New study on cash automation presents in-depth insights from retailers in 13 countries on technology which counts, validates and stores banknotes, and which is capable of fully automating cash management in stores
Retail Surveillance and Security
Retail surveillance using network video solutions such as IP cameras helps protect a retail business from theft and inventory shrinkage. It can deter crime, reducing losses and creates a safer environment for staff and customers. This versatile technology can make numerous other positive contributions to the store’s operations besides loss prevention. For example, it can help store owners manage queues, count people and monitor flow control. It can provide information to support the development of better store layouts - via heat mapping and dwell time applications. Outside the store itself, network video can be connected to access control systems, or used for general surveillance of the building’s exterior and parking lot.
Jul 17, 2018 Comments (0)
SolarWinds MSP has enhanced its SolarWinds Risk Intelligence offering with an Expanded Data Breach Risk Scan (ExDBRS), helping users better discover and identify risks from security vulnerabilities stored on endpoint devices, and enhancing regulatory compliance capabilities.
Jul 01, 2018 Comments (0)
Cyberbit Ltd., provider of cybersecurity simulation and IT/OT detection and response platforms, has released its SCADAShield OT security platform that provides enhanced asset discovery and visibility for operational technology (OT) networks.
Jul 01, 2018 Comments (0)
With the growth of card sales and proliferation of mobile EPOS card terminals, the opportunity for hackers to launch a cyberattack is dramatically increased, says Vodat International, the network security provider to the retail industry.
Jun 12, 2018 Comments (0)
Despite security being a top priority for mid-market businesses, over a quarter (28%) of companies expect to fall victim to a cyber-attack in 2018, according to the 'Mid-market IT priorities 2018' report by Node4.
85 per cent of organisations report they could not survive for longer than four weeks without mission critical IT systems, warns Databarracks
Jun 05, 2018 Comments (0)
Six weeks since the TSB crisis and new research from business continuity and disaster recovery provider, Databarracks, has revealed that 85 per cent of organisations say they would struggle to survive if there was a loss of mission critical IT systems for longer than a month.
May 21, 2018 Comments (0)
By Frank Krieger, Vice-President, Governance, Risk and Compliance, iland.
It isn't often that compliance specialists get to be the heroes of the story, but in the last four years as we've been preparing for the implementation of the GDPR, we've found ourselves more frequently in the spotlight.
May 17, 2018 Comments (0)
In the ongoing fight against ecommerce fraud, many tools, tactics, and technologies have been used by merchants and card issuing banks to stem the losses from chargebacks while at the same time facilitating online shopping's explosive growth over the last two decades.
Apr 23, 2018 Comments (0)
Toshiba Electronics Europe GmbH (TEE) has unveiled its 2018 line-up of internal hard disk drives (HDDs), which adds two new 3.5-inch HDD families: The S300 Surveillance Hard Drive designed specifically to meet the needs of the surveillance market and the V300 Video Streaming Hard Drive for reliable video recording, editing and streaming.
Apr 17, 2018 Comments (0)
Netscout Systems Inc., provider of service assurance, security, and business analytics, has announced a new Arbor TMS HD1000 DDoS mitigation solution that more than doubles mitigation capacity over the previous version, delivering a 40% reduction in the cost per gigabit of protection delivered..
Retail businesses need Retail Security to have their premises, stock, employees and customers protected in a safe and secure environment. Retail loss prevention is used by all types of retailers who are looking to reduce theft of goods and guard against loss of profit. Loss prevention can be through more traditional methods such as visible security measures in conjunction with technology such as CCTV and electronic sensor barriers.