Articles by Dan Reese
There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT. All these areas could be the responsibility of just a few people working to secure a handful of stores or each of these areas could be entirely separate departments, as is often the case for major retailers with locations throughout the country. Regardless of the size of the retailer, there are many different technologies that can be used within a retail store to improve security and loss prevention, yet none should be used in a silo. There are tremendous benefits to integrating security technologies and communications systems together, including enhancing overall safety and security, reducing shrink, and improving operations. There are many different technologies that can be used within a retail store to improve security and loss prevention As the existing security infrastructure is evaluated and plans for the future are developed, the team responsible should consider some of the following questions. Are there areas of the store that require greater security? Are there notifications or other technologies that could improve the efficiency of personnel and the safety of shoppers? Are there other departments within the organization that could benefit from the data gathered by the security technology? Understanding current pain points within the stores and how integrated security solutions can address these is the key to implementing the best solution. Here are a few “hot spots” within a typical retail store that easily demonstrate the power of integrated solutions. Point Of Sale Terminals Whether it’s loss through sweet hearting or other fraud, point of sale terminals present a significant shrink risk for retailers. Integrated systems enhance security at these locations. Video recording of HD or megapixel cameras integrated with point of sale data makes it easy to locate video associated with transactions and exception reporting. This allows for visual verification of each transaction when needed.There are tremendous benefits to integrating security technologies and communications systems together Other risks like robbery not only result in loss, but also impact the safety of employees and shoppers alike. Panic buttons or bill trap sensors connected to the intrusion detection system ensure silent alarms are issued when employees are at risk. When the intrusion detection system is integrated with the video system, pressing a panic button or pulling the bill from the sensor can automatically trigger a video snapshot to be sent to the monitoring station to provide verification of the alarm and more information for law enforcement when they are dispatched. Adding audio integration to the intrusion system can also result in a message sent to the store security personnel’s two-way radio when a panic button is pushed, or a bill trap sensor is activated. If no security guard is onsite, video monitoring services can allow the monitoring center to intervene through audio, alerting the perpetrator that his or her actions are being monitored and that the authorities have been contacted. This may cause the offender to flee the area, helping to mitigate the safety risk as well as the potential for loss. Panic buttons or bill trap sensors connected to the intrusion detection system ensure silent alarms are issued when employees are at risk High Value Displays Protect high-value or frequently-stolen items such as electronics, using video analytics integrated with audio communications Protect high-value or frequently-stolen items such as electronics, using video analytics integrated with audio communications. For example, a person standing at a display for longer than a pre-defined time or touching items on display can trigger a video snapshot to be sent to the store manager and an audio message to play through a nearby loudspeaker, such as: “Thank you for your interest in our smartphone selection; an associate will be there soon to assist you.” This not only alerts potential offenders that their actions are being watched, it also serves to improve customer service for legitimate shoppers – as a retail floor associate is notified that a customer may need assistance. Cash Office An access control reader at the door to the cash office restricts access to only authorized individuals. Integrating video can automatically capture an image of the person requesting access for verifying an employee’s identification prior to granting access or for retrospective analysis in the event of a theft. Exit Doors If an employee props open a back door – either for easy re-entry after a break or to allow access to another person with intentions of theft – integration of the intrusion detection system to the video and audio system can significantly reduce risk of loss. For example, the intrusion detection system can monitor doors for abnormal conditions, even when the system is disarmed.Loss can also occur when a cooler or freezer malfunctions or when the door is accidentally left open A door left open for longer than a pre-defined time can cause an alarm on the intrusion panel, which can trigger a nearby camera to send a snapshot of the open door to the store manager and trigger the public address system to play a pre-recorded message through a nearby speaker. This prompts the employee to close the door, reducing risk of theft. Coolers And Freezers Loss isn’t just about theft. Loss can also occur when a cooler or freezer malfunctions or when the door of one of these units is accidentally left open. The same concept for monitoring exit doors can also apply to doors for coolers and freezers to prevent spoilage. A cooler or freezer door monitored by the intrusion detection system can trigger an alert or chime to play in the area to remind an employee to close the door or to alert the store manager to the issue. While providing surveillance of the cash register area, the camera's video analytics can be used to trigger an alert in case the queue exceeds the pre-defined threshold Serving A Dual Purpose Retailers can use the metadata from the cameras to gather business statistics like counts of people entering the store While the technology solutions described above positively impact loss prevention in a retail store, they can also extend beyond security to improve health and safety and enhance customer service as well as customer engagement and sales. For example, while securing a store’s main entrance with IP cameras featuring on-board video analytics, retailers can use the metadata from the cameras to gather business statistics like counts of people entering the store. This data can help them understand peak days and times when making decisions about staffing. Or while providing surveillance of the cash register area, the camera's video analytics can also be used to trigger an alert in case the number of people in a queue exceeds the pre-defined threshold. At this point, the same public address system and loudspeakers used to play background music to enhance the shopping experience could be activated to broadcast a message to request another cash register to be opened, improving store operations. For security and loss prevention purposes, video analytics can also be used to ensure that no one enters or leaves the retail shop using the emergency exit. To address health and safety issues, these same cameras can also trigger an alarm if that emergency exit is blocked by an object – improving the safety of customers and employees. When systems are used to deliver data for purposes beyond security, other departments may be willing to contribute toward the cost Metadata generated by the cameras can also be used to gather information that when processed with sophisticated algorithms in the cloud can show trajectories of the paths that shoppers take as they travel throughout a store as well as heat maps indicating where they walk, stop and dwell – all while protecting the privacy of individual shoppers. This information can be used by merchandisers to evaluate the success of displays and store layouts, which directly impacts customer engagement and sales. When systems are used for and deliver data for purposes beyond security, other departments may be willing to contribute toward the cost of the system. This provides an added benefit by relieving some of the cost burden from security or other operational budgets. Product Selection Integration is becoming easier using standards and expanding industry partnerships. However, in some cases, choosing systems from a single vendor that are designed to work together can help to speed and simplify installation, while also reducing system costs for both the integrator and the user. Regardless of the products chosen, it will be important for a retailer with many locations to have consistency in the type of equipment installed at each site. This makes support easier and enables a more uniform response to incidents that happen at various stores. As many retailers already understand, there is no silver bullet to reducing loss. However, a combination of the right technologies working together to prevent shrink and improve investigative capabilities can result in smarter and more effective loss prevention.
Bosch Security Systems, Inc., Genetec Inc. “Genetec”, and SecureXperts have collaborated in the design and development of an IP video solution that is resilient against unauthorized access, malware, brute force cracking and other exploit techniques. It uses Credentialed High Assurance Video Encryption (CHAVE™) technology to provide highly secure identification and authentication through multi-factor smart card credentials. This makes it ideal for mission critical applications and infrastructure protection. Secure Communication Over The Internet While all Bosch IP cameras use a unique embedded Trusted Platform Module to ensure the highest data security, CHAVE™-enabled cameras add an extra layer of protection that meets Federal Information Processing Standard (FIPS) Publication 140-2 Level 3 certified encryption standards. Using techniques known as Public Key Infrastructure (PKI) and Transport Layer Security (TLS), CHAVE™-enabled cameras allow secure communications over the Internet and other untrusted network connections. CHAVE™-enabled systems leverage the use of federally mandated trusted smart cards (HSPD-12), and commercially issued smart cards for access to devices and to ensure live and recorded video is only accessible by a defined set of viewers. With support from SecureXperts, a security consulting and engineering firm that serves as the local registration agent for CHAVE™-enabled devices, cameras will ship to users pre-loaded with signed X.509 certificates. These unique certificates are used for authentication to ensure communication between trusted components and encryption to secure data. All cryptographic operations needed for encryption and authentication occur within the camera’s Trusted Platform Module, preventing unauthorized access to the certificate stored within the module. CHAVE Enabled IP Cameras Bosch will offer a range of CHAVE™-enabled IP cameras to fit a wide variety of imaging requirements and environmental conditions, including ruggedized pan-tilt-zoom cameras for extreme conditions, panoramic cameras for 360-degree surveillance, starlight cameras for low light environments, and more. Cameras will also come equipped with Intelligent Video Analytics to alert operators when predefined alarms are triggered, helping to enhance the physical security of critical applications. To provide customers with a complete IP video solution, the latest version of Genetec’s open-architecture, unified security platform, Security Center 5.4 is CHAVE™ enabled, supporting the use of smart cards and digital certificates. Users must authenticate with a unique smart card credential in order to gain access to Security Center and video from CHAVE™-enabled Bosch cameras. “Guidance from the National Institute of Standards and Technology and the U.S. Department of Homeland Security mandate the use of smart cards and multi-factor authentication for mission critical environments,” said Dan Reese, Director, Vertical Market Applications, Bosch Security Systems, Inc. “With our embedded Trusted Platform Module and certificate-based authentication, we have extended smart card technology into our cameras. Through our partnership with SecureXperts, Bosch is offering the first IP security cameras pre-loaded with U.S. federally-trusted PKI certificates. These cameras combined with CHAVE™-enabled Security Center from Genetec provide an IP video solution that maximises data security for critical applications. It’s a unique, powerful solution for customers concerned with the security of their video data and networks.” Enhanced Security Compliance For Enterprises “Genetec is pleased to collaborate with Bosch in our mutual commitment to ‘Security-of-Security’, as we harden our systems to any potential vulnerabilities between edge devices (cameras) and the Genetec Security Center VMS archiver--which manages, saves, and archives video data,” said Philippe Ouimette. “The new CHAVE™- enabled IP cameras from Bosch will help ensure that the front-end is as secure as the back-end, as video data is captured, managed, moved, and stored. These unmatched levels of authentication, encryption and authorization will help IT and security departments assure security-of-security compliance," added Ouimette. Security Center version 5.4 also offers the latest encryption standards such as TLS, AES-128, and RSA, which results in more secure communications between all Security Center client and server applications. To streamline multi-organization collaboration, organizations can leverage third-party claims services, including Microsoft Active Directory Federation Services, to manage Security Center users across organizations and domains. “SecureXperts has the good fortune to introduce this technology along with Bosch and Genetec to meet current and future cybersecurity technology requirements used in key critical infrastructure protection and mission essential environments,” says Darnell Washington, President/CEO of SecureXperts, Incorporated. “Our emphasis on maintaining highly secure environments for our partners, stakeholders, and clients has evolved into a leading edge technology solution that can provide secure surveillance using local, federated, or cloud hosted environments.”