Page 90 - Security Today, September 2018
P. 90

better than anyone, and taking share from traditional channels in the process. By 2020, it’s expected that B2B buyers will make over half of their purchases online.”
As pointed out on CNBC’s “Trader Talk with Bob Pissani” (July 24, 2017), “If you don’t make the object you are selling, or don’t have some sort of intellectual property, or solve a pain point for a cus- tomer, then you’re just a middleman, and you are increasingly more vulnerable. The concern is that these middlemen will start losing vol- ume because sales in general are going to the internet and because it’s increasingly difficult to get pricing.”
The biggest internet player is Amazon and Amazon is gearing up to get into more industries, including security. It won’t be long before some major security manufacturer sees the “wisdom” of Amazon’s business plan. As Beck preaches, “At its core, Amazon is a disruptive juggernaut that is dis-intermediating traditional sales and distribu- tion channels.” It is only foolish to think that it won’t come the com- mercial security industry’s way.
Protecting Your Business from Amazon
Let’s review those points made in “Trader Talk.” Do you make the object you are selling or have some type of intellectual property? Most integrators do. In most cases, it is the software they use. Take a look at your software with cold, hard eyes. Review your competitor’s software wearing the same set of glasses. Read up on the latest busi- ness data trends, such as Big Data and the Internet of Things. Know what they mean. Where does your software fit in these major trends and how does it compete? Is it ready to handle this new data world? If it hasn’t been updated to any extent in the last five years, you could be vulnerable.
Are you a solver of pain points? Or do you simply sell hard- ware? Does a one type of bandage fix all wounds? If you are the latter, you are simply selling a commodity that can be replicated by anyone. Sometimes, even a computer! Become more critical in your sales strategy. Train your people to look for the real problem the customer is experiencing. Market your solution to address that situation. That’s something a computer can’t do. When in doubt, ask your manufacturer for help. They’re in this with you; they need you to be successful.
Speaking of which, how often do you ask your manufacturer to help you out? Many manufacturers have a great understanding of how to take products and services to market in today’s world. Do you have a plan on how to promote your company in your markets? How can you become the business the local media contacts whenever there is a security issue? How can you get information to provide your prospects? What about using information they have already cre- ated? Photographs? Direct mail or e-mail? Is information available and downloadable from their website? Have you checked?
Don’t forget grilling your manufacturer if they are providing ways to promote your business and make things easier. For instance, are their products interchangeable? Do long ranger readers work on the same platform as smart card readers? Do they provide OEM label- ing? After all, what sense does it do you to promote them when you could be marketing your own brand? What about bids? Can they help you with specifications? On major jobs, will they send out one of their own specialists?
Do Not Underestimate the Role of Recurring Revenue
Generating recurring monthly revenue (RMR) is more important than ever in today’s world. You cannot subsist on “deals” alone. Cash flow becomes uneven and short months become painful. How can you work with your manufacturer to ensure a consistent stream of orders for new integrated features and replacement or additional product orders?
72
Let’s consider a simple staple, the credential card. When your cus- tomer needs another 20 proximity or smart cards, who gets the order? Somebody on the internet; somebody other than you? You should get this order but are you? It will only get crazier with the advent of mobile credentials, which 20 percent of all access control users are forecast to be using sometime during 2020. Let’s look at this subject as an example of all types of recurring monthly revenue (RMR) con- siderations.
If you were creating the perfect internet grab, could you think of a product area much easier for Amazon than mobile credentials? They are more convenient than bringing cards to market because the user already has his credential, his smart phone, and already carries it with him wherever he goes. Credentials can be delivered to the end user in either paper or electronic form, such as via email or text. The dealer has nothing to inventory and nothing to ship. Likewise, the user sponsor has nothing to store, nothing to lose and faces no physi- cal replacement hassles.
In addition, just like hard credentials, soft credentials can support the 26-bit Wiegand format along with custom Wiegand, ABA Track II magnetic stripe and serial data formats. They can be ordered with specific facility codes and ID numbers. They are delivered in the exact number sequence ordered with no gaps and no under- or over-runs. All this information can be set up in a handy menu, needing only a click to specify.
So, for the dealer, smart phone credentials will be more conve- nient, less expensive and more secure. They can be delivered in person or electronically. They are quicker to bill with nothing to inventory or to be stolen. Also, in most cases, soft credentials can be integrated into an existing access control system. Distribution can also be via independent access control software.
Here is the question that you will want to ask your manufacturer for soft credential solutions: Is your mobile credential product meant to bolster the business of your dealers and integrators or to simply provide a cheaper alternative to the end-user? In other words, are your smart phone credentials to be sold in the same manner as your traditional 125-kHz proximity or 13.56-MHz smart cards—from the existing OEM to the dealer to the end users? At both time of original order and subsequent re-order?
Assure that Your Manufacturer Isn’t Cutting You Out
If you think that you are immune from the threat of Amazon, just read these introductory words on the Amazon Business Services site: “Manufacturers and distributors who are new to Amazon or are existing Professional Sellers now have a targeted way to reach business customers on Amazon. With a full suite of tools to en- able B2B ecommerce, small businesses to large enterprises will find new ways to engage professional customers in supply chain relation- ships. Businesses can register for a Professional Selling Account on Amazon in only a few minutes. Start selling today and reach new business customers now.”
Don’t think the some security companies—especially those with ac- countants at the helm—won’t seriously consider such enticements. At what percentage of your offer will their Amazon price be? How many of your customers—today—with such pricing, wouldn’t take them up on at least a portion of what you’re selling today? Would your custom- ers be able to define the added value you bring on
such orders?
Whatever your answer, you have partners in this
fight. Your manufacturers, are already aware of this threat. Unite with them. Their business life is also under attack —sooner or later. Work with us.
Scott Lindley is the general manager of Farpointe Data.
0918 | SECURITY TODAY
ONLINE SECURITY


































































































   88   89   90   91   92