Retail Security


Chicago-area Mall Fights Crime and Safeguards Shoppers

Stratford Square Mall relies on flexibility and image quality of IP video surveillance to maintain safe environments for holiday shoppers and deter theft.

Global Retail Theft Barometer Study Finds Shrink Cost Retailers

Retail loss “penalty” costs average US household $403 annually while the cost of retail crime as percentage of revenue rose 27 percent in the US.

Verifone Expands Availability of Secure Commerce Architecture

Reduces merchant exposure to large-scale payment data breaches and expedites acceptance of EMV in the US market.

Making the Case

When budgets are tight, everyone in the organization gets more strategic in order to make the case for their share of the company’s resources.

The Rise of the Machines: M2M’s Role in Transforming Business and Security

The Rise of the Machines: M2M’s Role in Transforming Business and Security

Faced with tighter security requirements, enhanced regulatory pressure and heightened environmental concerns, businesses seek technologies that will improve overall business processes.

Amazon

Amazon's Loss Prevention Strategy Lands them in Court

Employees must stand in line, waiting to be screened before they are allowed to leave the premises.

Cutting-edge Surveillance

Declining crime rates in many major cities can be attributed in part to technological advancements that deter prospective criminals and bolster rapid response time when crime does occur.

Security Industry Grows in Kenya after Westgate Attack

Security Industry Grows in Kenya after Westgate Attack

The attack on the Westgate shopping mall has led to boosted business in the private security industry.



Enhancing the Customer Experience

Consumers’ expectations about their shopping experience at brickand- mortar, retail stores are changing. Mobile devices allow consumers to find any information they need with just a few clicks of a button, and this sense of immediacy has spread to how they shop.

Remote Eyes Integrates with Squirrel Systems

Loss prevention solution for hospitality users of Squirrel POS Software.

SecureNet Simplifies Payment Integration with Launch of Single Stack of APIs

Enhancements give developers access to a single stack of development-language-agnostic APIs for both card-present and card-not-present transactions, allowing for easier integration across all channels.

Preventing Consumer Data Breaches with Electronic Access Control

Preventing Consumer Data Breaches with Electronic Access Control

As retail continues to expand the scope of its security administration to prepare for security breaches, IT managers must extend down to the rack level.

Security Solutions Hone in on Needs of Small to Medium Size Businesses

Security Solutions Hone in on Needs of Small to Medium Size Businesses

Crime doesn't discriminate against size; small businesses are typically most vulnerable with fewer resources to guard against it.

Putting an LP Spin on Video Analytics

Putting an LP Spin on Video Analytics

Video analytics aren’t just tools for marketing and merchandising; these intelligent algorithms can also spot atypical customer behavior that might suggest potential loss activity when viewed by the Loss Prevention department.

Retail Checklist: 8 Tips for Secure Payments Processing

Retail Checklist: 8 Tips for Secure Payments Processing

When selecting a payment processor be sure to select one that has these characteristics to maintain secure data integrity.

Honeywell Announces Compatibility with Savant Systems Home Automation Equipment

Honeywell Announces Compatibility with Savant Systems Home Automation Equipment

Installation professionals can offer Savant connected-home capabilities to homeowners who use VISTA alarm panels.

Target Hack Affected 70 Million Customers

Target Hack Affected 70 Million Customers

As the result of recent research and investigation, Target Corp. has upped the number affected by the data breach during the holidays.

Zebra Acquires Hart for $94 Million

Zebra Acquires Hart for $94 Million

Zebra Technologies Corporation has acquired Hart Systems, a provider of cloud-based physical inventory management solutions, for approximately $94 million in cash, subject to applicable post-closing adjustments

40 Million Credit Card Accounts Breached at Target

40 Million Credit Card Accounts Breached at Target

What to do if you own one of the credit cards that have been accessed without your consent.

American Dynamics Introduces New Series of Cost Effective IP Cameras

American Dynamics Introduces New Series of Cost Effective IP Cameras

Illustra Flex Series Cameras provide high-performance features and excellent image quality to K-12 schools, retail, small banks and commercial applications.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3