super techy ics and for the best way to schedule
Mr. Peterson has created sales Make your world SAFE with Quantum Secure.
these meetings. It will end your pre-
for the smart guys. sentation with a feeling of a contin-
processes in many industries, includ-
ing aerospace, automotive, defense, quantumsecure.com info@quantumsecure.com
ued relationship rather than the end-
healthcare, IT, security, and tele-
ing to a meeting.
communications. Mr. Peterson can
be reached at cpeterson@vectorfirm.
Implementing these best practices
com.
will require extra effort and possible
Request information: www.securityinfowatch.com/10214753
10 Security A&e March 2014 www.SecurityInfoWatch.com
By Ray Coulombe, founder and managing director of SecuritySpecifiers.com
Should I Recommend
Applicable reference standards and codes improper applications for product/system
CAD libraries Communicate identified market trends
BIM libraries to product/system manufacturer
My Competition?
Training videos Nurturing the consultant and product
Technology tutorials rep relationship
In the old days, much of this would be res- All of the above action items suggest that
ident in a three-ring binder sitting in a con- the Product Representative can be a valu-
For a manufacturer, an A&E program ference room or hallway bookcase. Today, able member of the project team; a position
achieved through helpful actions and not hol-
is a commitment to the future however, companies should be focused on
low sales promises. A good product rep A consultants
T
myriad vendor web portals providing access
to totally up-to-date information. knows his product
oo often, people sell what they have instead of focusing on time is
knows his completion
solving the customer or client problem. It takes moxie to The Construction Specification Institute
step out of the box and, if necessary, recommend a com- understands his companys roadmap valuable, but
(CSI) recently published its Practice Guide
petitors solution. For a manufacturer, an A&E program for Construction Product Representation. Its has managements confidence some of that
is a commitment to the future, and a short term hit can Task Items cover the following areas span- gets answers in a timely fashion
yield big long term benefits. ning several project stages: time should
tells the truth
Lets start at the beginning. Whats the real purpose of an A&E pro-
gram for manufacturers? The expected answer is to get products speci-
Meet with designer/design team; learn
Good representatives provide this. Good
be allocated to
and understand project design intent.
fied. But, if given the choice between the following expanded answers,
Determine projects product/system/
consultants demand it. understanding
which would you pick? So, lets envision a scenario where a con-
A. Get products specified on a current project
material needs.
sultant has been provided by a large client the product
B. Get products regularly specified Recommend product/system solutions/ with an unusual set of circumstances that
applications to meet project requirements. demand some very specific product fea-
and technology
Answer A is winning the battle. Answer B is winning the war.
Winning the war requires building a serious long-term trusted rela- Provide timely and accurate responses to tures. As it so happens, his favorite product solutions
tionship with a security consultant or engineer. Just as good friendships product selection questions. rep is due in for a meeting that day. The
and marriages take time, hard work, and addressing problems head on, Provide/edit specification sections for consultant relates his need, and the rep available
that same commitment is a must for establishing long term consultant realizes that not only does he not have a
project specific products/systems/materials. to them, in
relationships. Solid relationships are bi-directional and need a spirit of product with the required features, but a
Provide drawings and calculations to
commitment on the part of each partner to make them work.
address project requirements.
key competitor does. What are his choices? addition to
A consultants time is valuable, but some of that time should be allo- Fib - Tell the consultant that the product
cated to understanding the product and technology solutions available
Provide budget pricing. can do the job. This is really a problem if the applying those
Suggest ancillary products compatible representative has no idea what his prod-
to them, in addition to applying those solutions in a project environ- solutions
ment. One representing a security product should be sensitive to the with specified products/systems/materials. ucts can do. Unfortunately, this happens too
consultants time and needs by consistently delivering the goods -- Estimate product/system/material often, and lack of product knowledge benefits in a project
timely, accurate product and application information. lead-time. neither party. Message to manufacturers:
train your people on product and conduct. environment.
Identify codes, rules, regulations, and
Making the design phase work jurisdictional requirements applicable to
Fib - Tell the consultant its coming out
In the design phase, a product rep should make sure that the consult- next quarter. Manufacturers must provide
the product/system/material.
ing firm has a full product care package that includes: accurate product roadmaps to their rep-
Provide product/system/material storage,
resentatives to avoid overcommitting to a
Properly formatted specifications handling, installation, and maintenance
schedule. Conversely, reps must bring feed-
Current data sheets, with specifications consistent across related requirements.
back back to their manufacturers on sched-
documents Provide and interpret applicable prod- ule and emerging technical requirements as
Operation and installation manuals uct/system/material warranties critical inputs to roadmap planning.
Design guides Inform customers of proper and Fib - Say nothing like that exists nor
12 SECURITY A&E March 2014 www.SecurityInfoWatch.com www.SecurityInfoWatch.com Security A&e March 2014 13
is likely to exist. Product reps must understand the by listening and really understanding the nature of Recommend - Point out competitive products that value when a rep is truly trying to do the right thing.
current technology and competitive landscapes. This the requirement. Through his knowledge, experience, meet the consultants need. Lets digress to the title of Rewarding his honesty and good intention by placing
requires not only manufacturer training, but also per- research, and company resources, he should attempt to this article. This takes guts (or stupidity, depending him in the role of a trusted advisor encourages the
sonal diligence and study. What is the current state put alternative solutions on the table for discussion. on your point of view) and isnt likely to happen very right kind of behavior and enables a potentially valu-
of the art in technology? Where does my product fit? Engineer - Persuade his company to develop and often. And a product representative probably wouldnt able resource. This is enhanced even further if the
How will these evolve over time? Discussing these meet the technical and schedule requirements of the tell management if he went this route. However, this company he represents has a track record of successful
issues with consultants and getting their perspectives project. Generally, this will only happen if the technical could be great way to build trust and confidence, not to projects and products that work; useful literature and
can lead to fruitful discussions, mutual respect, and hurdles are modest, resources are available to address mention taking a giant step in the relationships devel- design information and tools; design support; strong
areas for further investigation. them, and the product rep has enough internal cred- opment. And what has really been lost? The compa- integrator partners; and a collaborative attitude.
Stall - Commit to get something designed in time ibility to stimulate action. It may also occur if someone nys product has not been unknowingly mis-specified Thats a company and a representative you can work
for the project. This is easier said than done, since few has made a strategic judgment that the company must or misapplied. Promised time schedules wont be bro- with.
reps can commit to a project on their own. Bringing in participate in the project for competitive position, ken, the company avoids an opportunity to fail, and the
one with the authority to commit or getting it on the prestige, marketing, or future business reasons. opportunity may come back around in another way. About the author: Ray Coulombe
company agenda for product discussions are feasible, Partner - Convince his company to collaborate with On the consultants part, when a product rep takes is Founder and Managing
and may lead to a viable approach that will address the a third party to license, private label, or technically the riskier higher path, his behavior should be recog- Director of SecuritySpecifiers.com
current need. Also, valuable new products may emerge cooperate to present a viable solution. In todays world nized and valued. Most consultants have been burned and RepsForSecurity.com, and
from the dialog. of APIs, standard interfaces, and protocols, it might be by slick sales behavior in the past and may be skepti- P r i nc ip a l Co nsu l tan t fo r G i l w e l l
Engineer - Review the project requirements to deter- possible to append a capability to a product that deliv- cal of a manufacturers claims that something is just Technology Services. Ray can be reached at ray@
mine possible alternative solutions. Rarely is there only ers a solution. Engineering resources are still required around the corner or will soon be in production, ready SecuritySpecifiers.com through LinkedIn at www.
solution to a security project requirement. If consul- and companies with strong partner programs are in the to roll in time to support the project. linkedin.com/in/raycoulombe or followed on
tant ego is not a factor, the rep can play a valuable role best position to pursue this avenue. However, successful consultants recognize and Twitter@RayCoulombe.
Store, manage and control keys, cards and small assets more securely and efficiently with KeyWatcher Touch.
Access is limited to authorized users, and all transactions are recorded with detailed reports available. The system
will even automatically email transactional information to any user at any time. And
KeyWatchers convenient touchscreen makes removing and returning keys easier than ever.
With our modular design and full scalability, its easy to see how we keep making key
management better. Thats Morse Watchmans outside the box thinking right inside the box.
morsewatchmans.com 800.423.8256
14 Security A&e March 2014 www.SecurityInfoWatch.com www.SecurityInfoWatch.com Security A&e March 2014 15
Why bigger isnt always better typically built this way from the start. The fact is that all customers want
to feel as if they are your most important customer and that you inti-
W
before? Perhaps its the reluctance of todays workers to pick up the
16 SECURITY A&E March 2014 www.SecurityInfoWatch.com www.SecurityInfoWatch.com Security A&e March 2014 17
By Dr. Armelle Fe
of the environment
time to count Alright! G11n, youre round out the -ation family with
good!!!), which is simply about lever- Translation memory (abbreviated as
aging a thing to several different coun- T Are you thinking T15y? Nope, it
tries. would not follow the Letter-number-n
T
Now, let me throw in another pattern; it is simply TM). Throughout
-ation, one you are most likely famil- the localization project and after (and
If localization is he limits
of my lan-
Before embarking on such
a rewarding journey, it is best to
iar with: translation. This one is easy here we would be talking about trans-
and the Merriam-Webster definition lation memory management), a TM
not well-planed guage mean understand what translation,
is perfect: a rendering from one lan- helps capture and store segments,
the limits of localization and all these -ation
guage into another. A partner to local- which can be sentences, paragraphs or
it will lead to my world. words mean, who the key players
-- Austrian-British philosopher, are and the processes that will take
frustration Ludwig Wittgenstein (1889-1951) your products there. This is the
In our ever-broadening world, first installment in a series aimed
among your limits often are an impediment to at giving you an understanding of
growth. I have stated the obvious. the voyage so you can embark on it
employees and But how can you go about growing confidently, leading your team to
your business in this big, wide, ever
customers expanding world? One of the many
success.
18 SECURITY A&E March 2014 www.SecurityInfoWatch.com www.SecurityInfoWatch.com Security A&e March 2014 19
sentence-like units, in a database in mainly ensure the quality of the through many hands and be seen About the author:
order to assist human translators. translations, although their involve- by many eyes. A general process Dr. Armelle Fe is a
Another term to define as it per- ment may be greater. The relation- that could apply to just about any multi-lingual local-
tains to the process is Quality ship you will develop with this team kind of content, be it software, user ization professional
Assurance. In our context, Quality is paramount to the initial and con- guides, marketing documents, web with 20 years of expe-
Assurance (a process which involves tinued success of your project. Your sites, looks like this: rience, including 14 in the security
several key steps) can be defined in-house quality assurance team will 1. Content is written and a glos- industry. Educated in both France
as testing of the translated files to also play a crucial role in determin- sary is developed in parallel and the U.S., she has lived and trav-
Before ensure they function as intended and ing the readiness of your product for 2. Pseudo-localization takes eled around the world, and has a
checking the translation during lin- your intended market(s). The review- place (this is particularly relevant sharp understanding of doing busi-
embarking on guistic and terminology reviews. er of the translated content will verify in the software field) ness in a foreign environment.
that the translator has applied your 3. Content is exported for quota-
such a rewarding Should you have questions or need a
How to make the process requirements and produced a qual- tion little help with readying your prod-
journey, it is best work ity translation. You may look at these 4. Translation takes place uct for the market, or various mar-
When embarking on a localization four main players as puzzle pieces 5. Review follows (and we will kets you intend to offer your services
to understand project, it is essential that you sur- that your project manager will ensure see this review entails several steps and products to, feel free to contact
are put together to fit perfectly for and takes several forms depending
what translation, round yourself with a team that will her at armellefee@netzero.com.
work with localization in mind. All the right picture to appear. Some in on the type of content being veri-
localization and all on board will have to play their part the industry may argue that project fied)
knowing that what they create or do management would lie on your LSPs 6. Changes are implemented as
these -ation words will need to flow as effortlessly as side, but I am a firm advocate of hav- needed (ideally, you would have
mean, who the key possible throughout the process. We ing someone in-house manage the steps 4, 5 and 6 completed for the
will touch on the process, but first, localization project. This managers glossary and then performed for weatherproof push buttons
players are and the lets take a look at the key players involvement may vary depending on the content itself); and finally
that will form your winning team. the complexity of the tasks at hand, 7. Release your localized prod-
processes that will but his or her role is essential: main- uct and harvest the fruits of your
I like to place them in five cate-
take your products gories: content writers, translators, ly, ensure quality, adherence to bud- teams hard work! Wait, one last
quality assurance engineers, review- get and deadlines. thing to keep in mind, and this
there. ers and project managers. Content may have needed to start already
writers, such as software develop- Content is king somewhere along the aforemen-
ers, technical publication writers Onto the last topic I would like to tioned process: get ready for the
and marketing writers, will need to familiarize you with in this first arti- next version!
write in such ways as to facilitate the cle of the series: process. Processes If you were not familiar with
upcoming translation of the content are ultimately unique to your needs, localization, I hope that these few
they will deliver. In a separate issue but there are general threads that words have given you a general
Ch uck,
understanding of what your local- thes e for Dortronics new 5276 heavy duty weatherproof
we will look at the many guidelines apply to just about any project. First W e can us e
n r ooms push button switches are designed to
that ensure the translatability of and foremost, write with localiza- ization journey might look like. a ll wash dow
rated ! withstand the abuse of daily use and they
content; but for now, suffice to say tion in mind. In future articles, we Localization is fun, really! Well, theyre IP 6 5 look great too. Theyre manufactured with
that if your content is designed as an will look more closely at what one I love it, I am passionate about Doug brushed stainless steel which can be custom
afterthought to localization, you are needs to do so that the content is eas- it, and I love working with all engraved to meet your specific needs,
available with illuminated rings for easy location
more than likely to experience vari- ier to translate (which usually means involved in this process because it
and IP65 rated for harsh environments.
ous challenges that are likely to have cheaper, too). is such a rewarding feeling to see
a negative impact on quality, time to But let us just say for now that this my clients reach their globalization dortronics.com sales@dortronics.com 1.800.906.0137
market and budget. means that when the content is cre- goals! The world is waiting for you.
The Language Service Provider ated, remember that someone will Surround yourself with the right
(LSP) you will partner with will translate it and your content will go team and go out there and win it!
Request information: www.securityinfowatch.com/10213494
and technology trends, and imple- the ICS (industrial control sys- information, under which circum-
mentation of procedures. All of tems) person. The goal of the CSO, stances and conditions. This ele-
these must be integrated with the working with the cyber security ment includes the authorization
physical security system (to pro- consultant, is to identify a single, software as well as the protocols
tect against cyber-threats involving unified solution that meets the and procedures for accessing
physical intrusion). requirementsand protects the data.
This is where security consul- interestsof all three stakehold- Intrusion Detection and Pre-
tants and experts come in. ers, rather than providing dispa- vention Systems (IDS/IPS)
Id like to make this point crys- rate solutions for network intru- appliances placed on the corpo-
tal clear: serious cyber security sion, integration with the physical rate network that monitor network
requires very specific expertise, security system and detection of traffic to identify, log, block and
the kind that most IT managers malicious behaviors in the ICS sys- report malicious activity.
do not possess. You need to hire a tem. Device Protection software
consultant with experience in your In general, cyber security can be tools that reside on network-con-
(or very similar) industry, who will broken down to a number of inter- nected devices to detect viruses
work with your IT manager (or twined elements: and other malware.
no borders
dont know. Thats the right atti-
tude, because in fact, they dont
know what they need, said Joseph
Baker, partner at Atriade, a Jersey 1107 series maglocks
I
City, N.J.-based professional tech-
damages to SCADA-controlled man- ongoing risk assessment, aware- include the network/IT manager,
ufacturing processes or infrastruc- ness of the newest security tools the physical security manager and
Request information: www.securityinfowatch.com/10213494
5635MP-3 STE A&E Supplement Dortronics 1107 Series ad RA 4.625 x 4.875
22 SECURITY A&E March 2014 www.SecurityInfoWatch.com www.SecurityInfoWatch.com Security A&e March 2014 23
networks and securing inter-network tection Partners International, and man, even if the hackers were SCADA. In fact, the best strategies production between different sites,
connections. author of Integrated Security Sys- able to enter the HVAC network, are to make critical infrastructure to prevent overloading the genera-
Encryption both stored data tems Design: Concepts, Specifica- and wreaked havoc there, they networks disappear by becoming tor turbines at a single site.
and data communication need to be tions, and Implementation (Butter- shouldnt have been able to access invisible to hackers, and to closely Isolating a threat within an
adequately encrypted. Remember, worth-Heinemann, 2007). He noted customers credit card data. Exac- protect inter-network data switch- internal network is done by plac-
however, that data encryption is the that the best cyber security scheme is erbating the problem is the fact ing for untypical behaviors. ing smart switches at each site or
last defense against cyber threats, worthless if, for example, passwords that U.S. credit card issuers have The greatest challenge in the internal network. These switches,
since no data should ever been have are stored unencrypted in plain text yet to adapt smart credit cards, event of a cyber-attack is to con- which double as communication
exposed to intruders from the start. on an employees laptop that can which greatly reduce credit card tain the propagation of the threat gateways and a SCADA-specific
The CSOs job These elements are not optional or be stolen; if the server room is not fraud. from one site to another through high-throughput IPS (Intrusion
interchangeableeach and every one adequately protected; or if securi- As I mentioned, inter-network the internal network, said Ilan Prevention) solution, analyze the
is to evaluate the needs to be set in place to assure the ty cameras login passwords are not switching protection is a common Barda, CEO of RADiFlow Ltd., behavior of the incoming SCADA
proper protection of data and data changed routinely (or at all). All of vulnerability in many corporate IP which manufactures secure indus- protocols (adjusted to a set base-
repercussions of traffic. these are real-life occurrences. environments. The larger, more trial ethernet solutions for criti- line), and are able to immediately
Sometimes, vulnerabilities are piled To illustrate his point, Norman
each and every complex and more geographically cal infrastructure SCADA applica- react upon identifying stray behav-
onto an initially secure computer net- brings the example of the current distributed the network, the more tions. This is due to the opera- iors, which are in turn logged and
addition to the work through expansions and added CyberLocker virus which has to it is susceptible to hackingand
tional interdependency between reported.
functionality. For example, many date infected a quarter of a million nowhere is the danger more appar-
sites. For example, an electricity Unfortunately, I cant emphasize
system, and ensure municipalities in recent years have computers around the world. Once ent than in infrastructure, utility
grid that is dependent on sharing enough that when it comes to cyber
implemented Safe City practices, infected, and unless ransom was paid and power generation installations.
that every device with hundreds or even thousands in Bitcoin, the virus encrypts and These large-scale distributed sys-
is connected to of cameras canvassing the city cen- disables the entire network SAN, tems often involve dozens of criti-
ter, roads and public buildings. The attached storage, internal, worksta- cal facilities across multiple states.
a secure switch camera, recording server and opera- tions. Whats even more shocking, In the case of failure the potential
tor networks use standard switches the virus propagates through email, for damage is immense, as recent-
designed to detect for automation and communication, exploiting employees reluctance to ly demonstrated by the Stuxnet
creating a huge security threat at the comply with the most basic rule of
and block any attack, which caused uranium-
FOUR IP
gateways to the municipal network. online behavior. enrichment centrifuges in Iran to
unusual network This makes each camera location a Another example is the recent self-destruct.
DEVICES
potential point of intrusion into the cyber-attack on Target and two other Most such installations employ
behavior. network. The CSOs job is to evaluate major retailers, which compromised SCADA (supervisory control and
the repercussions of each and every over 40 million credit cards. The data acquisition) industrial con-
addition to the system, and ensure attack allegedly involved obtaining
that every device is connected to a access authorization from the data
trol systems (ICS), computer-con-
trolled systems for monitoring and
ONE ETHERNET CABLE
secure switch designed to detect and centers HVAC vendor (probably by controlling industrial processes.
block any unusual network behavior. calling the vendor and impersonating However, SCADA systems pose a PoE Solutions
Ive observed many cases where an IT department official.) Intru- unique cyber security challenge.
NetWay4ESK
there is over-reliance on securing the sion used to mean entering a facility Joseph Baker explained: SCADA
- 4 port managed switch with midspan injector
network perimeter incoming and through a manhole -- todays man- is an antiquated, serial-based pro- - Expand surveillance coverage
outgoing data, as well as on encryp- holes can be in Eastern Europe or tocol for automating and collect- - Built-in IP management
tionwhile neglecting two major vul- anywhere in the world, he warned. ing data in closed-environment ...plus much more!
nerabilities: lax protocols for data You have to have each and every industrial control systems. It had
access and inter-network switching. base covered. no security designed in from the
The weakest link in cyber secu- The Target attack also reveals onsetand yet is it used to run the More than just power.
rity today is corporations social another commonplace vulnerability: most critical applications. Made in the U.S.A. - altronix.com - Lifetime Warranty
engineering, said Thomas L. Nor- insecure inter-network switches. In As such, there are very few
man, CPP/PSP/CSC, CEO at Pro- the Target case, according to Nor- intrinsic approaches to secure
Request information: www.securityinfowatch.com/10212790
24 Security A&e March 2014 www.SecurityInfoWatch.com www.SecurityInfoWatch.com Security A&e March 2014 25
security, many critical infrastructure networks in the
U.S. are still far from airtight.
Looking ahead, an important driving force behind
Bigger isnt always better
(continued from page 17)
Our customers always come first.
Thats why our access control solutions
stronger data protection is the advent of new stan-
Small/medium businesses operate on the
dards, which provide a roadmap for setting up cyber
front lines
security mechanisms and protocols. These include Top level executives at big companies are typically not
directly involved with customers and everyday manage-
Forensic Zooming Reduced Overall Dual Encoder True Day/Night Multi-Streaming Integrated Motorized Lens Wide Dynamic Range Flexible Cropping
System Cost H.264/MJPEG with IR Cut Filter with Remote Focus and Zoom up to 100dB at
Full Resolution
+1.818.937.0700 | 877.CAMERA.8
avsales@arecontvision.com
www.arecontvision.com
Please visit www.arecontvision.com for more information. Copyright 2014 Arecont Vision.