retail chain integrated security solution v1 3
play

Retail Chain Integrated Security Solution V1.3 See Far , Go Further - PowerPoint PPT Presentation

Retail Chain Integrated Security Solution V1.3 See Far , Go Further Contents 1 Requirement Analysis 2 System Architecture 3 Solution Introduction 4 Representative Cases Vertical Requirement - Current Situation Traditional retail industry


  1. Retail Chain Integrated Security Solution V1.3 See Far , Go Further

  2. Contents 1 Requirement Analysis 2 System Architecture 3 Solution Introduction 4 Representative Cases

  3. Vertical Requirement - Current Situation Traditional retail industry is facing unprecedented difficulties: the decline of offline customer flow, the difficulty of customer transformation, the decline of profit, etc. with the rapid development of Internet, accelerating reversed transmission with entity retail enterprise started in the true sense of innovation, business model innovation of the formats. Customer Experience Business Operation Loss Prevention E-commerce Challenge High Manpower Cost

  4. Vertical Requirement - Market Analysis The critical success factor for any system is in proving to senior executives (i.e. key decision makers) that a physical security solution will provide a return on investment (ROI). This could be through: • Protecting the value of stock • Providing business intelligence • Improving efficiency The retail market has become data-driven in its analysis and choice of physical security equipment. For retailers, the “prosecution” element of any system is the least likely to provide a measurable return on investment, yet the most likely to change criminal’s behavior. All aspects of the physical security solution are becoming more centralized, including the decision-making process.

  5. Contents 1 Requirement Analysis 2 System Architecture 3 Solution Introduction 4 Representative Cases

  6. Solution Architecture - Key Stakeholders Business intelligence reports Marketing Manager and Central Management Teams that may have a mutual interest in aspects of the security system, for example in using analytics for business intelligence Chief HR Manager Employees access and attendance How to improve sales revenue? IT Manager Branches Networking and Central Increasingly important stakeholder in relation to Management security, but manages all IT-related systems System Construction and Maintenance Loss Prevention Manager 24h based video surveillance Each retailer can be structured uniquely, but with intelligent alarm to responsibility for the physical security solution provide loss prevention typically lies with a loss prevention department manager. Store Manager Store managers consider security as only one part of their overall role. How to reduce loss?

  7. Solution Architecture - Business Architecture Retail Solution Security and Employee Centralized Precision Loss Prevention Management Management Marketing Loss Prevention Stakeholders HR Manager IT Manager Marketing Manager Manager

  8. Solution Architecture - System Architecture Central Management Network Cable Other RS 485 Control Client HikCentral Decoder Servers Connection Cable LAN Switch NVR DeepinMind NVR POS NVR Alarm Panel Access Queue People Facial Recognition Sensors Magnetic Thermal POS Card Cameras HeatMap Facial Capture Cameras Button Terminal Detection Counting Terminal Reader Lock Security and Loss Prevention Employee Management Precision Marketing

  9. Contents 1 Requirement Analysis 2 System Architecture 3 Solution Introduction 4 Representative Cases

  10. Security and Loss Prevention - Business Architecture Security and Loss Prevention Intrusion VCA Video Warehouse fire POS text EAS linkage surveillance prevention overlay detection detection Scenario Shopping Area Warehouse Cashier desk Exit Shopping Area

  11. Security and Loss Prevention - Background Security technology in retail has three main Source of Inventory Shrinkage(Average Proportion) areas of focus against any given crime: before (prevention), during (policing) and Shoplifting/external (including ORC) 36.5 after (prosecution) the criminal act. Employee theft/internal 30 Administrative and paperwork error 21.3 Vendor fraud or error 5.4 Unknown loss 6.8 0 5 10 15 20 25 30 35 40 The average cost per shoplifting incident in 2017 is up  to $798.48. Dishonest employees account for an average of  $1,922.80 per act. * Source : National Retail Security Survey 2017, University Of Florida

  12. Security and Loss Prevention - Shopping Area - Video Surveillance One Store, One Camera Hikvision Fisheye cameras provide a 360 degree dead-corner-free surveillance. It is ideal for shopping areas to get a maximum monitoring view a and image quality insurance. x

  13. Security and Loss Prevention - Warehouse - Thermal Detection Worried about the safety of the stored goods? Warehouses and storage areas are often sought out by thieves, and even by employees on occasion. Besides, warehouse will likely have a higher sensitivity to fire safety. Hikvision Thermal cameras with advanced algorithm. The fire can be detected by temperature before it is too late. Thermal Camera Live View VMS Platform Alarm Notification Fire detection Detection area alarm Event Detection

  14. Security and Loss Prevention - Cashier Desk - POS Text Overlay Reduce fraud, identify employee theft and solve dispute efficiently. The video records with POS text overlaid provide more details of each transaction and it is easy for footage searching. This technology can be easily applied for solving clients dispute problems and preventing inside jobs. Now it supports video POS text overlay and platform keywords search. Three ways to connect POS-NVR and RS-232 POS machine: 1. Connect by RS-232 directly; 2. Connect through IO server ( MOXA ) , it will turn 232 signals into network signals; 3. Connect by using IP address. TCP/IP PC Client RS232 iVMS LAN 2. IO Server to switch RS232 to IP IO Server 3.IP Connection NVR/DVR 1.POS NVR - RS232 Connection Fraud and Dispute at cash desk POS Text Overlay

  15. Security and Loss Prevention - Exit - EAS Linkage with IPC No conclusive evidence to convict a shoplifter? Retailers report that shoplifting has a significant effect on their bottom line, stating that about 6% of all inventory disappears to shoplifters. Electronic article surveillance (EAS) is an effective method of inventory protection. By integrating it with Hikvision cameras, an image or video clip of the incident can be captured or recorded for retails to use it as the conclusive evidence and lower the shrinkage. Linkage Capture Picture or Event Recording Light-Fighter Camera Video Clip ! Alarm IO Input VMS Platform Capture EAS

  16. Security and Loss Prevention - Shopping Area - Intrusion detection Alarm panel is the useful device to protect the store by the application of various detectors in the store. The linkage between video and intrusion can be configured to record the event pictures and video. Monitoring Center HikCentral Other Servers Decoder Control Client Video Wall Network Cable RVV2*1.5 Connection Cable Switch MBUS Security Control Panel Security Control Panel Siren Keypad Keypad Siren MBUS output expander MBUS input expander MBUS Repeater Magnetic IP Camera Panic Wireless PIR Sensors Button Contact Receiver Video Surveillance Security Control Panel MBUS Security Control Panel

  17. Security and Loss Prevention - Shopping Area - Intrusion detection - Business Flow For different customers, the business of the system is different. The mobile app is the key tool to help the local engineers to check and acknowledge the real-time events. HQ Security Engineers Center: Device Management Parameters Configuration/Strategy Making Arm/Disarm Alarm Handle/Verification/Acknowledge Remote Control Etc. LAN/VPN Branch Security Manager Keypad Remote HikCentral App: Receive Alarm Alarm Acknowledge Panic Button PIR Detector … Branch Security Engineer Break-glass Detector Local: Arm/Disarm Emergency Magnetic Contact Remote Control Retail, Branch, ATM, Store, Building…

  18. Security and Loss Prevention - Shopping Area - VCA Detection Smart detection and provide the security at night Real-time alarm notification is crucial for a quick response and loss prevention when an event happened during off hours. The Hikvison devices support real-time intelligent alarm to help you make the store more safe. The most welcomed alarms are:  Motion detection  Line crossing  Intrusion detection Dark-Fighter Camera Video Clip Alarm Push VMS Platform Notification Event Detection Detection area Motion Detection Configuration

  19. Precision Marketing - Business Architecture Precision Marketing People Heat Queue Counting Map Detection Scenario Entrance Shopping Area Cashier desk

  20. Precision Marketing - Background Risk is very hard to quantify, specifically in tracking any return on investment (ROI) in regards to protection of people, such as in a terrorist event. Within retail, ROI with regards to the quantity and value of goods secured by preventing theft equates to the success of any particular security system. The critical success factors have been split into five categories: •ROI - Stock saved from theft •ROI - Additional benefits •Total cost of ownership •Operational efficiency and reliability •Technology issues Business intelligence (BI) is a broad category of applications and technologies for gathering, storing, analyzing, and providing access to data to help enterprise users make better business decisions. Store managers use BI to  Optimize Their Shelf Products  Improve Employee Performance  Forecast sale data, etc.

  21. Precision Marketing - Customer Recognition - Device Deployment Commodity Sale Area Entrance VIP Recognition /High Frequency Recognition Commodity Sale Area DS-2CD7X26G0 iDS-96XXNXI

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend