Retail surveillance
Genetec Inc., the pioneer in enterprise physical security software, announced the AutoVu™ ANPR Analysis Reports plugin, an advanced investigation tool that expands ANPR-based forensic search capabilities within Genetec™ Security Centre. The new plugin empowers law enforcement officers and investigators to quickly narrow down a pool of suspects using vehicle behaviour patterns—specifically driving speed and travel cohorts. By eliminating manual data sorting and enabling ta...
3DX-Ray has sold two AXIS-CXi, cabinet-based x-ray systems to secure high-threat sites in Rome, Italy. AXIS-CXi was originally designed to bring the same colour-differentiating image technology used in airport baggage screening, to the mail room environment. AXIS-CXi quickly showed its potential in a whole variety of security scenarios, from embassy lobbies to the homes of high-net-worth individuals. AXIS-CXi differentiated scans Grey scale is used for the recognition of shapes and the f...
Robotic Assistance Devices Inc. (RAD), a subsidiary of Artificial Intelligence Technology Solutions, Inc., has secured the deployment of two ROSA-P 360 devices through a proactive engagement with a prominent municipal Business Improvement District. The units are being deployed to enhance safety and visibility across key public spaces managed by the local community improvement organisation. This strategic placement reflects RAD’s growing influence in urban safety initia...
Colt Technology Services expanded its product portfolio with the launch of a new Managed Local Area Network (LAN) solution, available now across Colt’s 40+ countries. Ideal for businesses looking for enhanced performance, security, and cost efficiency benefits of a Local Area Network without the complexity and expense of managing it themselves, Colt’s new Managed LAN solution combines powerful digital infrastructure with an effortless service experience. Real-time data sharing Org...
DeterTech, a pioneer in intruder detection and identification, is proud to announce the immediate availability of SmartSpray® for rental or purchase. It is considered a game-changer in tackling retail crime as it enables police to forensically link masked offenders back to the scene of their crime, even weeks after they’ve left the store. Effective CCTV storage Retail crime is at its highest level on record, with over 2,000 incidents of violence and abuse per day Retail crime is at...
Omada by TP-Link and VIGI by TP-Link, TP-Link Systems Inc.’s exclusive business solutions brands, are set to make waves at ISC West 2025 with the debut of their groundbreaking unified networking and surveillance solutions. At the event, the brands will showcase a seamless integration of VIGI’s cutting-edge surveillance solutions, Omada’s comprehensive networking systems, and the Omada Central platform—a revolutionary cloud-based solution that unifies the management of ne...
News
Artificial Intelligence Technology Solutions, Inc., announced that its wholly owned subsidiary Robotic Assistance Devices, Inc., (RAD), has received two major awards at the 2025 Security Industry Association (SIA) New Products and Solutions (NPS) Awards. SARA™, RAD’s AI-powered incident response platform, earned the prestigious Judges’ Choice Award and was also selected as the winner in the Threat Detection and Response Solutions category. Both honours were presented on the ISC West show floor during an April 2 ceremony. SARA SIA NPS judges “We are tremendously honoured to have SARA recognised by the SIA NPS judges with both the Judges’ Choice Award and category win,” said Steve Reinharz, CEO/CTO of AITX and RAD. “These awards are somewhat our industry’s equivalent to the Grammys or Oscars, and it feels like we just won Best Album or Best Picture of the year. SARA is designed to meet the increasing demand for intelligent, proactive solutions that elevate security while streamlining operations. These awards will potentially help accelerate industry adoption and AITX growth.” RAD’s ecosystem of devices SARA provides an intelligent layer of automation that now evaluates events and initiates appropriate actions SARA, which stands for Speaking Autonomous Responsive Agent, is RAD’s AI-powered platform designed to manage and escalate security incidents in real time. Developed to work seamlessly across RAD’s ecosystem of devices and monitoring systems, SARA provides an intelligent layer of automation that instantly evaluates events and initiates appropriate actions, including verbal engagement, alert escalation, and live video streaming. Incorporate SARA into Immix’s platform With its ability to respond to a wide range of security triggers, SARA significantly enhances situational awareness and operational efficiency while reducing the need for constant human oversight. This recognition comes just one day after RAD announced its integration agreement with Immix®, a pioneer in central station automation software. The collaboration will incorporate SARA into Immix’s platform, enabling monitoring centres worldwide to benefit from AI-powered response automation. SARA’s revenue and long-term growth The integration is hoped to accelerate SARA’s adoption across retail, residential, and enterprise domains The integration is expected to accelerate SARA’s adoption across commercial, residential, and enterprise environments, reinforcing its position as a transformative force in the remote monitoring industry. “SARA is more than a product, it’s the intelligence engine behind our entire ecosystem,” added Reinharz. “It represents years of focused development and is central to how we’re redefining security. From frontline deterrence to real-time response and reporting, SARA is enabling RAD to deliver measurable value to clients while driving recurring revenue and long-term growth for the Company.” New security technology solutions “SIA congratulates the winners of the 2025 SIA NPS Awards,” said SIA CEO Don Erickson. “Each year, NPS presents the most cutting-edge products available on the market today, and our judges’ dedication, support and thorough consideration are invaluable in maintaining it as the most trusted awards program for launching new security technology solutions.” Amazing new products and solutions “This year’s SIA NPS program has had another fantastic year with amazing new products and solutions presented to our judging panels,” said Christine Bergeron, chair of the SIA NPS Awards Committee and senior director of global physical security technology at Visa. “Thank you to our expert judges and committee members for your dedication to the program and lending your expertise and valuable time to contribute to a successful 2025 SIA NPS program.” Renowned global platform SIA NPS has been the security industry’s premier product awards program “The SIA NPS Awards are a renowned global platform for highlighting new offerings each year, and earning recognition is an impressive accomplishment,” said Elisa Mula, vice chair of the SIA NPS Awards Committee and founder and protection management specialist at EM Designs. “SIA applauds this year’s winners, who impressed our judges after an extensive process of tech demonstrations and panel-driven judging.” Security and guarding services Since its inception in 1979, SIA NPS has been the security industry’s premier product awards program. New products are reviewed by a panel of judges with extensive industry experience, and in 2025, following significant deliberations, the 38 judges presented awards for technologies covering 33 product and service categories. AITX, through its subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the nearly $50 billion (US) security and guarding services industry through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. RAD mobile robotic solutions All RAD technologies, AI-based analytics and software platforms are developed in-house RAD solutions are specifically designed to provide cost savings to businesses of between 35%-80% when compared to the industry’s existing and costly manned security guarding and monitoring model. RAD delivers these tremendous cost savings via a suite of stationary and mobile robotic solutions that complement, and at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics and software platforms are developed in-house. RAD new business RAD has a prospective sales pipeline of over 35 Fortune 500 companies and numerous other client opportunities. RAD expects to continue to attract new business as it converts its existing sales opportunities into deployed clients, generating a recurring revenue stream. Each Fortune 500 client has the potential of making numerous reorders over time.
Omnilert, a pioneer in visual AI gun detection, announced that its Gun Detect solution has received full SAFETY Act Designation by the U.S. Department of Homeland Security (DHS) and is now elevated to the “Approved Technologies List”. Enacted by Congress in 2022, the Support Anti-Terrorism by Fostering Effective Technologies Act, or SAFETY Act, serves as one of the highest levels of accreditation offered by DHS and promotes the development and deployment of effective anti-terrorism products, systems, and services. Benefits to Omnilert customers The more stringent full slip is an elevated standard that brings significant benefits to Omnilert clients Achieving the SAFETY Act is a rigorous multi-year process and is granted only to technologies that have been thoroughly tested and can prove their effectiveness as an anti-terrorism product. The more stringent full designation is an elevated standard that brings significant benefits to Omnilert customers as it provides legal and liability protections resulting from acts of terrorism when the platform is in use. Validation of its reliability and effectiveness “Omnilert Gun Detect has already been keeping hundreds of schools, hospitals, retail stores, sports venues, commercial buildings, and other public places safe from active shooters, and this designation is another validation of its reliability and effectiveness,” said Dave Fraser, CEO of Omnilert. “Customers can now focus on their core business competencies without being distracted by safety or liability concerns, as Omnilert Gun Detect ensures seamless protection and eliminates third-party liability for the lifetime of its deployment.” Overall security infrastructure Omnilert Gun Detect has become a vital layer of technology in an alliance's overall security Omnilert Gun Detect has become an important layer of technology in an organization’s overall security infrastructure. This AI-powered visual gun detection system delivers reliable, 24/7 monitoring of gun threats using existing security cameras. Emergency response teams Once a gun is visually detected and the threat is human verified, the system automatically initiates a full pre-planned response that could include dispatching police, locking doors, sounding alarms and sending alerts to those in harm's way. This solution gives emergency response teams advance warning before shots are fired and provides law enforcement with valuable and precise information on the shooter and where they are located throughout the event.
Cequence Security, a pioneer in API security and bot management, unveiled new insights from its CQ Prime threat research team that reveal a surge in cyber threats as businesses race to comply with the March 31 PCI DSS 4.0 deadline. The research underscores the escalating risks of API-driven fraud, credential stuffing, and payment system abuse, particularly in retail and financial services. Drawing on billions of real transactions and attack data from Cequence’s Unified API Protection (UAP) platform, the report highlights the growing attack surface cybercriminals exploit in payment infrastructure, loyalty programs, and product pricing systems. Key findings Scale of Credential Attacks: As the PCI DSS 4.0 deadline approaches, automated fraud is accelerating. More than 300 million account takeover (ATO) attempts were blocked in the past year, illustrating the growing scale of credential stuffing attacks. Retail’s High-Stakes Battleground: Retailers faced 66.5% of all malicious traffic, highlighting their vulnerability due to high transaction volumes and fragmented security postures. Product Search & Pricing Abuse: A staggering 822 million attempts were blocked as 89% of non-ATO bot-driven attacks focused on scraping product pricing. This enables competitive algorithm manipulation, scalping, and real-time price undercutting of legitimate retailers. Loyalty Rewards Abuse: Over 22 million fraudulent attempts were blocked as attackers exploited loyalty programs, treating reward points like cash. These accounts are frequently drained due to easier liquidation than stolen credit cards, often going undetected until significant losses occur. Shopping Cart & Inventory Abuse: Nearly 6 million attacks were prevented as fraudsters weaponised automation to hoard high-demand products. Credit Verification Fraud: Over 69 million attempts were blocked as cybercriminals mass-tested stolen credit card details through low-risk transactions before making larger fraudulent purchases, fuelling the circulation of compromised payment data. Traditional security defences for API PCI DSS 4.0 introduces critical security updates, many businesses still struggle with API protection “PCI DSS 4.0 is pushing businesses to modernise security, but many are still scrambling to catch up, giving attackers the perfect opportunity to strike,” said Randolph Barr, CISO at Cequence. “Account takeovers remain the biggest threat, but we’re also seeing a wave of new, highly sophisticated attacks exploiting every stage of the digital payment process. The common thread? APIs. Attackers are sidestepping traditional security defences and going straight for API endpoints that handle cardholder data - one of the most critical yet overlooked vulnerabilities. Businesses that focus only on compliance risk falling behind.” While PCI DSS 4.0 introduces critical security updates, many businesses still struggle with API protection, an area that attackers are actively exploiting. Key actions of Cequence To ensure compliance while defending against real-world threats, Cequence recommends these key actions: Ensure Secure Data Transmission: Encrypt all Primary Account Number (PAN) information when transmitted over open, public networks to prevent unauthorised access. Secure API Endpoints: Identify all API endpoints that transmit PAN and ensure they only transmit encrypted PAN, reducing the risk of data exposure. Proactively Identify Vulnerabilities: Inspect custom application code for security flaws before deployment using automated tools to identify risks in APIs, third-party integrations, and custom applications. Continuously Test and Monitor: Regularly test APIs and applications for misconfigurations or vulnerabilities before production and monitor them for anomalous or malicious behaviour in real time. Deploy Automated Preventative Controls: Use security solutions that prevent both conventional attacks and business logic abuse while ensuring sensitive data is not exposed to unauthorised entities. Implement Real-Time Threat Prevention: Identify and block malicious traffic before it reaches your applications using intelligent, automated security mechanisms.
dormakaba's upcoming EasyAssist™ low energy swing door operator makes entrances more accessible, convenient, and hygienic – with lower costs and time savings from planning to installation. dormakaba will preview EasyAssist at booth #20007 during the International Security Conference and Exposition (ISC) West 2025 in Las Vegas (March 31 - April 4). Operating modes and functions EasyAssist can be used in offices, medical practice buildings, hotels, retail stores, and schools Thanks to its sleek, compact design, EasyAssist can be used in offices, medical practice buildings, hotels, retail stores, schools, and apartment buildings. The new EasyAssist low-energy operator is easy to plan, install, and operate, reliably ensures accessibility and safety, and is environmentally friendly. With its four different operating modes and additional functions, opening doors becomes considerably easier. EasyAssist low-energy operator “Our new EasyAssist low energy swing door operator, coming soon, perfectly demonstrates how entrances can be made more barrier-free, comfortable, and aesthetically pleasing at great value,” said Bret Holbrook, Senior Vice President of Access Hardware Solutions (AHS) and Access Control Solutions (ACS) Channel Sales for dormakaba North America. “Whether you want to easily automate or add accessibility to an interior door, EasyAssist makes life easier.” Push-N-Go feature Installation, commissioning, and configuration are simplified to save time and effort When EasyAssist is in automatic mode, the door opens automatically using a switch such as a push or wave plate. The Push-N-Go feature requires slight manual door movement, while Power Assist supports manual opening and Power Close ensures safe and silent closing of the door. Both standard doors and fire doors can be equipped with EasyAssist. Installation, commissioning, and configuration are simplified to save time and effort. With EasyAssist, all mounting positions are possible and can retrofit a standard mechanical door closer for consistent aesthetics through a facility. EasyAssist’s SmartArm with integrated cabling Additionally, EasyAssist’s SmartArm with integrated cabling allows for door leaf mounting without exposed wiring, enhancing security by deterring cable tampering and damage. Equipped with an Environmental Product Declaration (EPD) and Health Product Declaration (HPD), EasyAssist's environmental and health-related properties are presented transparently to enable architects, planners, and builders to make informed decisions for sustainable construction projects.
Solink®, a pioneer in cloud-based video security and analytics, will showcase its vision-enabled security and operations strategy at ISC West. With advances in AI and automation, Solink will unveil how it is helping customers move from passive to active security, and to extend the value of video beyond security, to improve operations. Advances in AI and physical security Security has been managed as a cost centre–an insurance policy against bad things Security has traditionally been managed as a cost centre – an insurance policy against bad things happening, a way of understanding what happened after the fact. But with advances in AI, physical security is undergoing a transformation. “The future isn’t just about reviewing incidents – it’s about real-time intelligence and taking action before threats escalate,” said Michael Matta, CEO at Solink. “Physical barriers and human guards will no longer be central to security practices. Solink is looking ahead to where security investments help businesses move from passive surveillance to real-time, active security – where cameras do more than record incidents; they help prevent them.” Solink transforms cameras Security cameras are the world's most powerful sensors. Solink transforms cameras into data collectors that deliver instant, searchable insights — turning a “stream” into a proactive source of intelligence for the entire enterprise. Any camera connected to the Solink platform — regardless of brand — will: Detect risks before they escalate by identifying unusual activity, unauthorised access, or policy violations in real time. Improve operational efficiency by monitoring cleanliness, merchandising compliance, and customer wait times automatically. Enhance loss prevention by flagging unusual transaction patterns, such as returns without a customer present. Reduce investigation time by instantly searching any camera’s footage using AI-powered video analysis. From passive security to actionable intelligence Solink is accelerating the transition from passive video recording to actionable intelligence. Businesses can now move beyond incident review to real-time intervention, gaining greater control over security, compliance, and operations — without requiring additional manpower or costly hardware upgrades. Looking ahead: From apps to AI agents Solink is continuously advancing its platform, with the evolution set to include autonomous agents Solink is continuously advancing its platform, with the evolution set to include autonomous agents — intelligent AI systems that will monitor, analyse, and respond to events in real time. These AI-powered assistants will help security and operations teams focus on the most critical and high-impact work, reducing the need for manual review and response. Solink is pioneering the industry toward a future where security and operations are proactive, intelligent, and automated, ensuring businesses can see more, know more, and act faster than ever before. Solink at ISC West in Las Vegas Solink is exhibiting at ISC West in Las Vegas, April 1-3, 2025. Visit booth 23009 to learn more about Solink’s vision-enabled security and operations strategy.
Deep Sentinel, the pioneer in proactive AI-powered security, announced the official launch of its Bring Your Own Camera (BYOC) program. This offering allows businesses to equip their existing third-party security cameras with Deep Sentinel's award-winning surveillance software, unlocking a new level of advanced security. Deep Sentinel's AI security Instead, compatible third-party cameras can seamlessly connect to Deep Sentinel's platform Through the BYOC service, businesses no longer need to replace their camera systems to benefit from Deep Sentinel's cutting-edge AI security technology and real-time intervention by professional guards. Instead, compatible third-party cameras can seamlessly connect to Deep Sentinel's platform. "BYOC is a game-changer for organisations looking to enhance their security with live surveillance without overhauling their existing infrastructure or hiring onsite guards," said David Selinger, Deep Sentinel CEO and Founder. "Our goal at Deep Sentinel has always been to make advanced security accessible for all businesses, and BYOC is another step towards achieving that." Small businesses seeking security improvements Crime tactics are becoming increasingly sophisticated and costly to small businesses. Projections indicate that retail theft losses may reach over $140 billion in 2025, according to Capital One Shopping Research. Simultaneously, many businesses are scaling back budgets as inflation looms. With the addition of BYOC, businesses can now take advantage of Deep Sentinel's unrivalled protection using new or even existing cameras from many of the most popular manufacturers. Adopt state-of-the-art security solutions Combination of affordability and superior version makes it an effective solution Businesses with existing cameras no longer need to invest in new equipment, significantly reducing upfront costs. This combination of affordability and superior performance makes it an effective solution for businesses seeking to protect their assets without straining their budget. "Whether you have a legacy system in place or want to mix and match your preferred camera brands, BYOC empowers businesses to adopt state-of-the-art security solutions without compromising budget or flexibility," added Selinger. How BYOC third-party camera integration works Deep Sentinel's third-party camera integration works by seamlessly connecting customers' existing Power-over-Ethernet (PoE) camera systems to Deep Sentinel's robust surveillance platform. Once integrated, the system leverages AI-powered technology to analyse video feeds in real time, identifying unusual activity or potential threats with unparalleled accuracy. Deep Sentinel's team of live guards Streamlined process ensures businesses can maximise their investment in pre-installed cameras Any suspicious behaviour triggers the AI, sending an immediate alert to Deep Sentinel's team of live guards, who assess the situation and intervene as needed, whether it's through deterrent measures like two-way audio or contacting local law enforcement. This streamlined process ensures businesses can maximise their investment in pre-installed cameras while gaining access to Deep Sentinel's proactive and highly effective security solution. List of certified camera models The growing list of certified camera models includes pioneering brands such as Tiandy, Hikvision, Dahua, and Uniview. Businesses using unlisted cameras are encouraged to request a certification consultation, as Deep Sentinel is actively expanding its list of supported models. In addition to providing comprehensive 24/7 surveillance, Deep Sentinel's platform also offers features such as remote access control, real-time alerts and customised reporting. Businesses can request additional camera models to be certified, and Deep Sentinel's team will assess their compatibility for future integration.


Expert commentary
A survey conducted by Blackhawk Network finds the average shopper plans to spend almost half of their holiday budget to buy gift cards this year versus only 39% in 2023. The global gift card market was valued at $1.3 billion USD in 2023, and it is projected to reach more than $5.2 billion USD by 2032. Fraud - a growing concern While gift cards continue to be top of mind for consumers for streamlined gifting, gift card fraud is a growing concern for consumers and businesses alike. According to the U.S. Department of Homeland Security’s Homeland Security Investigations (HSI) unit, gift card fraud, perpetrated by Chinese and other organised retail theft (ORT) rings, can be attributed to losses in the hundreds of millions of dollars globally, and is being used to fund other illicit crimes such as drug and human trafficking. The retailers implement procedures to mitigate attacks. Using data insights to detect emerging threats and identify hidden connections is among the ways retailers can protect the integrity of their gift card programs. How gift card fraud is manifested Typical physical gift card scheme involves purchasing items using stolen credit cards Gift card fraud occurs both at physical locations and online. A typical physical gift card scheme involves purchasing items using stolen credit cards and then returning the items for store credit or gift cards. While some stores have strict and well-enforced return policies to ensure that only customers entitled to refunds receive them, fraudsters employ fake tracking ID (FTID) tactics that focus on bypassing identification checks during returns, enabling them to return stolen merchandise or exploit refund policies. They use a combination of fake IDs and altered receipts or rely on lax return processes to achieve their goals. Once gift cards are obtained, criminals can sell them at a discount or use them for personal purchases, effectively converting stolen goods or false claims into untraceable funds. Tactics to convince consumers One tactic involves draining a gift card by obtaining the barcode, Card Verification Value (CVV) number, personal identification number (PIN), or activation code from beneath the slim cardboard packaging. Once they obtain the code(s) from physical cards, they reseal them, monitor online for consumers to buy and load the cards, then spend the balances before the consumers can. Some merchants have sought to combat this by keeping store-branded gift cards behind the checkout counter, handing them out after purchase. However, this approach can be costly and inconvenient for both retailers and customers, as it requires additional resources for in-store management and potentially slows the purchasing process. Other online tactics involve people who misrepresent themselves in a variety of phishing scams to convince consumers to purchase gift cards, then provide the card details to others who then drain the cards. Scammers tell the victim which gift card to buy (and where). They might say to put money on a card for an online store, a streaming service, or a specific retail store. These scammers often work as part of an organised crime network. Retailers leveraging open info, AI, to combat gift card fraud Retailers are empowered to improve the monitoring and analysis of gift card transaction patterns A growing number of retailers are leveraging publicly available (PAI) and hard-to-reach data and analytics to extract key insights that help fight various forms of gift card fraud and stay ahead of evolving fraud tactics. With such tools, retailers are empowered to improve the monitoring and analysis of gift card transaction patterns, identify anomalies, and implement proactive measures to prevent fraudulent activities before they can impact consumers and sales revenues. Retailers need this type of approach in their efforts to battle scammers, who continue to refine tactics for draining gift cards and committing other types of retail fraud. Beyond simply refining their techniques, fraudsters continue to advance their use of technology to commit their crimes. For example, cybercriminals also use bots to perform brute-force attacks on gift card websites. They are increasingly using AI to perpetrate gift card fraud. Leveraging Latest AI And LLMs Retailers need to continually upgrade their fraud-fighting strategies and technologies as well. They can lean into PAI and analytics, in conjunction with existing security operations and investigations, to safeguard the integrity of their gift card programs and demonstrate their commitment to customers, reinforcing brand trust. In addition to leveraging the latest versions of AI and large language models (LLMs), retailers can take advantage of open-source intelligence (OSINT). By leveraging PAI and difficult-to-obtain data with analytics, brands are using OSINT to more quickly seize on evolving threat patterns to recognise current and shifting fraud schemes and stay ahead of evolving fraud tactics. In this way, the AI operates as a resource multiplier, compiling and processing data at faster-than-human speeds, while enabling the ability to extract actionable insights at scale. Users can make more accurate and timely decisions. Retailers need to upgrade their fraud-fighting strategies and technologies. Safeguarding gift cards, customer trust, and brand integrity OSINT can inform retail security managers, loss prevention directors, fraud investigators, and others to help spot and deter gift card fraud. By using AI to detect patterns and anomalies, OSINT solutions can help fraud specialists spot patterns of suspicious activity that may indicate distinct instances of fraud. AI further helps fraud specialists identify members of ORT rings by uncovering hidden connections among seemingly unrelated individuals and transactions. The market for retail gift cards is large and continues to grow, and so too, is the gift card fraud threat. By adopting OSINT for fraud prevention, retailers can stay ahead of tech-savvy criminals, safeguarding gift card revenue streams, as well as customer trust and brand integrity.
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognise the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorised access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organisation in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organisations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
With the rise of organised retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing the economic pressures that impact profitability and consumer demand. RFID technology The key lies in identifying effective solutions to counter the current surge in ORC, enabling retailers to secure their vulnerable staff and protect inventory for paying customers. Technology plays a crucial role in supporting brands on this mission, with RFID technology continuing to be a valuable solution. It aids retailers in gaining better control over retail crime, leveraging inventory data. The ongoing surge in retail crime Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector Seen as a global issue, the British Retail Consortium recently reported that incidents of theft have increased by 27% across 10 of the largest cities in the UK, with some cities reporting up to a 68% increase. In the US, retailer Target reported an inventory loss of $500 million for 2023, amounting to a 100-basis point hit to gross margins in 2023. The current surge in theft is not attributed to a singular cause. Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector. Lack of preventive measures A significant contributing factor is the lack of sufficient preventive measures by law enforcement, which in some cases has led to a rise in more severe incidents. However, the implementation of technologies like RFID allows retailers to efficiently build cases against criminals, putting them in a stronger position when it comes to reporting thefts. Not all retail crimes are orchestrated by large entities or executed through sophisticated methods. Some stores have seen a reduction in staff numbers and, as a result, there are fewer people on the shop floor, making it easier for shoplifters to carry out their activities unnoticed. The true impact of retail crime Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey The impact of retail crime on businesses extends beyond financial and economic consequences; it has also led to a surge in violence against retail staff, an ongoing trend elevated by the pandemic. Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey conducted by the National Retail Federation. This escalation in violence not only results in immediate repercussions but also contributes to long-term mental health issues for staff, fostering an atmosphere of insecurity that has compelled some retailers to close their physical stores. Policy implementation Given the challenge of staff retention across various businesses, addressing retail crime becomes an even more urgent matter. Additionally, retailers are wary of their employees facing potential danger and the prospect of legal action. Consequently, many have implemented policies prohibiting employees from actively intervening when confronted with shoplifters. Privacy concerns with facial recognition Retail crime also affects customers, as businesses seek to offset losses by raising prices Retail crime also affects customers, as businesses seek to offset losses by raising prices, further burdening financially strained consumers. The presence of visible security systems not only makes stores more hostile but also diminishes the overall customer experience. While facial recognition technology is considered a potential solution, privacy concerns have emerged in its various applications. Today’s problems, yesterday’s solutions Retailers are resorting to historic measures such as steel cables, physical monitoring, or plastic screens to resolve customer issues. However, the reality is that these solutions are unfit for solving the problem, causing friction for both customers and staff. Digital solutions The newer approach involves equipping retail staff with body cams and providing new training The newer approach involves equipping retail staff with body cams and providing new training to deter shoplifters. Some stores are even offering the police discounted food and beverages to encourage their presence. The responsibility lies with management teams to seek effective solutions. In an era dominated by data and technology, retailers must shift their focus from traditional security methods to digital solutions that align with the challenges of today’s society and modern retail environments. Shrinkage When discussing theft or organised retail crime, retailers commonly use the term "shrinkage," referring to not only theft but the broader issue of lost inventory. Additional drivers of shrinkage include damage, fraud, and internal theft. A significant problem arises as losses are often based on guesswork and estimates rather than concrete numbers. Retailers may lack a comprehensive understanding of their inventories, further increasing the issue of shrinkage. Combating shrinkage Utilising RFID technology notably helps in boosting inventory accuracy Some retailers still struggle with limited knowledge of the whereabouts of items, a challenge heightened by the issue of shrinkage. Utilising RFID technology notably helps in boosting inventory accuracy. This enhancement enables retailers to obtain a clearer understanding of their inventory and the precise locations of items. Comprehensive strategy Changes in the in-store experience have highlighted the relevance of RFID, especially as self-service checkouts encounter double the shrinkage levels compared to traditional checkout stores. To combat retail theft effectively, a comprehensive strategy should involve the integration of labels, deactivation, electronic article surveillance, and data analytics. This combination works synergistically to reduce shrinkage and enhance product availability. Retail data analytics platforms RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors Linking hardware to an underlying data analytics platform empowers retailers to make more informed decisions. Retail data analytics platforms delve into alarms, deactivations, and visitor metrics, providing a deeper understanding of theft patterns. RFID technology drives efficiency by pinpointing frequently stolen items, allowing for the identification of theft patterns. In instances of flash mobs in major metropolitan areas, RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors and incoming customers. Real-time optimisation The crucial question remains whether both shoppers and retailers are prepared to shoulder the responsibility for these additional precautions. Nevertheless, these changes leverage data more effectively, optimising loss prevention strategies almost in real-time rather than relying on biannual inventory counts, therefore transitioning from static to dynamic loss prevention. Holistic approach Striking a balance between security measures and providing a seamless shopping experience is key In a retail environment, not all items require protection, and prioritising the safeguarding of the most frequently stolen and valuable items can significantly impact shrinkage. A holistic approach to retail theft is imperative, considering the entire journey of an item through the retail environment. Striking a balance between security measures and providing a seamless shopping experience is key. Protection without hindrance As stores move towards being checkout-free, retail criminals (or ORC gangs) will be presented with lucrative opportunities to steal, so retailers need to be one step ahead by introducing unobtrusive and effective technology solutions. For example, case building can be improved with item-level data. RFID data offers a more precise means of assessing the value of stolen items compared to relying solely on CCTV. It provides detailed insights into the specific items removed from the store and the timing of these incidents. This proves beneficial in tracking repeat offenders. Increased visibility with a proactive approach The modern retail environment continues to evolve and criminals are never far behind. RFID technology plays a crucial role in minimising shrinkage by enhancing inventory visibility. Moreover, it leverages the power of data to stay ahead, enabling better predictions of retail crime and the formulation of prevention strategies. This proactive approach allows for the implementation of more tailored solutions to alter outcomes positively.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Sometimes, retail crimes are strategic and expertly choreographed. Every step is carefully thought out — from the brand to the location to the items that are taken. Shoplifting, a major safety concern Also, the violence that accompanies these events is rising. Shoppers are rightly concerned about their safety while shopping, and the brand reputations of retailers are under threat. Traditional ‘shoplifting’ has two major differences, when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. Rise in organised retail crimes (ORC) ORC groups take in-demand items that they can resell for a profit, either online or at a physical location ORC groups take in-demand items that they can resell for a profit, either online or at a physical location. Also, ORC attacks are not random - they come with a high level of strategic thinking. “Armed with the right tools, retailers can identify ORC patterns that allow them to potentially anticipate and take steps to mitigate future events,” said Craig Szklany, the Vice President and Product General Manager - Loss Prevention & Liability at Sensormatic Solutions. Although ORC was rising before 2020, the COVID-19 pandemic and its impact on people’s lives and livelihoods accelerated the trend. Economy impacts shoplifting The economy also impacts shoplifting. “When consumers have less money to spend, they are more likely to steal necessities,” said Craig Szklany, adding “Keeping food on the table or finding an alternate source of income to pay the mortgage can be powerful motivators, and some individuals turn to retail crime to keep up.” One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring. Craig Szklany continues, “Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts.” Loss prevention systems with artificial intelligence (AI) Some of these systems are equipped with artificial intelligence (AI) that can identify ‘red’ and ‘green’ shoppers (thieves versus well-intentioned customers), as they move throughout the store, so retailers can respond proactively to potential threats. With enough data on these patterns, systems can alert retailers of at-risk locations" “Widespread use of these technologies can also help track ORC groups, as they move around regions or countries,” said Craig Szklany, adding “With enough data on these patterns, systems can alert retailers of at-risk locations.” He continues, “The increased use of scan-and-go and other forms of self-service checkout has made it easier for consumers to steal. Implementation of these systems has been one of the biggest factors in increased shrink for retailers.” Store visibility technology “The purpose of scan-and-go is to provide a seamless shopping experience for consumers, with smoother checkout and to help retailers reduce the need for employees,” stated Craig Szklany, adding “However, with increased theft, retailers need some form of monitoring at these sections.” He continues, “With store visibility technology and AI, retailers can both monitor self-checkout for theft, while also gathering insights that enable them to better identify and predict theft at these checkouts.” Intelligence-led loss prevention technology Craig Szklany adds, “Intelligence-led loss prevention technology provides a huge return on investment (ROI). Traditionally, items that left the store were as good as gone. With RFID and smart-exit technology, that is no longer the case.” These systems allow retailers to quantify theft events and include data on what was stolen and how much it cost. With that information, retailers can take a proactive approach to theft prevention, by providing enhanced evidence packages to law enforcement, which increases the chances of the items being returned to stores. Challenge of shift to the Internet of Things (IoT) The biggest change in retail technology in the last five years is the shift to the Internet of Things (IoT) The biggest change in retail technology in the last five years is the shift to the Internet of Things (IoT) and Store Visibility technology. Stores outfitted with integrated tags, pedestals, and AI-enabled video cameras can be connected holistically, so that retailers have a clearer insight into the thieves’ journeys in real-time. That data helps prevent future theft. These technologies provide a more accurate look into what exactly went missing, when, and where, which allows retailers to respond to shoplifting, in a way that they had not been possible in the past. Modern loss prevention technologies offer flexibility “The great thing about modern loss prevention technologies is that they’re flexible,” stated Craig Szklany, adding “The same system that tracks ORC events can provide insight into energy use, floor optimisation, customer experience, and more.” RFID tags allow retailers to track inventory at the item level, so they are better prepared to make decisions about stocking and promotions. Computer-vision-based AI (artificial intelligence) that identifies ‘red’ and ‘green’ shoppers can also track customer sentiments and demographics, to enable retailers to offer special discounts and enhanced customer service, in order to improve customer experiences and establish loyalty. Benefits of video loss prevention technologies Ahead of busy shopping seasons, many retailers hire extra employees to serve as physical deterrents against theft, but labour shortages may take this practice out of reach this year. Video loss prevention technologies can reinforce retailers’ workforce, allowing them to be proactive against theft without drawing associates from their main goal: helping customers.
Case studies
Established in 1997, Dubai-based BMA International operates fashion retail in the Middle East and Asia across the Kingdom of Saudi Arabia (KSA), United Arab Emirates (UAE), Bahrain, Oman, Kuwait and Qatar with more than 250 stores offering two major brands — Redtag and twenty4. BMA’s steady growth is a testament to its focus on building trust with its shoppers, employees, suppliers and stakeholders to create a company that is people-centric, ambitious and results-oriented. Challenge Fraud is a common problem in the retail sector, particularly within large chains with hundreds of locations and tens of thousands of employees. BMA’s retail stores were no exception. Following an internal audit, security of point-of-sale (POS) terminals in retail outlets were identified as a serious concern, particularly the misuse of floor supervisors’ credentials to access terminals and modify or cancel transactions. The problem persisted even after BMA switched from passwords to a smart card-based authentication system The problem persisted even after BMA switched from passwords to a smart card-based authentication system. The most common issues involved supervisors leaving smart cards with cashiers to use in their absence and failing to return the cards when separation from an employer occurs — a frequent occurrence as many of BMA’s retail employees are expatriates who often return to their home countries. Fraudulent use of the smart card was also a common problem. Once a sale was completed and the customer had left the store with their purchased items, the smart card could be used to improperly access the system so the cashier could void the transaction and pocket the “refund,” resulting in both monetary and inventory losses. Biometric-based system “BMA’s internal auditors were concerned with the lack of control over the cards and the potential for fraudulent transactions due to their mishandling. They observed clear gaps in security and authentication practices that led directly to fraud and revenue leakage, resulting in the Internal Audit Committee recommending to the BMA Board of Directors that action be taken to plug the security holes by tightening the authentication process,” said Nainan M. Kurian, CEO of Technowave International LLC. The decision was made to transition authentication to a biometric-based system that would provide the required security at a competitive price that aligned with the aesthetics of the retail stores. The system also needed to be compatible with the Oracle Retail Xstore Office Cloud Service, which BMA International was adopting across its brands. Solution A fingerprint reader from HID is ideal for use by multiple people in a shared environment BMA International and its technology partner, Technowave International LLC, determined that the HID DigitalPersona® 4500 Fingerprint Reader met all their requirements — a decision supported by recommendations from other retailers that had deployed the product, and by the fact that competitive solutions were incompatible with Oracle Retail Xstore, a crucial requirement. A USB peripheral with a compact design to conserve space, this fingerprint reader from HID is ideal for use by multiple people in a shared environment. Its professional, modern design looks elegant in retail settings while offering superior authentication control via biometric functionality that uses optical scanning technology to achieve excellent image quality and reliability. HID DigitalPersona 4500 Fingerprint Reader With this easy-to-use technology, floor supervisors simply place their finger on the reader window, which rapidly captures and encrypts the fingerprint image, and then provides a red flash as a visual cue indicating that it was properly captured. That image is sent to the DigitalPersona FingerJetTM biometric engine for verification, and once the user has been authenticated, access to the POS terminal is granted. “Deploying the HID DigitalPersona 4500 Fingerprint Reader was simple and caused no disruption to retail operations. It paved the way for significant reduction in the malpractice that had been occurring with the smart card system,” said Kurian. Result Since deploying more than 1,100 HID fingerprint readers in retail outlets across KSA, UAE, Oman, Bahrain, Kuwait and Qatar, BMA has eliminated nearly all POS fraud and abuse. The system has also driven tangible improvements in the attendance and punctuality of floor supervisors, who must now be physically present in the store for authentication to take place. The HID authentication system is also capable of multiple types of authentications — providing flexibility that is appreciated by users who work at multiple locations. “Because the HID DigitalPersona 4500 Fingerprint Reader requires proof of presence for authentication, there is greater accountability among supervisors which resulted in immediate cessation of POS fraud and stopped both revenue and inventory leakage. The exceptional support provided by HID Global has also allowed BMA to take full advantage of the system’s functionality and flexibility,” said Kurian.
Take a walk to the local high street. Compared to a few years ago, they may notice many more “To Let” signs in empty shop windows. It comes as no surprise given the number of shocks to the economic system over the last five years, ranging from COVID-19 to international conflicts, all of which have led to various consequences, such as energy price hikes, interest rate increases, and a general shift in many people's work patterns and consumer behaviour. Vacant retail space The total number of void private-sector commercial properties stands at approximately 165,000 According to Savills Research, the overall footfall of vacant retail space in the UK is around 14.5%, while the total number of void private sector commercial properties stands at approximately 165,000. Additionally, an estimate of 7,000 commercial and business properties owned by Local Governments in Great Britain have been unoccupied for over 12 months. Net Zero ambitions Furthermore, a recent BBC article points out that business tenants are more inclined to search for smaller, newer and more energy-efficient office spaces to rent, are willing to downsize owing to hybrid working, and seek buildings that complement their Net Zero ambitions. This might be interpreted as an indication that a number of long-standing commercial premises would become vacant in the near future, forcing owners to update and repurpose empty spaces to meet the demands of a changing market. A costly asset that requires extra protection Insurance companies charge higher premiums for void property and require regular security While the property market and customer demands are shifting, some truths remain unchanged: commercial property should generate money, not drain it. However, void sites imply outgoing costs and no profit, so it only makes sense that any vacant space should be flipped as soon as possible. Unoccupied premises can become an alluring target for squatters, vandals, thieves and trespassers, which is one of the main reasons why insurance companies charge higher premiums for void property and require regular security and fire safety checks too. Enhanced security measures Such properties must be protected by enhanced security measures. This often involves the installation of steel doors and screens, perimeter protection, vigilant surveillance and prompt alarm response. After all, any break-in can cause far greater financial damage than the costs of protection; and the owner is legally liable for any injuries sustained by trespassers. Meanwhile, legit access is very much required by contractors to upgrade and renovate the site in preparation for the next business occupier. Any delays or missed visits result in further charges on an asset that is essentially nothing but another bill while vacant. Access issues: Fetch the keys For every contractor visit, property check or viewing, a key must be obtained offsite and then returned A minor but, consequently, very important issue might arise when accessing a site that is unmanned 24/7. For every contractor visit, property inspection or viewing, a key must be obtained offsite and then returned. This takes time, implies unnecessary travel and, potentially, may result in additional missed visit fees and rebooking arrangements in instances when a contractor is unable to gain entry. As a result, it may slow down the void property turnaround time. Keyholding arrangements Furthermore, complex keyholding arrangements can also slow down the security alarm response time. More and more security companies are moving away from the traditional keyholding model, in which keys are stored at the central location or in heavy key lockers in vans during patrols. While reaction time is critical, time is frequently wasted collecting keys or waiting for a keyholding patrol (rather than the nearest one) to arrive on site. Lock up and leave the keys. Securely. Keyholding solution must be more robust than doors or other means of entry to stop opportunistic intruders What about storing keys at the point of entry? This may be controversial, but it is a solution that has gained popularity in void property management with implementation of secure range key safes and lockboxes. The primary concern in such an approach is security. Even though property is void, the keyholding solution must be more robust than doors or other means of entry to prevent opportunistic intruders from taking advantage of the new keyholding arrangement. Smart key management solutions Stuart Wheeler, Managing Director of Keynetics, a company that offers smart key management solutions with security-certified key safes, comments, “Over the years, we have developed strong relationships with the top void property management companies in the UK and Europe. These clients require a keyholding solution that enables efficient FM service provision for vacant properties while also providing a high level of security.” “Storing keys at the point of need enables quicker alarm response times and allows approved contractors to enter the premises without any delays, but security must not be compromised; in that respect, our SentriGuard key safes are suitable for commercial properties and certified to LPS 1175 (Loss Prevention Standard) C1 and C3 security ratings, which is unrivalled by any other supplier.” SentriGuard key management system Stuart confirmed that in addition to security, the SentriGuard key management system is highly praised for its innovative technology. First, it incorporates a bespoke cloud-based platform that allows customers to manage access to multiple properties remotely and generate various audit reports that can also serve as a proof of service delivery. Second, assigned individuals may gain access to premises either using the mobile app or a time-restricted code. He added, “The ability for clients to access real-time data of site visits with a solution that does not break the bank and is secure has been the key to the success here in the U.K. and now across mainland Europe.”
Amthal has worked with Hertfordshire Garden Centre to install additional IP CCTV across its retail site and upgrade existing systems, including its intruder alarm solution, for the safety and security of staff and visitors. Based in Redbourn on the outskirts of St Albans, Hertfordshire Garden Centre is a small, independent retail premises, serving as a cherished hub for home and gardening enthusiasts. IP CCTV, intruder alarm system Amthal has worked closely with the team to ensure a secure operation, most recently adding IP CCTV and an updated intruder alarm system. Enabling staff to work in a safe environment and visitors to explore, learn, and purchase with complete peace of mind. Graham Armstrong, Owner of Hertfordshire Garden Centre, said “Faced with the cost of living crisis and a corresponding surge in shoplifting, security of our site is a top priority. But it’s not solely the Police’s job to look after us, we have to take proactive responsibility for our staff and our visitors, without compromising our friendly and welcoming environment." Real-time management and security Amthal has recently added over 20 IP cameras and upgraded the existing visual verification systems Graham Armstrong adds, “We have worked in partnership with Amthal, a local company that fully understands the brief. The team has consistently delivered great service and has shown to be knowledgeable and helpful at all times. Installations and upgrade work programmes have occurred with minimal disruption to the daily operations of our retail site. It all comes together for our staff and visitors to know they are in a secure garden centre world.” Amthal has recently added over 20 IP cameras and upgraded the existing visual verification systems, allowing management and security to review activity throughout the premises in real time and empowering personnel to respond promptly to any potential incidents. A monitored intruder alarm solution The addition of a new monitored intruder alarm solution is geared to quickly detect any breach and provide advanced security against unauthorised access attempts. Jacki Adams, Installation Supervisor at Amthal Fire & Security, said “In the current climate, retail crime has hit record levels, increasing by more than a third over the past year alone. What Hertfordshire Garden Centre demonstrates is by taking a proactive approach to enhancing the security infrastructure on-site, they are doing all they can to protect teams and visitors." Comprehensive surveillance and monitoring Jacki Adams adds, “What it also shows is the importance of reviewing security regularly with the help of a trusted partner such as Amthal. We can identify the opportunities for extended CCTV coverage and upgrade systems in place to ensure comprehensive surveillance and monitoring capability. Here, the move reflects a commitment to creating a safe and secure haven for all home and gardening enthusiasts.”
The Body Shop has installed bespoke Traka RFID locker solutions at its main distribution centre to ensure intelligent management and accountability of assets, enhance security and streamline operations. As a global pioneer in ethical and sustainable beauty products, The Body Shop recognises the importance of responsible resource management, business practices and asset security. Traka intelligent locker systems At its main distribution centre in Littlehampton, three large-scale Traka intelligent locker systems have been installed to manage different devices. The first uses Traka’s multi-bay cradle locker solution to manage 30 VoCollect voice-picking devices and Bluetooth headsets, all charged and ready to operate. Three large-scale Traka intelligent locker systems have been installed to manage different devices The second houses 40 Falcon handheld scanners, managed by Traka’s specialist Asset Master Locker range with charging and battery points located. The final system presents secure storage for a kit of equipment, specifically designed for the forklift truck drivers, with each locker compartment containing a Falcon scanner, Radio and Printer. Each intelligent locker solution is offered with RFID asset detection and specialist TrakaWEB software, to provide managers with instant audit control capability to establish exact times when physical devices are removed and returned to lockers. New standards in design Says The Shift Manager, responsible for the project: “To keep up with high demands, our distribution centre operates 24/7. It is constantly evolving, driving new standards in design and use of technology to ensure our products reach our stores to meet our loyal customer demands." “To operate at maximum capacity, we need to make it as simple and as quick as possible for authorised colleagues to not only gain access to the devices they need but also ensure they are operational and in good working order. With the introduction of Traka, we have eliminated manual control, plus we have a complete audit on all devices that we can access from anywhere. We have already noted increased accountability, traceability and fault logging, all coming together to reduce lost time and enhance operational efficiency.” Net 2 access control cards Access to other assets and tools can only be granted to authorised personnel for their job specification The three locker solutions have been installed in two separate locations around the distribution centre, to ensure staff can easily access equipment in their work area. Eliminating the need to travel to a central location and queue to access or organise equipment has led to improved productivity at the start and end of shift periods. Traka has also ensured all systems operate using existing Paxton Net 2 access control cards to minimise facility disruption during or after installation. Access to different assets and equipment can only be granted to authorised personnel for their identified job specification, with staff only able to take one device or kit at a time. Author's quote Lee Payne, Traka Business Development Manager added: “The introduction of Traka systems to a global distribution centre such as The Body Shop demonstrates how simple process enhancements can make a significant difference. From the initial brief through to implementation, we worked closely with the team to identify the exact requirements for each site and the accessibility needs for staff." “We understood the need for curfew notifications, fault logging and careful authorised access control. We planned with the team to separate out the systems into specific work areas and use the Traka orange to help the locker systems stand out, all to ensure vital time could be saved for staff and management. The result is a smoother, more efficient operation throughout the supply chain, helping The Body Shop continue its mission of delivering its best-loved ethical beauty products."
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that the Yorkdale Shopping Centre in Toronto, Canada, has unified its security operations based on Genetec™ Security Centre, Sipelia™, AutoVu™, and Mission Control™. With the Genetec platform, the security team at Yorkdale has been able to enhance operational efficiency, better collaborate with local police, and take a more proactive security stance. Yorkdale Shopping Centre With over two million square feet of retail space and 270 stores, Yorkdale Shopping Centre offers the country’s largest collection of designer labels and luxury brands. Managed by Oxford Properties Group, it goes beyond shopping, offering visitors valet services, a museum-quality art collection, and 24/7 on-site security. Breaking out of proprietary system limitations Additionally, having a closed security solution held them back from exploring new technologies With their proprietary video system and standalone access control solution, searching for information required the security operations team to navigate between the two systems, which slowed investigations and incident response. Additionally, having a closed security solution held them back from exploring new technologies such as cutting-edge cameras or system integrations. Genetec™ Security Centre and Omnicast™ The search for a new video management system (VMS) led them to Genetec™ Security Centre and Omnicast™, which not only provided state-of-the-art video management, but unified video, access control, and data from other sensors into one system. The Genetec solutions enhanced the team's ability to manage security policies, monitor events, and run investigations. Since it is an open platform, Yorkdale can expand the system with new technology as it emerges. A comprehensive view of mall security With Security Centre, we’re shaving valuable time from investigations and response" Since implementing the Security Centre, the Yorkdale team has been able to significantly enhance operational efficiencies. If an incident is underway, operators can see what’s happening and act fast from one unified view. “With Security Centre, we’re shaving valuable time from investigations and response," said Luca Aiello, Security Manager at Oxford Properties. Enhanced guest experience “Our security operators can identify potential risks, retrieve critical information, and deploy on-foot officers faster within the shopping centre." "Overall, we’ve become far more proactive and efficient in handling anything that comes up. That ensures we keep providing an exceptional guest experience.” Sipelia™ intercom module Sipelia allows them to initiate two-way conversations across 150 intercom stations Operators manage over 750 cameras, 500 access control readers, and 2000 cardholders using the Security Centre. They’ve also deployed the Sipelia™ intercom module. Sipelia allows them to initiate two-way conversations across 150 intercom stations located in parking garages, entrances, and other areas. AutoVu™ ALPR system The team also added the AutoVu™ automatic license plate recognition (ALPR) system, the Genetec Mission Control™ decision management system, and other technologies within the platform. All video, data, and calls come back into a state-of-the-art command centre, where security operators keep the shopping centre running smoothly. Security managers can also use the Genetec Mobile app on their phones to check in on situations from anywhere in the mall. Operational efficiencies, enhancing public safety To streamline incident response, the Yorkdale team implemented Genetec Mission Control™ Ensuring security operators can quickly respond and resolve the issues is critical to maintaining a five-star shopping experience. To empower their operators and streamline incident response, the Yorkdale team implemented Genetec Mission Control™. The collaborative decision management system helps operators better understand unfolding events and guides them through the best course of action according to SOPs. Proactive security approach Genetec AutoVu™ has been a key component in fostering a proactive security approach. With 52 AutoVu automatic license plate recognition (ALPR) cameras deployed, they’ve been able to extend security to their property’s perimeter, enhance vehicle-related investigations, and help serve the community. For example, if local police are searching for a vehicle of interest, Yorkdale can put that vehicle information into their AutoVu system, and if the vehicle comes onto their property, police are notified. Responsive to theft-related incidents As incidents of vehicle and/or retail theft rise, the AutoVu ALPR system has also become a deterrent As incidents of vehicle and/or retail theft rise, the AutoVu ALPR system has also become a deterrent. Said Bob Vounotripidis, Senior Operations Manager at Yorkdale Shopping Centre, “Since implementing the AutoVu ALPR system, we’ve become significantly more responsive to theft-related incidents and investigations. Word has gotten out–Yorkdale is a property that takes security seriously, and the perpetrators will be caught.” Planning for future expansions The Yorkdale team is looking ahead to other technologies that can expand their security approach and system, such as deploying body-wearable technology and integrating video from those devices into the unified platform. They are also exploring using Genetec Clearance™ digital evidence management system to streamline evidence sharing with law enforcement. Said Aiello, “More shopping centres should be using Genetec Security centre. This security platform not only helps our team operate more efficiently, but we’re also evolving our deployment using the best technologies out there.”
An IDIS end-to-end retail branch network solution has been adopted across all of Konyalı Saat’s 40 store locations in Türkiye as well as at the pioneering retailer’s warehouse and workshop where high-value watches are repaired, serviced, and calibrated. Konyalı Saat is one of Türkiye’s pioneering independent retail chains in the luxury watches and jewellery sector, with 40 stores selling a wide selection of top brand Swiss-made timepieces, silver and gold accessories with precious gems as well as a range of designer sunglasses. POS integration Systems integrator Secom specified the powerful yet affordable IDIS solution to meet Konyalı Saat’s wide-ranging surveillance and business intelligence needs. Konyali Saat must centralised video control with POS integration and to develop new efficiencies To ensure that all their retail outlets were being run as optimally and securely as possible, Konyali Saat required centralised video management with point-of-sale (POS) integration and to develop new efficiencies using AI-powered video analytics integrated with their wider retail enterprise resource planning (ERP) software. The aim was to boost profitability from strengthened loss prevention as well as improving product management and marketing operations from video data. IDIS AI Box for Retail (DV-1304) Complete HD coverage of each store, without blind spots, was efficiently achieved using a single, NDAA-compliant 12MP IDIS Super Fisheye Camera, plus either one or two 2MP IDIS 2.8 mm fixed lens dome cameras, depending on each store’s layout. The fisheye provides comprehensive domain awareness, providing the same coverage as three or more fixed lens cameras, while the domes located at entrances capture video to support people counting and other analysis functions. These AI capabilities are provided by an IDIS AI Box for Retail (DV-1304), a powerful plug-in video analytics device that can transform IDIS surveillance solutions with functions including people counting, queue management, heat & zone mapping and occupancy monitoring. IDIS DR-2508P NDAA-compliant NVR Footage is recorded locally at each store on an 8-channel IDIS DR-2508P NDAA-compliant NVR An IDIS DP-HE1201 HDMI/VGA Encoder enables simple and cost-effective POS integration, with cash register data overlaid on video footage and time synched with all cameras, allowing suspicious activity or sales anomalies to be investigated quickly and easily while providing a time-stamped visual audit trail. The footage is recorded locally at each store on an 8-channel IDIS DR-2508P NDAA-compliant NVR, and the system is operated in each branch using the cost-free IDIS Centre VMS, as well as being controlled and managed centrally at Konyalı Saats’ headquarters with IDIS Solution Suite (ISS) Expert. IDIS end-to-end solution The IDIS end-to-end solution is allowing Konyalı Saat to analyse sales turnover and conversion rates with visitor numbers by day, month, and week, making it possible to increase boost sales by accurately evaluating store performance including marketing campaigns, product management and staff efficiency more accurately than ever before. IDIS technology is perfectly suited to the demands of high-end retail environments" Yunus Bürge, Information Technology Manager for Konyalı Saat, reports, “We have been deeply impressed with every aspect of the IDIS solution, from the quality and performance of the fisheye cameras to the added value provided by the AI Retail Box including simple integration of video data with our POS. IDIS technology is perfectly suited to the demands of high-end retail environments.” IDIS single source model The chain has recently extended its portfolio with Longines-branded stores, and the owner has ambitious plans to expand further, with four new outlets scheduled to be opened in the next half year and more to follow. Koray Ozyildirim, IDIS Türkiye Country Manager, added, “The project with Konyalı Saat demonstrates IDIS end-to-end solutions for retail can be tailored to meet the needs of stores and retail branch networks of any type and scale. The IDIS single source model gives retailers a choice of cost-effective surveillance technology to tackle challenges such as shrink and safety. Combined with integration options and highly accurate, AI-powered video analytics, we are giving retailers the ability to achieve a rapid return on investment and an enhanced customer experience that positively impacts the bottom line.”


Round table discussion
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
The role of the integrator/installer in the physical security marketplace is shifting as technologies evolve and applications expand. Integrators are being faced with a need to augment their expertise both in a wider range of systems and deeper into the specifics of each increasingly complex technology. At the end of the day, it falls to the integrator/installer to ensure a system performs as promised, however much a consultant or even a manufacturer might be involved in the process. We asked this week’s Expert Panel Roundtable: How is the role of the security installer/integrator changing?
The holiday season is marked by festive spirit and family celebrations, but it is also the busiest time of year for retailers. Busy shoppers willing to spend money are an upside to the holiday shopping season, and many businesses depend on the holiday rush as a critical element to having a successful year. A downside of a busy holiday season is an increase in retail security threats including shoplifting. We asked this week’s Expert Panel Roundtable: How can technology address loss prevention challenges during the holiday shopping season?
Products


White papers

Total cost of ownership for video surveillance
Download
Understanding all-in-one solutions
Download
How video technology is transforming loss prevention, operations, and customer experience in the retail sector
Download
How intelligent video is transforming banking and financial institutions
Download
Why SAAS Security Platform is more popular in American SMEs
Download
A guide to moving physical security into the Cloud
Download
Intelligent video security solutions
Download
Security investments retailers should consider for their 2021 budget
Download
How end-to-end video security solutions can help your organisation with social distancing
Download
Smart security cameras: excellence in retail
Download
Nine ways to make your retail security system work harder
Download
How to catch shoplifters with thermal imaging
Download
Loss prevention and beyond: How video innovation enriches retailers
Download

Videos
Retail surveillance: Manufacturers & Suppliers

Using artificial intelligence (AI) to automate physical security systems
Download
A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
The truth behind 9 mobile access myths
Download
Access control system planning phase 2
Download