retail security

At the Checkout

Supermarkets battle shrink with innovative solution.

Like all retailers, Sainsbury's Supermarkets has realized the need for heightened in-store security to combat shrink. This popular chain's brand is built upon a rich 140-year history of providing customers with healthy, safe, fresh and tasty food, as well as clothing, general merchandise and pharmacy items. Quality and fair prices go hand-in-hand with a responsible approach to business.

Sainsbury's recently installed a holistic solution to fight theft. As the third largest food retailer in the United Kingdom, Sainsbury's recognizes that integrating solutions is the best way to address widespread shrink, which can significantly threaten food retailers' bottom lines.

One-Stop Security

All Sainsbury's stores installed superior electronic article surveillance. In 2007, after a thorough evaluation, Sainsbury began installing Checkpoint's Liberty/3G EAS systems. In doing so, it gained the benefits of working with a supplier that could offer solutions tailored to its security needs and serve as a one-stop shop for all of its shrink management solutions. In addition, Sainsbury's sought a high level of customer service.

Since then, Sainsbury's has beefed up its defenses by installing Checkpoint's Evolve EAS antennas to take advantage of the additional capabilities this newer technology provides. With the installation of a radio frequency-based EAS and deactivation equipment in more than 400 stores, Sainsbury's has increased its in-store product protection and expanded its ability to source tag merchandise.

Sainsbury's has found that Evolve S10 antennas provide muchneeded flexibility without compromising coverage. Each antenna can be mounted onto nearly any surface, such as glass, wood or metal, freeing up retail space for merchandising and sales. In addition, it provides an enhanced range of coverage of up to 2.1 meters to ensure full protection at store exits.

Combating Shrink

The shrink management system also enables increased capabilities for data analytics and reduces the number of false alarms, providing an enhanced customer shopping experience. It also provides a migration path to RFID when retailers are ready, which can lead to further benefits such as increased inventory visibility. "In-store protection is high on our agenda at Sainsbury's, so we decided to invest in this EAS program," said Marc Pilcher, central business partner at Sainsbury's retail profit protection. "It now allows us to pursue a wide-ranging source tagging program, which has some huge potential benefits. Source tagging means we can consistently protect our products and reduce the amount of time our colleagues have to spend securing the items; that's a double business benefit. By reducing shrinkage, it also will help us to keep prices low for our shoppers."

As a tested theft prevention technique, source tagging consumer products involves applying an EAS label during the manufacturing process. Without altering the product packaging or image, the security label is integrated directly into a product's labeling or packaging at the point of manufacture, meaning it arrives at the store shelf-ready from a security point of view. Applying the EAS tags at the source rather than in-store also means the staff is free to concentrate on delivering quality customer service to shoppers.

The Next Step

To complement its extensive EAS and source tagging programs, Sainsbury's is currently testing the range of Alpha two-alarm products. Alpha's solutions for high-theft merchandise include the latest threealarm technology on S3 Spider Wraps and Keepers. The technology enables Sainsbury to display merchandise securely in an open environment, allowing customers to easily access and purchase items.

With three-alarm technology, if someone tampers with the security packaging on a product, an alarm will sound. If a shoplifter attempts to leave the store without paying for the product, it also will trigger an alarm. Finally, if the shoplifter does manage to leave the store with the merchandise, an alarm on the product continues to sound, even after it is removed from the store, until it is deactivated. This provides a high level of security in stores and calls attention to stolen merchandise once it's on the street, often causing the thief to abandon the merchandise.

Open merchandising is proven to increase sales of items that otherwise would have to be locked and inaccessible to consumers. Studies have shown that if goods are inaccessible, shoppers are much less likely to purchase them. Sainsbury also is testing Checkpoint's mobile phones, satellite navigation systems and digital cameras to determine their benefits for future application.

"We take the threat of shoplifting very seriously, and anything we can do to reduce it is a top priority," Pilcher said. "Using advanced EAS technology is a proven means of protecting our goods."

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3