Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalPhysical SecurityRetail/Restaurants/Convenience

Use technology to maintain assets and reduce shrink in retail

By Jim Kirby
Person using ATM

Image via Unsplash

November 4, 2024

Shoplifting rose an average 24% during the first half of 2024 compared to the same period last year, according to the Council on Criminal Justice’s (CCJ) Mid-Year Crime Report. This rise in theft is forcing retailers to take extraordinary measures to ensure products stay on shelves. Walk into a store in any major city in the United States and customers will find cleaning supplies under lock and key, plastic barricades around technology devices and signs stating, “You’re on camera.” Some states in the U.S. have gone so far as to push for new legislation to protect retailers from in-store theft. These growing security challenges require retailers take a fresh look at how technology can deliver the best experience possible for their customers while maintaining their assets and reducing shrink. 

Shrink isn’t shrinking

Legacy technologies to combat shrink due to theft — like magnetic security tags and security cameras — have helped retailers protect and control their inventory. But shrink continues to grow, according to a report from the National Retail Federation’s (NRF), which finds that inventory shrink increased by 13.2% between 2022 and 2023.  

As retailers combat inflation, changing consumer shopping habits, and more sophisticated theft threats, there’s a need for even more advanced solutions to protect the bottom line. One way to help reduce shrink is through transparent, near real time data on inventory and stock levels. Better access to data empowers managers to identify when and where shrink is occurring, and therefore better combat it. Like a doctor, the best prescription comes after an accurate diagnosis. Going from monthly or even annual inventory analysis to real time insights can dramatically improve visibility into a retailer’s current inventory. 

This is one of the many areas robotic technologies can make a significant impact. During store hours, robots can be deployed as a deterrent, providing additional security and monitoring. After hours, robots can provide real-time inventory tracking, reconciling sales with shrink and identifying areas of vulnerability within the store. 

Taking a bite out of theft 

It may be easy to imagine the potential impact of real time data when thinking about a big box retailer with large quantities of products on shelves and no expiration date. But food service retail chains are just as at risk of theft as big box retailers. Food waste and overserving can also eat into already thin profits. 

From employees being inconsistent with serving sizes, to misusing computer systems, to giving away product, humans introduce the potential for errors and variation into a quick-serve restaurant or food service operation’s inventory tracking. Often, the most important line of defense is technology adoption and ongoing employee training. Ensuring consistency in managing resources and using existing systems can help reduce the risk of human error or misjudgment.

Today, automating food preparation with robotics can help provide a more consistent and precise measurement of ingredients across kitchen operations — all while generating reliable data inputs for inventory management systems.

Consider this example from QSR chain Chipotle. The fast causal restaurant recently teamed with a food robotics company to help assemble bowls and salads, which comprise approximately 65% of digital orders. The automated system moves entrées below the restaurant’s counter, while Chipotle staff use the counter above to create burritos, tacos or quesadillas for the same digital order. The primary takeaway for visitors and other restaurants will likely be the elevated customer experience — these “cobots” offer greater order accuracy, and increased production capacity as well as more accurate inventory management.

Keeping track in the back

Theft can go beyond merchandise to the very tools a retailer uses to manage its inventory and warehousing operations. For example, the barcode scanners that are used to track inventory moving through its warehouses and along its supply chain are valuable and can be stolen or misplaced.

One way to help safeguard the technology and tools that a retailer uses for asset management is to secure them in a smart locker, where authorized employees scan their badge to open locker and retrieve the item, such as a scanner. The locker automatically records that it was checked out, by whom and at what time. Employees then scan their badge to open the locker again and return the item, which is again recorded and verified. The locker features a charger to recharge the scanner and prepare it for the next user.

This provides a chain of custody record for valuable technology, making theft far less likely and providing instant insight into employee access and usage.

Locking it up

Preventing theft is one of the oldest drivers of innovation. From lock and key to tags armed with RFID, retailers will continue to adopt new technologies to protect their valuable assets in inventory. And with NRF estimating that shrink is costing retailers $112.1 billion in losses, the next wave of technologies — like fleets of robots or intelligent lockers — is poised to have a massive positive impact on the bottom line. 

KEYWORDS: retail security retail shrink technology theft prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jim kirby headshot

Jim Kirby is the Vice President of Service Advantage at Ricoh USA, Inc. Image courtesy of Kirby 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • shopping mall

    Retail video surveillance can reduce violence and retail shrink

    See More
  • retail responsive default security

    Retail Inventory Shrink Increased to $45.2 Billion in 2015

    See More

Related Products

See More Products
  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • Physical-Layer-Security.gif

    Physical Layer Security in Wireless Communications

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing