Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Top Guard and Security Officer CompaniesSecurity Enterprise ServicesSecurity Leadership and ManagementAccess ManagementIdentity ManagementPhysical SecurityVideo SurveillanceRetail/Restaurants/Convenience

Boosting Safety and Operations at Panda Express

Panda Express
Lyle Forcum
Lyle Forcum, Executive Director of Asset Protection at Panda Restaurant Group, parent company of Panda Express
Panda Express
Lyle Forcum
May 5, 2020
Since its opening in 1983, Panda Express has steadily grown throughout the United States and 10 other countries. Today, with more than 2,200 locations worldwide and 41,000 associates, it is America’s largest family-owned and operated Asian dining concept.

As a food service leader that prides itself on its variety of quality Chinese-cuisine-inspired dishes, Panda Express has always looked to excel internally as well, by building a strong company culture and a passionate team to stand behind the brand. From the beginning, Panda has always had high expectations for delivering best-in-class results. At one point, these results were being challenged by losses at the point of sale (POS) and growing false alarm penalties.

Panda store managers faced continuous distractions from false alarms, receiving calls from the legacy alarm company at all hours of the night and incurring fines from local law enforcement for needless police dispatches. “When an alarm went off overnight, our managers would always err on the side of the caution, send police in, or go in themselves. That was dangerous in itself if there was actually a burglary happening inside the store,” says Lyle Forcum, Executive Director of Asset Protection at Panda Restaurant Group, parent company of Panda Express. “Additionally, we were losing significant amounts of money on false alarm charges.”

Panda required a solution that would involve advanced technology to dramatically decrease shrink and resolve security inadequacies.

Panda turned to Interface Security Systems, a provider of managed network, asset protection and business intelligence solutions for a customized solution. First, to address the false alarm challenge, Interface installed an IP Interactive Monitoring system with live video and two-way audio, which offers a virtual, guard-like level of protection in every Panda location. Operators in the Interface monitoring center instantly verify any alarm from a Panda store with live streaming video, eliminating false alarms.

“What Interface offered us was eyes on target,” says Forcum. “They can look through the cameras and see what's going on. We gave them the rules of engagement to basically make the decision whether to call the police or not, and only at the very end, call the store contact as the last resort.”

Forcum continues that Interface’s solution offers Panda the flexibility to graduate the security levels from areas of lower crime to areas of higher crime rates. “We were able to gradually increase the security level, based on the threat and if the business was in a higher crime location,” he says. “We have what's called voice down, where the employee can call up to Interface, unbeknownst to anybody, and request help. The security professional can immediately look through those cameras, see what the disturbance is, and as a security professional, assess the disturbance. It removes the need for the General Managers to address the situation themselves and put themselves in harm's way. Plus, it puts the onus on a security professional, where it belongs. The solution has been a big force multiplier for Panda. Virtual Guard is a great alternative, because in the immediate sense, you're going to have a security professional on the other end of the line to talk you through a situation. We also have suppliers that sometimes come late at night and have an option of actually taking a Virtual Guard in and out of that store. They really like that Virtual Guard Remote Escort option when it's two in the morning, and they’re making a delivery of food or supplies to the Panda location and/or if that Panda location is in a higher crime area. The solution takes that threat away.”

Panda had also implemented a customized, exception-based POS reporting system, which notifies Panda management whenever a suspicious transaction takes place at the register. Interface took the tool a step further by integrating it with the video surveillance and alarm systems at each of the Panda locations, allowing management to immediately connect to the video of any problematic transaction. The solution enables loss prevention professionals to quickly identify anomalies and prevent shrink. Top offenders from thousands of employees doing millions of transactions can easily be bubbled up to the top. The combination of business intelligence and video surveillance resulted in a massive reduction in shrink and cash shortage at the register.

“This system helps on several levels,” says Forcum. “First, it assists in the training of our cashiers, since every exception is pointed out in a subsequent format. Second, it allows the GM or Manager to know what's going on when they're not actually in the store.”

With Interface, Panda has experienced vast improvements in security for its associates, customers and assets. “With the remote monitoring system Interface put in place, we have virtually eliminated those wasteful costs of false alarms charges, which were significant over the years,” says Forcum. “Since Panda hired me 12 years ago, and we’ve put these new solutions into play, we've had significant decreases in all our external and internal crime and the POS solutions have also resulted in more effective training, significant financial savings and better customer service in the end.”

Forcum reports that Panda is saving more than $100,000 per year in false alarm fees and thousands of dollars per month per store in reduced shrink at the POS. The business intelligence provided allows for focused tracking and improved store operations, including people development, store performance data comparison, optimized store efficiencies, monitored intrusion data and cash tracking. Panda and Interface have successfully partnered to create a potent security and loss prevention tool in the Quick Service Restaurant space.
KEYWORDS: asset protection retail crime retail safety retail security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • City of Mississippi from above

    Boosting safety and efficiency: New VMS enhances Mississippi security

    See More
  • Panda restaurant outside

    Panda Restaurants Adds Business Intelligence Technology to 1,960 Stores

    See More
  • linda marie arrendondo

    Linda Marie Arredondo Named Chief Information Officer at Express Employment Professionals

    See More

Related Products

See More Products
  • operations center.jpg

    Security Operations Center Guidebook

  • highriseproductphoto

    High-Rise Security and Fire Life Safety, 3rd edition

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products

Events

View AllSubmit An Event
  • April 16, 2025

    Modernizing GSOC Operations: Ensuring Full Control and Complete Situational Awareness

    ON DEMAND: For many organizations, physical security management can be a daunting task. Threats are on the rise and risks are becoming increasingly diverse. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing