Retail Security


Securing High-End Retail Stores

Securing High-End Retail Stores

It’s no secret Americans like to shop online. A marketing survey showed 40 percent of U.S. internet users made purchases several times a month in 2017.

Fraud Attempts Expected to Spike During Holiday Shopping Season

Fraud Attempts Expected to Spike During Holiday Shopping Season

Beware holiday shoppers. Attempts at fraud will peak on Thanksgiving Day this year.

NCR Buys StopLift to Bolster Self-Checkout Security

NCR Buys StopLift to Bolster Self-Checkout Security

NCR plans to integrate StopLift’s artificial intelligence tech, which detects unusual and possibly fraudulent behavior in self-checkout systems, into its point-of-sale portfolio.

Hanwha Techwin Helps Cannabis Dispensary Meet Stringent Regulatory Requirements

Hanwha Techwin Helps Cannabis Dispensary Meet Stringent Regulatory Requirements

After much research, they decided to contract Skyline Technology Solutions for their surveillance system because of their transparency, robust IT background and previous experience with medical marijuana facilities.

Apple Contracts Police to Deter Thefts at Retail Stores

Apple Contracts Police to Deter Thefts at Retail Stores

Apple is looking for new ways to deter theft from their retail stores.

How to Protect Your Business from Amazon

How to Protect Your Business from Amazon

If you think your dealership isn’t conducive to outside pressures, ask the merchants of Smalltown, USA, about that new Walmart going up on the outskirts of the municipality.

Integrate to Save

Integrate to Save

There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT.

Overcoming Key Challenges

The retail industry has become increasingly competitive as brick-and-mortar companies attempt to hold their own against online retailers offering low prices and free shipping. In this environment, retailers are seeking every possible advantage they can get in order to grow revenues while also addressing traditional security challenges like inventory loss.



Two Police Officers, Civilian Shot at Dallas Home Depot

Two Police Officers, Civilian Shot at Dallas Home Depot

A civilian loss prevention officer and two Dallas police officers were shot at a Home Depot in the Texas city.

Saks, Lord & Taylor: 5 Million Debit and Credit Card Details Stolen

Saks, Lord & Taylor: 5 Million Debit and Credit Card Details Stolen

Card information from charges in-store at Sakes Off 5th and Lord & Taylor have been found vulnerable online.

All On Board

Traditionally, security directors deployed physical access control systems to secure doors and IT managers controlled their networks. Physical security and IT security were managed independently and operated in silos. Today, this model is no longer successful.

Captis Intelligence Announces Agreement with Rite Aid

Captis Intelligence announced today the addition of Rite Aid.

Gas Monkey Security

Gas Monkey Security

Richard Rawlings is the kind of guy that keeps track of everything in his shop, and when his Gas Monkey Garage started booming, an up-to-date security system was critical.

Securing the Joint

Securing the Joint

Call it what you will, marijuana, cannabis, weed, Mary Jane or pot, it’s creating a whole new gold rush for entrepreneurs in an emerging industry, including security products and services.

Securing the High End

For retailers of high end consumer electronics such as smartphones, tablets, e-readers, drones, digital cameras and fitness watches, the customer’s retail experience can be just as important as loss prevention.

Protecting the Puppets

The Center for Puppetry Arts commissioned Atlanta’s Operational Security Systems (OSS) to provide security including access control for both phases of the construction project. The challenge included many key components.

Data Capture

Data Capture

A large, outdoor shopping plaza located in a major city in Italy is home to a wide array of retailers, restaurants and kiosks designed to meet the varying needs of consumers across the region.

Holding Your Currency

Holding Your Currency

If you know GardaWorld, it’s likely because you’ve been behind one of their ubiquitous and hard to miss red and white armored trucks as they go about the business of being North America’s largest cash-handling service provider.

Profitability Strains

Profitability Strains

For most retailers, wholesalers and distributors, the space to store inventory is the largest, yet single cost of doing business.

Big Data Deal

Big Data Deal

From cyber attacks and organized retail crime, to the explosive growth of omni-channel and digital currencies, there is no shortage of new challenges facing retailers today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3