My Biometric Product Marketing Expert Slogan Rewarded Me (SBDC at BizFest)

At the Inland Empire BizFest, I am listening to two Orange County-Inland Empire Small Business Development Center presenters.

When they asked if any of us had developed any SEO-related terms, I told them I was the biometric product marketing expert.

They gave me some M&Ms.

If a Company Says It Has No Competition, Run Far Away

(Imagen 4)

I was reading something in which a company executive declared, “We have no competition.”

The executive was trying to say that the company’s product was so amazingly brilliant that other companies were left to eat its dust.

Imagen 4.

But think about what the “we have no competition” statement means.

It means that in any opportunity in which multiple firms are vying for a contract, the company would win all of them.

Every. Single. One.

What’s more, the company would win every sole source opportunity and never lose a prospect.

Um…no.

Because if a product is a monopoly—De Beers diamonds comes to mind—there are always alternatives. Lab-grown diamonds. Cubic zirconia stones.

And even if a product is truly unique with no substitutes, the prospect always has one alternative. Doing nothing.

Which can have an attractive price point.

Imagen 4.

So don’t claim you have no competition.

And let Bredemarket analyze your competitors and write about your benefits.

Find out more.

Erich Winkler’s “Cybersecurity Controls From Zero to Hero”

(Imagen 4)

In my work for a Bredemarket client I’ve explored taxonomies for digital assets. But I’ve never explored taxonomies for cybersecurity controls as Erich Winkler just did.

In fact, Winkler categorized cybersecurity controls in two ways: the “how” and the “why.”

So naturally I started with the why

Winkler:

“By understanding the different types of controls, you’ll be able to make more informed decisions about which ones are best suited for specific situations.”

Winkler identified six different “why” control types:

  • Preventive.
  • Detective.
  • Corrective.
  • Deterrent.
  • Recovery.
  • Compensating.

For definitions of these six “why” control types, his three “how” control types, 3000 words worth of pictures, and some examples, read Winkler’s Substack post. And if you’re brave, take the quiz.

Winkler sums everything up as follows:

“By now, you understand that cybersecurity isn’t just about buying the latest tools. It’s about knowing why you use them and how they work together.”

Winkler writes expertly on cybersecurity. But if you can’t get him, and you need someone to work with you to create content for tech marketers, turn to Bredemarket.

The Return on Investment (ROI) of Digital Asset Management (DAM)

(Imagen 4)

I recently downloaded an ebook from Canto entitled “The ROI of DAM: How to Prove the Business Value of Digital Asset Management.” If you would like to download it also, visit this page.

Why do you need to manage digital assets? Because if your company has thousands or millions of digital assets, individual ones will be so hard to find that you’ll start adding an “N” to the “DAM” acronym.

Canto argues that its digital asset management solution delivers positive ROI by the following:

  1. Saving time and reducing waste
  2. Accelerating speed to market and improving content quality
  3. Reducing asset production costs
  4. Boosting revenue with brand consistency
  5. Minimizing business risk

The ebook quotes some numbers: $20,000 savings here, more savings there.

Of course, Canto isn’t the only DAM in town, as my former coworker Krassimir Boyanov will not hesitate to tell you. Krassimir heads KBWEB Consult, a boutique technology firm that provides consulting services for Adobe Experience Manager users.

A wombat holding a phone displaying a digital identity, surrounded by papers with pictures of cars. Two Dolby speakers are in the back of the room.
(She’s tidied up and) I can’t find anything.

I’ve previously quoted his thoughts on a consistent taxonomy for digital assets, but Boyanov has also addressed ROI issues in KBWEB Consult’s own blog: specifically, looking at Adobe Experience Manager Assets, the DAM component of Adobe Experience Manager. Here’s part of what he said:

In July 2024, IDC examined the business value of Adobe Experience Manager (AEM) Assets. Based on interviews with AEM Assets customers, IDC concluded that the interviewed customers could realize an average annual cost saving of $9.04 million per organization. These cost savings came from multiple sources:

  • Reduced risk of using out-of-date/unapproved assets (52%)
  • Reduced risk of accidental disclosure of assets (27%)
  • Reduced spending of duplicative (62%) or unused (40%) assets
  • Reduced agency spending by completing work in-house (24%)
  • Reduced go-to-market time (55%)
  • Reduced time for content to go from creation to production (47%)
  • Reduced time for content in a new form factor (39%)
  • Reduced time to create a new digital asset (66%)
  • Reduced time to repurpose an existing digital asset (73%)
  • Reduced time to create a rendition of an asset (60%)

Those are some DAM good numbers. And KBWEB Consult (and IDC) didn’t gate them.

Tech marketers, do you have similar return on investment numbers you would like to share with your end customers? Bredemarket can help you share those numbers. Talk to me before your competitors return YOUR investment to THEM.

Tech marketers, are you afraid?

Busy Day Today

(Imagen 4)

The end of the month will go out with a bang for Bredemarket.

I have three meetings today: an early morning meeting that includes a client and the client’s end customer, an internal client meeting, and the Inland Empire BizFest in Montclair. (California, not New Jersey.)

Plus I have to support a fourth meeting that I will not be attending.

I hope this indicates a busy August for Bredemarket.

But if you want to get on my calendar, fill out the meeting request on my “Content For Tech Marketers” page.

Tech marketers, are you afraid?

PoisonSeed and FIDO Update

Update to my July 21 post “PoisonSeed: Cross-Device Authentication Shouldn’t Allow Authentication on a Fraudster’s Device.” FIDO’s cross-device authentication is NOT inherently insecure.

From Chris Burt at Biometric Update:

“A reported passkey vulnerability has been walked back, and FIDO is recommended as the fix to the vulnerability of “phishable” MFA wreaking havoc on corporate networks around the world.

“The PoisonSeed attack reported by security company Expel earlier this month does not give access to protected assets, if the FIDO Cross-Device Authentication flow is properly implemented.”

Proper implementation and configuration is essential.

What is a Fingerprint Ridge Ending?

(Image from NIST)

(Part of the biometric product marketing expert series)

If you hear a fingerprint person discussing a “ridge ending,” the definition is pretty simple.

“This minutia illustrates an abrupt end to a continuous ridge path.”

And if you think of fingerprint ridges as black lines on a white background, then a ridge ending is the exact opposite of a bifurcation.

And I wrote this post to prove…a point.

FBI, DoD, DHS, and Other Biometric Standards

(Imagen 4)

When I started in biometrics 30 years ago, the most important operational biometric standard to me was what was then called the Electronic Fingerprint Transmission Specification or EFTS, published by the Department of Justice’s Federal Bureau of Investigation (FBI). 

Record types from the 1993 ANSI/NIST standard.

Unlike the ANSI/NIST biometric data interchange standard, the EFTS can actually be used out of the box to transmit data. The ANSI/NIST standard doesn’t define any “Type 2” fields, nor does it define any “types of transactions” (TOTs). EFTS did.

Other standards

But the EFTS, now the FBI’s Electronic Biometric Transmission Specification or EBTS (downloadable here), isn’t the only biometric transmission standard derived from ANSI/NIST.

  • State police agencies have their own law enforcement transmission standards. Here’s New York’s version (PDF).
  • Other U.S. federal agencies such as the U.S. Departments of Defense and Homeland Security have transmission standards.
  • Other countries have their own transmission standards.
  • Multinational agencies such as INTERPOL have their own transmission standards.

Luckily all the different standards have some basic similarities, but if you have a mobile biometric device that must submit to DOJ and DoD and DHS, you need to switch to the proper profile for each submission.

Last week I downloaded two different standards so I could understand the TOTs. I would have downloaded a third, but the agency restricts its distribution.

Word up

But I will tell you the biggest frustration I have with the standards.

In the EBTS and some other standards, there is a type of transaction referred to as “Criminal Ten-Print Submission (No Answer Necessary).” The abbreviation for this TOT is CNA.

Microsoft Word in default mode auto-corrects this from CNA to CAN.

Imagen 4.

CMOs, I can help you

But I’ve overcome this frustration over 30 years of immersing myself in all things biometric-translation related. This experience is benefiting a Bredemarket client that communicates with end customers regarding many of these standards.

Can my experience benefit you as your organization produces content, proposal, and analysis materials on a deadline? If Bredemarket can help you catch up or get ahead, let’s talk.

Tech marketers, are you afraid?

What is a Fingerprint Bifurcation?

(Image from NIST)

(Part of the biometric product marketing expert series)

If you hear a fingerprint person discussing a “bifurcation,” the definition is pretty simple.

“The point at which one friction ridge divides into two friction ridges.”

And if you think of fingerprint ridges as black lines on a white background, then a bifurcation is the exact opposite of a ridge ending.

The fingerprint image is from an appendix to the National Institute of Standards and Technology’s 2003 Fingerprint Vendor Technology Evaluation (FpVTE).

Yeah, THAT FpVTE. I remember it well from my days at Motorola…not a “top 3” vendor.

Imagen 4.