Security Sales & Integration

July 2013

SSI serves security installing contractors providing systems and services; surveillance, access control, biometrics, fire alarm and home control/automation. Coverage in commercial and residential product applications, designs, techniques, operations.

Issue link: https://securitysales.epubxp.com/i/141570

Contents of this Issue

Navigation

Page 65 of 91

RETAIL TRENDS & OPPORTUNITIES "In a lot of these retail establishments we fnd that we have marketing and operations buying their video and integrating it with video content analytics," Andersen explains. "It's a completely separate budget and rollout from what loss prevention is doing because they have a very specifc need in mind and a specifc angle." Nonetheless, Andersen believes the tipping point is nearing when security providers will be able to commonly sell to internal stakeholders and realize an actual true partnership and cross-functionality where a single camera streams multiple views for multiple purposes. "When that is embraced then you are sharing the cost overall. Tat will start Retroft with your iPad. Te new Retroft Installations iPad app from Access Hardware Supply is a quantum leap in specifying hardware for door openings. Just download it for free through your iPad at the Apple Store (store.apple.com). Tis revolutionary app "asks" key questions and ofers choices that prompt you through door opening specifcations. Everything is there; just fll in the blanks or make selections as you go. When completed, data is sent to Access Hardware Supply for analysis. You will be informed exactly what you need and what it costs. You can even take and send reference photos through the app. Imagine: t/PTDSJCCMJOHTQFDTPOOPUFQBET t/PDPTUPWFSSVOT t/PXPOEFSJOHBCPVUIBSEXBSFDIPJDFT t/PNJTUBLFT It's almost as good as having an Access Hardware Supply Pro at the jobsite right there with you. And it's free. Download today and lose the paper and hassle! More information: blog.accesshardware.com R www.accesshardware.com 855.847.5691 www.securitysales.com/freeinfo/17225 64 / SECURITYSALES.COM / JULY 2013 to actually make some of those barriers to entry evaporate over time." Tat ability for all of an organization's stakeholders to leverage the investment is what makes retailers unique from other customers, says Guay. "If you are working at a Fortune 500, you don't want everyone to have access to all of the diferent systems," he says. "But in retail all of the stakeholders in the corporate ofce are supporting that tip of the spear, commerce optimization, and the video allows them to be present to see what is going on to validate what is supposed to be happening and to make adjustments with what should be happening." In updating its annual "Vertical Insights" global retail market report for 2012, research frm IHS found that retail organizations are increasingly migrating toward mobile POS. Some retailers are now replacing traditional checkout registers and assigning clerks to use portable computers to complete transactions. For example, the Apple Store, where no cash registers are to be found. Instead, employees scan the item's bar code with a specially outftted iPhone or iPad, swipe the customer's card and E-mails them a receipt. Te transaction can happen anywhere in the store. Near-Field Communications (NFC)-enabled smartphones are also expected to eventually gain in popularity in the United States to make purchases in a similar fashion. "Tis changes the way loss prevention managers have to think about stock loss, as putting an EAS tag onto items with a high loss rate doesn't work in this mobile world," says Paul Bremner, market research analyst with IHS' security services division. "I think we will see the emergence of RFID tagging in combination with EAS systems. EAS systems are very much ingrained into retail at this point." Indeed, at TycoIS' exhibit booth at the NRF conference, Sell pinpointed mobile POS as a major disruptor for traditional EAS systems. "If I buy something and I check it out on my own and it has an EAS tag, how do I deactivate it if I'm not going to the counter to deactivate," he says.

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Sales & Integration - July 2013