Stopping Theft in Its Tracks

Stopping Theft in Its Tracks

Increasing cost of technology requires line of defense

Stopping Theft in Its Tracks Increasing cost of technology requires line of defenseThe evolution of line security for handheld electronics in retail stores has been nothing short of amazing. When Scorpion Security Products launched its Scorpion security device, telecommunication and consumer electronics companies around the globe wanted the most unobtrusive, minimal security possible. If invisible security could have been provided, retailers would have jumped at the chance, especially those selling phones, tablets, computers and cameras.

Due to the increasing cost of these products and their amazing technology, the level of theft around the world has increased significantly. The loss has been so staggering that many retailers are now pleading for a highly-secure, bolt-down solution that the “cut-and-run” thieves will not be able to beat. These bolt-down versions are nice for interactions but are so secure that thieves are unable to loosen them.

Scorpion has been ahead of this trend during the last five years. It is only in the most recent year that more and more of these retailers are now requesting or specifying the highest level of security. They realize that having no products on display is far worse than not having a phone or tablet highly secured. After all, the day of holding the smartphone to your ear to see how the phone feels is fading fast. Shoppers still do it out of habit when able; however, when they cannot, they will know how to operate an iPhone or Android smartphone just fine.

Never Taken for Granted

It is important that security not be taken for granted so competing line security companies continue to look for advanced technology to bring better solutions to the market.

For example, Scorpion has recently partnered with a Netherlands- based company, SellMore, to create a new, RFID-driven, bolt-down security solution that is able to be removed at any time for showing customers or remerchandising departments.

Security companies that stay ahead of their competition look more at partnering with other technology-based companies to gain an advantage at securing these valuable products better than others. As business dictates, those that continuously evolve with assistance are far more likely to be successful than those that continue to create within and are not keeping up with the latest trends.

The Scorpion Difference

The difference with Scorpion products is that they were created with the sole purpose of securing handheld electronics. Most, if not all, of our competitors were securing many other products when the cellular boom took place in the early 1990s. This created a unique opportunity for Scorpion to create specific, product-driven solutions versus modifying current products to secure and properly merchandise cellular devices.

Just like in any business or purchasing decisions, quality should be the first priority; however, in many cases, the product purchased is far inferior to the required level of security. There are many companies that now provide and promote “quick fix” solutions to security needs, in which the supplier ends up explaining the poor quality of the product and reason for high theft versus explaining why their product is better, even at a little higher price.

There is no gray area when it comes to line security. To make sure shrinkage is kept to a minimum, it is important to invest in the line security products that will keep your products secured while providing a pleasant, end-user experience.

Levels of Security

There are various levels of security required in many retail locations. High-theft, large-traffic areas like New York City, Los Angeles or Chicago require the highest level of security available, like a bolt-down option or a pin and washer solution. The latter is a ?-inch-diameter, steel rod that cannot be cut but allows for the customer to pick up the phone or tablet from the display. There are also several levels of aircraft cable available that is extremely difficult to cut, providing an acceptable level of security while allowing the consumer to have full interaction with the product.

Medium and low-security areas, such as a mall kiosk that is staffed or a retail store with many associates, are less likely to need the highest level of security. These locations tend to use a standard mechanical product or even a hinged sensor, complete with an alarm system that provides a 100+ decibel alarm when cut or tampered with by a potential thief. These provide sufficient security and can be an excellent option for lower security areas.

Fool Proof Line Security

There have been solutions presented where a chip is placed under the battery or battery cover of a smart phone, with an RFID reader inside the store. If the product leaves its comfort zone, the alarm will sound. Great idea, right? NO. Little Johnny doesn’t know that the pretty, shiny phone lying on the counter is not his if there is nothing holding it in place. He picks it up and starts walking around the store; the alarm goes off every 10 seconds. A shopper’s worst nightmares come true. And, if thieves are willing to cut-and-run, this only allows them a quicker exit.

Line security needs to be fool proof enough that alarms are not sounding every five minutes. Most of us have been in stores where the alarms keep going off, and store personnel must stop what they are doing to go over and turn it off. False alarms turn your associates into police and your customers into suspects. This is not what line security is designed to do.

A combination of mechanical and electronic security prevents false alarms, since the phone, tablet or Phablet is physically secured to the alarm sensor; yet, many competitors simply do not provide this type of solution, causing major issues for retailers. Of course, everyone considers their product to be superior to others. Like the brand of car you drive, there are features and benefits to every brand, or in this case, line security supplier, that is more to the liking of the buyer.

Line security will continue to evolve, and there is good reason to believe someone will come up with a gimmick or technique that they will promote as the new highest level of security. However, everyone should always remember this: You cannot change the law of physics. Basic security of some type will always be required to keep honest people honest.

This article originally appeared in the April 2014 issue of Security Today.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities