Retail Security Goes High-Tech

Using the latest technology will be well worth the investment in the long run

MANY retail owners are not getting all they can out of their security systems. This is either because they are using outdated technology, they haven't been told how to use all of the features their systems possess or they simply do not have their systems set up in the best possible manner.

Following are a few tips on how to optimize a retail security system and get the most out of the system.

Purchase equipment featuring the latest technology. It is well worth the money spent to purchase the most up-to-date surveillance equipment. A few examples:

  • Access codes. In the past, surveillance equipment allowed employees with access codes to retrieve the same data as a store manager or owner. Today's access-code technology, however, allows owners to restrict specific information from employees using certain codes. For example, a store manager who was once able to access the surveillance camera in his or her own office can no longer do so.

  • Computer security. With a growing number of people becoming computer savvy, it is harder for retail owners to ensure the security of their surveillance system when they are using outdated technology. On the other hand, modern technology exists that allows for Windows® features, such as CTRL-ALT-DEL to be disarmed, thus avoiding system shutdowns by unauthorized people. This same technology can restrict Internet access, avoiding employee time spent surfing the Web when they should instead be taking stock.

  • Silent send. The technology used in today's DVRs allows for a "silent send" -- this is a copy of any information being downloaded to a back-up disk and sent to a designated area such as a file on the network main-frame. Retail owners now have the ability to record any backups being made by their employees.

  • DVRs. Modern DVRs include internal and external monitoring systems that will tell the retail owner or manager how many days of recording time are being stored on the DVR. They also can send an e-mail message to the store owner or manager if they are no longer receiving a signal from a surveillance camera, eliminating hours or even days, of lost footage.

Higher-resolution cameras. Megapixel cameras allow retail owners to capture license plate numbers of customers at their gas pumps and other details normally lost with standard cameras, which have only between 300 and 500 TV lines of resolution. PTZ cameras have to manually jump to location and optically zoom, plus they capture an image at 640 x 480 resolution and can only look in one direction at a time. Mega-pixel cameras, on the other hand, have resolution of 1,600 x 1,200 and greater. Because these cameras zoom digitally, the entire picture is intact and available, giving both detail on zoom and wide area shots when not zoomed. With megapixel cameras, there is no chance of losing the shot.

Have an overview shot. Set up at least one camera that monitors all aisles in the store. This footage is important not only for security purposes, but for liability purposes, as well. By having a clear view of the entire store, the store owner can avoid situations such as fake slips and falls where a customer finds an area that isn't captured on video and fakes a mishap.

Get a quality picture of each customer's face at his or her point of entry. Many times, retail surveillance systems are set up to grasp only an overview of the store. In such cases, potential thieves will become familiar with camera locations and take specific steps to ensure that the overview cameras do not capture a quality image of their face (i.e. by wearing baseball caps or keeping their bodies angled at a certain position). This creates an obvious problem when retail owners need to use surveillance videos as evidence in a court of law.

When retail owners capture a quality facial picture of each customer at the point of entry, they are then able to use overview shots as evidence against thieves, vandals and others based on clothing and other general descriptions from the point of entry and camera.

Integrate registers with cameras and DVRs. Recording the register area and coding the surveillance video when no-sale and void transactions occur, allows retail owners to quickly search for and review employee activity during these types of transactions. Combined with megapixel cameras, owners can then review the exact currency being handled by the employee, cutting back on friend discounts and outright theft.

Switch to broadband networks such as cable, DSL or T1 connections. Modems cannot handle the high-quality images being sent by modern surveillance cameras. Trying to use a modem for remote viewing is nearly impossible. When using a cable, DSL or T1 connection, store managers and owners can review employee activity from remote locations without losing photo quality.

Replace hubs with switches. The 10 MB transmittal speed of network hubs and the fact that hubs send data from each computer to all ports on the hub, can cause issues with the DVR recording IP cameras, while possibly causing delays in video speeds and network congestion.

In fact, hubs can create a 30- to 40-percent loss of video streaming on congested networks. By replacing hubs with switches, which create a virtual one-on-one connection from surveillance camera to DVR or from the DVR to the remote client, retail owners can increase video streaming from one to as many as 30 images per second, depending on network speed. Owners also may find that other internal software using the network increase in speed, as well.

Clean your DVR. DVRs are great collectors of dust and other environmental debris, which can greatly affect their output. In most environments, DVRs should be cleaned at least once a month. In some environments, however, where more particles are floating in the air, cleanings should be done as regularly as every three weeks.

In addition to cleaning the DVRs, retail owners should be careful where the DVRs are stored. Storing a DVR next to or close to high-amp electric lines will create lines and other disturbances in the recording. It also is important to make sure that DVRs have a proper amount of ventilation to ensure they are working at the optimum level of electronic efficiency.

Research suppliers. Not all equipment suppliers will provide retail owners with technical advice and customer service. In fact, some are happy to sell their equipment -- regardless of whether or not a specific product is the best-suited equipment for the surveillance environment -- and leave the retail owner to a trial-and-error process of learning how to use that equipment.

When a retail owner decides that he or shse is ready to update the surveillance system, they should contact several suppliers. An owner can even go so far as to ask if tech support will be provided, or if paid support will be made available as needed, and at what price.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”