Ohio Grocer Uses Panasonic End-To-End Retail Solution

Independent grocers face a tough business environment. They are typically faced with severe competition from national chains, price erosion and rising overhead, not to mention business related issues of food spoilage, sourcing, employee matters and loss prevention.

To beat the odds in this tough environment, one independent business owner is using technology. John Troyer, co-owner and CEO of a family-run grocery market and food processing facility in Berlin, Ohio, has learned that, along with a sense of humor, an integrated technology solution can help handle many of the day-to-day issues.

His store, Troyer Country Market, has recently implemented a total end-to-end retail solution from Panasonic including Point-of-Sale (POS) workstations, scales/scanners, POS Printers, video surveillance cameras, network recording devices, digital signage and retail management software.

“Staying competitive today means more than just offering low prices or unique food specialties,” Troyer said. “It means ensuring that our back of store operations are efficient and effective and support a positive customer experience at checkout and throughout the store. Being able to automate and enhance these procedures and processes saves us time and money and helps us to stay on top of the game.”

Troyer Country Market opened for business in 2006 to promote their own line of goods, including their home-made dairy and meat products as well as canned goods. The venture proved highly successful and business grew quickly with local customers and out-of-towners through an electronic retail operation. But along with the success came the need for a more technically advanced retail system that would help them overcome the challenges associated with a growing business.

For guidance in selecting new equipment, Troyer turned to Terry Selkirk of Genesis POS Solutions. In addition to discussing equipment options, it was suggested that John consider a total solution that would be scalable, network-based and be capable of seamlessly integrating all systems from both the store and the adjacent warehouse and manufacturing facility.

“Over the years we looked at many POS packages, and the Panasonic solution blows the competition away on quality and price,” Troyer said. “I liked the idea of tying the POS system to a security system for a complete solution. You can get cutting edge electronics equipment that will increase efficiency and take your store to the next level.”

In particular, the Panasonic POS systems featured an all-in-one compact design, and the workstation’s open platform meant that John had the option of using whatever retail software best suited his needs.

Genesis POS Solutions did an on-site store evaluation and, with support from Panasonic, proposed a network-based system that included cameras for video surveillance, network recorders for recording and archiving the video, digital signage for in-store marketing, and a complete POS package including Panasonic’s Lite-ray workstations with card swipe terminals, as well as monitors, scanners and Aloha Data Systems’ retail management software package StoreTender.

Phase one of the project, which included provisioning the network and completing the installation of the video surveillance and POS system in the store, was completed by Genesis POS within budget and on time.

Phase two will include installation of the video surveillance system in the warehouse/manufacturing facility and integrating it with the store’s system. The head end of the system is located in the store office and from a PC, iPad or even his mobile phone, John can view crisp quality streaming video from any of the cameras.

He can also view any POS transaction complete with video, including time, date and specific cash terminal. And because the POS system is tied into the inventory control system, John has a more accurate picture of what items are moving and when to order more. The digital signage displays facing the customers upon checkout are also used to upsell customers in addition to promoting slow moving items, specials, seasonal announcements, greetings, etc.

“There are so many things about this system that I like,” John said. “It is tailored to our needs rather than being a cookie-cutter, one-size-fits-all solution. The equipment is easy to use and the staff was up to speed very quickly. We are moving customers much faster through the check out and there is improved management control of the store.”

“Business automation is the key to growth in today’s ultra-competitive food marketing industry,” said Kamal Boiri, senior manager, security and loss prevention products with Panasonic System Networks Company. “Panasonic understands the challenges that businesses face and we work to meet our customers’ expectations with end to end cutting edge solutions. Our Retail Solutions, including business communications, security and loss prevention and retail management, can help boost productivity through reliability, flexibility to adapt to tomorrow’s growth and a fair, affordable price.”

Panasonic’s feature-rich Retail Solutions are designed for stores of all sizes, providing the tools for owners and operators to improve productivity and keep an eye on their business from any location. A Retail Solutions package is scalable and fully customizable, offering a comprehensive POS solution with an innovative, integrated video surveillance system. The solution includes POS terminals, network cameras and displays, video recording technology powered by Quadrox WebCCTV and state of the art POS software developed with market leader Aloha Data Systems.

“The security cameras are so clear you can zoom in to take inventory from the office,” Troyer said. “Panasonic has gone above and beyond to make sure we have the system that is right for our store. I believe Panasonic is going to be the leader and pave the way for grocers and specialty markets of the future with their state-of-the-art technology.”

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.