Polaroid Cameras Stop POS Shrinkage As It Happens

Polaroid Cameras Stop POS Shrinkage As It Happens

Polaroid Cameras Stop POS Shrinkage As It Happens

Leveraging the new line of Polaroid surveillance cameras, with a 10-year warranty, retailers can not only record evidence for law enforcement, but can also stop incidents while they are occurring. Most retailers still have to search through their recorded video to catch an incident, and it can be extremely time-consuming to view video in a search to catch a clerk pilfering. Even in cases where the retailer has associated video and text for faster searches, the incident is still discovered after the fact.

“Retailers need to quit thinking of surveillance systems as simply repositories of what’s been seen and recorded, and instead, think of cameras as sensors in a system,” explained Allan Markoff, CEO of PRD International, manufacturer of Polaroid Professional Security Solutions. “Why should retailers search through recordings to locate an incident when they can stop it as it happens?”

There are a variety of ways that a Polaroid camera can add to its return on investment by acting like a sensor for the entire system with the help of video analytics to stop shrinkage incidents as they happen. Perhaps a retail jewelry store wants an alert whenever a certain object, such as a very expensive necklace in the front showcase, is moved. With a simple motion detector, if the necklace is moved, the system sends an alert in any manner that the store management wishes.

The system could also detect suspicious activity for immediate follow-up, such as people entering low-traffic areas that could be used for tag switching, and undue motion and out-of-hours activity around POS stations. At the changing room, the system can automatically compare what merchandise was carried into the changing room versus what is carried out.

Using Polaroid cameras as sensors, the system can quickly determine whether a person returning an item entered the store carrying that item. It works by detecting and tracking customers at entrances and customer service desks, and associating the two events. Such a solution only requires cameras at the store entrances and return counters, making it simpler than a more customary approach where the customer is tracked throughout the store (requiring many cameras and very reliable camera hand-off algorithms) and must be continuously monitored to determine whether items are picked up.

Another video application could target employees that ring up a “return transaction,” without a customer present. If so, the instant the return transaction occurs, the Polaroid camera looks for a customer and, seeing none, alerts management. Many organizations would like to better enforce a two-person rule for such types of transactions, and the system operates in the same manner. If two people aren’t present at the time of the transaction, an alert is instantly sent.

Besides catching incidents and helping the retailer immediately take action, Polaroid systems will also help the organization improve customer service at the registers. For instance, if company policy is to have no more than four customers in line, once the fifth customer queues up, the system sends an alert to the store manager to get another cashier at the station.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.