Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video SurveillanceRetail/Restaurants/Convenience

5 Tactics to Consider When Tackling Retail Crime & Violence

By Wayne Forgesson
retail-enews
January 31, 2017

The recent trend within large retail store networks (Walmart, Costco and Target to name just a few) isn’t so much the latest fashion, but rather an increase in the number of violent crimes.

From shoplifting and holdups to carpark hit and runs, shoppers are putting pressure on Corporate Security Directors (CSD) to come up with new and innovative ways to make stores a safe place to shop.

So, what new gadgets and tactics can CSDs employ? Here the five we think are worth considering:


1. Enhance Video Quality
4K video offers four times the resolution as 1080p HD. This means you capture even more detail to better detect issues and identify what is happening more clearly. There is just one key issue: A 4K camera needs four times the storage and bandwidth as HD.

In order to transition to 4K video, you need to ensure you have the infrastructure and processing in place to handle it. According to an interview in Security: “End users would need to work with their security integrator to assess their entire system and work out a phased plan to upgrade.”

2. Analyze Big Data
Analyzing internal data sources can help security to ensure accuracy of inventory records and loss prevention.

In regards to video analytics, these days security are able to monitor figures such as traffic volumes, movement trends and motion patterns, resulting in operational intelligence that helps deploy staff and resources more effectively.

3. Smarter surveillance
According to Alan O’Herlihy, CEO of Everseen, “non-scans are eight times more frequent at self-checkout than they are at staffed checkouts.”

With self-checkouts are becoming more common, the addition of security cameras that pan, tilt and zoom can improve surveillance capabilities, particularly at POS locations.

It could mean the difference of being able to pinpoint a criminal’s tattoo or other such identifying features.

4. Remote monitoring
Using internet-connected surveillance cameras provides security personnel access to remote monitoring.

Remote monitoring allows security personnel to use a smartphone or tablet to monitor various surveillance cameras using a protected Wi-Fi network, while maintaining a physical presence at the location they’ve been assigned to.

5. Leverage open source intelligence
As the use of social media becomes more prevalent in everyday life, so does the need to monitor it.

Geo-fencing your retail stores and the surrounding area or community and monitoring relevant social media chatter provides security operation centers valuable insight and intelligence to feed into retail staff and security on the ground.
Tony Gray, Director at Tata Consultancy Services says “The internet, Youtube in particular, is awash with negative images of the Walmart customer experience… Is this happenstance or do retailers need to look to their social media operations as a key ingredient in fighting theft and making their stores safer?”

Conclusion

With retail crime and violence on the rise, it’s the perfect time to ensure you’re leveraging new technology and intelligence sources to protect your retail network’s staff, stores and stock.

Enhanced video surveillance, big data and the tools to make that data usable should be on your 2017 shopping list if you’re a Corporate Security Director responsible for a retail network.
 

KEYWORDS: big data retail theft security risk management video surveillance technology workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Wayne Forgesson, CEO of Signal, a leading real-time, operational-focused open source intelligence solution for corporate security.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Shopping Carts

    Study finds crime is causing retail workers to search for new roles

    See More
  • video feat

    UK Lost £603m to Retail Crime in 2014

    See More
  • cybersecurity-training-fp1170vdhn.jpg

    Tackling retail cybersecurity threats with human-centric behavioral change

    See More

Related Products

See More Products
  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • surveillance.jpg

    Surveillance, Privacy and Public Space

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing