Many Faces of Video

Protect assets, grow business during troubled times

As global economies struggle, theft and crime tend to increase. According to a National Retail Security Survey, retailers’ losses due to theft hit $41.6 billion last year, and almost half was from employee theft. These numbers are expected to rise in 2009 as a result of the current economic recession. Many companies, especially retailers, use video surveillance to help prevent loss. But can the technology do more? How can it be used to actually help grow the business?

Find More Theft ... Faster
Most retailers have video surveillance installed in their stores. Frequently, however, these systems become passive tools for documenting theft after it occurs, because no loss prevention investigator can be aware of all suspicious activity at all times. Thus, they’re often capturing footage but not catching the thief. Video analytics has offered a solution to solve this problem—using a computer to help the investigator monitor the store.

Traditional video analytics—using simple motiondetection algorithms—hasn’t proven valuable in busy retail environments. A simple motion-based alert on an expensive handbag or other high-theft merchandise will generate too many false alarms as people walk between the bag and the camera. At the same time, traditional DVR technology requires hours, or even days, to pull all of the video together to accurately document a case.

More recently, new video intelligence solutions have been developed to deal with these problems. Leading video analytics solutions can distinguish between people and merchandise movement and focus on truly suspicious activity, like a shelf wipeout. In addition, video intelligence solutions combine these analytics with tools that make it quick and easy for an investigator to track a suspect across cameras in a store, build an end-to-end evidence movie and export that evidence, along with case notes and mug shots, for sharing internally or with law enforcement. These same solutions marry the video with feeds from point-of-sale registers and customer service call buttons to simplify internal investigations. In this way, the video intelligence solution does more than just generate a list of alarms; it actually helps make every step in the theft identification/investigation process more effective and efficient.

In-store Intelligence
Shrink represents 2 to 4 percent of most retailers’ revenues. However, the latest video intelligence solutions offer opportunities for retailers to use existing video infrastructure to drive improvements in even bigger ticket line items—increasing top-line revenues and gross margins while helping curb payroll and marketing expenses. At the simplest level, remote access to video can allow headquarters staff to quickly and efficiently monitor procedural compliance, such as whether a display has been installed in time for a promotion.

Remote access to video helps companies trim travel budgets. With additional video intelligence layered in, retailers can make better business decisions with unique insight from in-store video intelligence. Video analytics monitoring cash register lineups can feed retailers scheduling information to better optimize staffing decisions. Intelligent video reporting on displays and shelf space throughout the store gives merchandisers early insight into when customer tastes might be turning away from a new product and provides buyers with additional leverage in their negotiations with suppliers.

Bringing it All Together
Security managers are aware of constantly changing technology. Whether it’s moving from analog to digital or Windows to Linux, the surveillance and security world is continually shifting. To protect existing investments, it’s important to consider backward-compatibility when purchasing new equipment. As retailers transition to new video surveillance technologies that help generate improved bottom-line results, they need to feel confident their existing DVR and camera investments are protected. Users should embrace solutions with a common interface so they may access the video at sites with the new equipment and continue with legacy equipment, helping ease the transition. It’s equally important to invest in products that are developed on an open or compatible architecture, so they can work with other solutions within the business without conflict. This is particularly relevant as organizations look to tighten security measures amid shrinking budgets.

Investing in a future-proof access control system, for example, paves the way for tie-ins to other security and non-security systems that are useful for managing costs and generating new revenue.

A large energy provider, for example, uses access control cards to monitor arrival and departure times for all contractors. Tying this data directly into their accounts payable system enables the firm to eliminate thousands of dollars in overcharges from contractors. Likewise, a large property management firm uses access control cards to accurately charge homeowners for gym memberships and parking usages.

Making Sense of it All
New technology is beneficial, but it also leaves companies to contend with a mountain of data. It’s easy to capture video footage or track door access. It’s how businesses apply this information that’s critical—choose solutions that make the data useful. Enhanced reporting and presentation capabilities in surveillance applications should be an important part of customers’ purchasing decisions.

The natural inclination of any business manager is to curb new technology purchases in the midst of a financial crisis. However, with internal and external theft increasing at alarming rates, organizations must be especially vigilant about protecting their assets and leveraging technology to improve the bottom line.

This article originally appeared in the issue of .

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities