Retail Security


Verifone Expands Availability of Secure Commerce Architecture

Reduces merchant exposure to large-scale payment data breaches and expedites acceptance of EMV in the US market.

Making the Case

When budgets are tight, everyone in the organization gets more strategic in order to make the case for their share of the company’s resources.

The Rise of the Machines: M2M’s Role in Transforming Business and Security

The Rise of the Machines: M2M’s Role in Transforming Business and Security

Faced with tighter security requirements, enhanced regulatory pressure and heightened environmental concerns, businesses seek technologies that will improve overall business processes.

Amazon

Amazon's Loss Prevention Strategy Lands them in Court

Employees must stand in line, waiting to be screened before they are allowed to leave the premises.

Cutting-edge Surveillance

Declining crime rates in many major cities can be attributed in part to technological advancements that deter prospective criminals and bolster rapid response time when crime does occur.

Security Industry Grows in Kenya after Westgate Attack

Security Industry Grows in Kenya after Westgate Attack

The attack on the Westgate shopping mall has led to boosted business in the private security industry.

Enhancing the Customer Experience

Consumers’ expectations about their shopping experience at brickand- mortar, retail stores are changing. Mobile devices allow consumers to find any information they need with just a few clicks of a button, and this sense of immediacy has spread to how they shop.

Remote Eyes Integrates with Squirrel Systems

Loss prevention solution for hospitality users of Squirrel POS Software.



SecureNet Simplifies Payment Integration with Launch of Single Stack of APIs

Enhancements give developers access to a single stack of development-language-agnostic APIs for both card-present and card-not-present transactions, allowing for easier integration across all channels.

Preventing Consumer Data Breaches with Electronic Access Control

Preventing Consumer Data Breaches with Electronic Access Control

As retail continues to expand the scope of its security administration to prepare for security breaches, IT managers must extend down to the rack level.

Security Solutions Hone in on Needs of Small to Medium Size Businesses

Security Solutions Hone in on Needs of Small to Medium Size Businesses

Crime doesn't discriminate against size; small businesses are typically most vulnerable with fewer resources to guard against it.

Putting an LP Spin on Video Analytics

Putting an LP Spin on Video Analytics

Video analytics aren’t just tools for marketing and merchandising; these intelligent algorithms can also spot atypical customer behavior that might suggest potential loss activity when viewed by the Loss Prevention department.

Retail Checklist: 8 Tips for Secure Payments Processing

Retail Checklist: 8 Tips for Secure Payments Processing

When selecting a payment processor be sure to select one that has these characteristics to maintain secure data integrity.

Honeywell Announces Compatibility with Savant Systems Home Automation Equipment

Honeywell Announces Compatibility with Savant Systems Home Automation Equipment

Installation professionals can offer Savant connected-home capabilities to homeowners who use VISTA alarm panels.

Target Hack Affected 70 Million Customers

Target Hack Affected 70 Million Customers

As the result of recent research and investigation, Target Corp. has upped the number affected by the data breach during the holidays.

Zebra Acquires Hart for $94 Million

Zebra Acquires Hart for $94 Million

Zebra Technologies Corporation has acquired Hart Systems, a provider of cloud-based physical inventory management solutions, for approximately $94 million in cash, subject to applicable post-closing adjustments

40 Million Credit Card Accounts Breached at Target

40 Million Credit Card Accounts Breached at Target

What to do if you own one of the credit cards that have been accessed without your consent.

American Dynamics Introduces New Series of Cost Effective IP Cameras

American Dynamics Introduces New Series of Cost Effective IP Cameras

Illustra Flex Series Cameras provide high-performance features and excellent image quality to K-12 schools, retail, small banks and commercial applications.

Realizing the Advantages of Video Surveillance Storage and Management Solutions

Realizing the Advantages of Video Surveillance Storage and Management Solutions

Evaluating the needs of three types of organizations by analyzing their growth profiles, surveillance requirements and technology tolerance.

Considerations for Video Analytics in Retail

Considerations for Video Analytics in Retail

Investing in proper infrastructure and taking the time to understand how to use analytics empowers retailers.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3