Enhancing the Customer Experience

Primary security mission is keeping stores safe and shrink low

Consumers’ expectations about their shopping experience at brickand- mortar, retail stores are changing. Mobile devices allow consumers to find any information they need with just a few clicks of a button, and this sense of immediacy has spread to how they shop.

In response, retailers are scrambling to meet these new demands, and innovations in technology have allowed them to start leveraging newer tactics to elevate retail performance and better meet customer needs. In many instances, it may surprise some to hear that these new “best practices” come from a non-traditional source—the loss prevention (LP) team.

Evolving Security Technologies

Keeping stores safe and shrink low has been and always will be a primary focus of security and LP teams, but retail security solutions have evolved to help make retailers smarter about how their store is operating. Security providers, technology manufacturers and integrators understand retail security solutions are now more comprehensive, and, when leveraged correctly, can help do much more. Store operations teams are turning to LP leads to determine how to use security solutions to understand traffic patterns and achieve better business goals.

For retailers, this means they can gain higher value and return on investment (ROI) on traditional security spends, which can mean a growing top line and a healthier bottom line. Below are some of the main developments in the industry that have prompted these changes, and have encouraged growth and better efficiency in areas where there previously may not have been:

Smart devices. Adding to the “anytime, anywhere” access customers have now come to expect, this increase in immediacy for transactions and in-store experiences has forced retailers to become smarter about how they help customers shop in-store. That’s where an integrated security solution can come into play and add value.

Video. Once thought of as only a security solution, it has now become a multiuse tool that can equip retailers with information to make decisions based on video analytics and shopper intelligence tools. This development has pushed the security industry into more of a partner role with merchandising and marketing, where all teams can use video to track shopper behaviors, dwell times and store shopping patterns, and then make alterations accordingly.

Mobility. Coupled with omni-channel retailing, the direction the retail industry is headed is pretty clear. One of the biggest impacts these trends have had on the retail industry is that customers are not always making decisions in the retail store itself.

The lines are blurring between brick-and-mortar, online and mobile shopping. For example, consumers are doing research on products they want to buy as they shop online and then may choose to go to a store to try out, try on or pick up in-store. If a specific product isn’t available when they arrive, they may become frustrated and choose not to purchase that item at all.

In order to keep customers happy, retailers can install effective inventory accuracy solutions, such as RFID, that can help provide item-level visibility of all items in a retail store’s inventory, from stock room to sales floor. Additionally, source tagging can help retailers keep track of merchandise from the beginning, since products are tagged right at the point of manufacture or packaging. By implementing source tagging and RFID along with other loss prevention methods, retailers are better equipped to solve both shrink and store performance challenges.

Mobile POS. Patterns have been altered, making it easier for customers to purchase products from anywhere in the store, and has created a security risk for retailers that wasn’t there before. Retailers want to make sure their products are tagged, but also need to provide their customers with the quickand- easy service they want.

A specific device that some retailers have started implementing is a mobile, handheld electronic article surveillance (EAS) deactivator that enables employees to easily deactivate Acousto- Magnetic (AM) EAS labels during the barcode scanning process. With buying patterns now more flexible, a store’s staff and technology solutions must follow suit. Having a way to deactivate anti-theft tags can enhance the mobile point-of-sale experience for the customers, and allow retailers to have security tags on important products.

The mobile trend hasn’t only been driven by consumers. Mobile devices have allowed the security teams at retail stores to maximize efficiencies by monitoring stores at any time, from any location. This changes the game for everybody in retail.

Data as Actionable Business Intelligence

All of these solutions provide retailers with data that is rich in information about their customers. While the collection of data is great, it comes down to how retailers can turn this wealth of data into actionable business intelligence.

To do so, some retail security teams have implemented cloud-hosted video or hosted access. These robust systems allow retailers to capture, save and export video segments that can offer key insight into specific issues like what time of day most incidents occur, whether employees are complying with corporate policies or if certain times of the day require more staff support. In the end, having more data is one thing, but turning that big data into insight that can help improve customer experiences and business operations relies on being highly efficient on how to store, access, disseminate and analyze it. The cloud makes that all possible.

Managing data and becoming more in tune with customer experiences and how to improve those experiences is a role shared by everybody involved in a retail store—from the loss prevention team to sales associates. Figuring out how to best use these newer technologies and understanding how data can turn into business intelligence is the key to success for any retailer.

It is safe to say that customers, retailers and technology are all getting smarter, moving faster and working more cohesively as the retail ecosystem continues to evolve; therefore, working with a security systems integrator can help determine which solutions make the most sense for a certain store or across an enterprise.

This article originally appeared in the September 2014 issue of Security Today.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.