Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Retail/Restaurants/Convenience

Technology Makes a Difference

April 1, 2009
Security video now plays a greater role in retail and public spaces security. Cameras outside a facility and in parking lots and garages not only provide security but also can count cars and determine busy times.


It’s all about sales for retail operations.
     
And when it comes to the use of business intelligence as part of security systems, the winners use and the underperforming don’t.
     
A study “Loss Prevention and Beyond: Survival of the Fittest,” sponsored by ADT’s Sensormatic Retail Solutions, has uncovered some big differences between top retail performers – those whose sales growth outpace the three percent industry average – and retailers below that average. One is that top performers use business intelligence tools like returns and void management technologies 46 percent more than underperformers. Another is that nearly three times the number of top performing retailers use electronic article surveillance (EAS) technology as compared to underperformers.


Better Return on Investment

“Greater use of business intelligence tools has improved the efficiency of our other loss prevention technologies and delivered a strong return on investment,” said David George, vice president of asset protection for Harris Teeter. “Business intelligence solutions tied to our security video systems have enabled our operators and loss prevention teams to quickly identify and address both operational and loss prevention issues in each of our stores and across the entire chain. The end result is two-fold: improved shrink reduction and better performing store operations.”
     
The online survey was conducted by Retail Systems Research (RSR) during September and October 2008, including respondents from retailers with stores around the world. Among its findings:
  • Employee theft of goods and cash are top retailer concerns, with respondents ranking internal theft as their number one source of shrinkage, shoplifting as second, and internal theft of cash as third.
  • While almost half of the top performers use EAS to control shrink, only 17 percent of underperformers use EAS – despite all respondents ranking shoplifting as their second largest source of shrink.
  • Seventy-one percent of all respondents said they frequently use exception analysis reporting, a key business intelligence tool, as a critical technology in their loss prevention arsenal.
  • Fifty-three percent of all respondents cite better business intelligence as needed to make effective use of the vast amounts of loss prevention data that exists, especially from video surveillance systems.
According to the report, this discovery was consistent with many other findings that top performers don’t merely do the same things better compared to underperformers, but they also tend to do different things: “(They) think differently, plan differently and respond differently.”


Follow Through

In another example, the study found that while 39 percent of top performers audit employees’ adjustments to the quantity of goods on hand, only nine percent of underperformers do the same. The report concluded: “Even as these retailers are convinced their employees are stealing from them, they allow those employees to make adjustments to quantities on hand without even verifying what happened to the merchandise.”
     
“In tough economic times, shrink continues to rise,” said Paula Rosenblum, RSR’s managing director and widely recognized as one of the top analysts in the retail industry. “With the slowing economy many retailers have cut back on staff and now will be relying on technology to help control theft. Smart, winning retailers know the best way to maximize profitability and improve shrink is to leverage existing assets and improve store intelligence.”

A number of different studies have identified four ways that retail operations lose money. There is lost from sales associates and other employees. There is loss from shoplifting. And there are losses from vendors and just from bad bookkeeping.

Loss prevention executives and experts both agree that the recent economy may spur more losses from employees and shoplifters, While retail security has depended on a combination of technology and security officers, there is a shift to more intelligent security video systems and their integration with point-of-sales and other business systems. 

One of the outcomes is the ability of loss prevention to partner with the business to provide the operation with people counting and traffic analysis within the store.
     
For Security Magazine and SDM Magazine readers, a free copy of the 22-page report can be obtained by visiting the link below.


Links

  • Retail Systems Report

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Encryption Future - Security Magazine

    Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

    See More
  • cyber-data-protection.jpg

    The difference hardware encryption makes

    See More
  • Internet cloud network graphic

    SecDevOps vs DevSecOps: A distinction with a difference

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Physical Security and Safety: A Field Guide for the Practitioner

  • security book.jpg

    Security Investigations: A Professional’s Guide

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing