IP Cameras

• Avigilon cameras are built ready-to-integrate with third-party video management systems through broadly supported, open ONVIF protocols including Profile S, Profile T and ONVIF compliant extensions. This enables video surveillance interactions such as video streaming, two-way audio, digital I/O, motion detection, motion configuration, video analytics and events.

Read More

Access Control Manager (ACM) system

• Access Control Manager (ACM) system supports open-field hardware from various leading manufacturers, such as Mercury Security and HID GlobalTM. • Coupled with retrofit programs, this has the ability to leverage past hardware installations, so legacy investments won’t go to waste. • The ACMTM system supports integrations with a wide range of software and hardware […]

Read More

RFID Inventory Control Solutions

• Unlock real-time inventory management, asset tracking and advance reporting with the power of RFID technology, brought to you in partnership with Nordic ID. • Reliable and user-friendly RFID inventory management solutions and asset tracking devices help track a wide variety of assets. • Easy-to-integrate solutions help streamline inventory management, giving fast, reliable and a […]

Read More

CMatch AI

• The plug-and-play enterprise computer vision platform for facial recognition, feature matching, behavior analytics, people counting, health compliance and thermographic fever detection. • Built to perform in even the most demanding surveillance environments, CMatch AI technology is designed to quickly and accurately match against millions of subjects. • CMatch AI hardware and software are scalable […]

Read More

EAS & RFID Tags & Labels

• CONTROLTEK offers many AM, RF and RFID tags and labels to meet asset protection needs. • There are options for apparel, footwear, boxed and blister-packaged merchandise, sporting goods, wallets, eyewear, and many other product types.

Read More

TPJ 180 Program – Admitted Theft

• This module is an education rehabilitation program that addresses the widespread issue of employee dishonesty. The course provides business executives with a tool to efficiently and quickly respond to deviance using a proven method of changing behaviors – Cognitive Behavioral Therapy. • The program is voluntary for the offender and includes education and a […]

Read More

Technology Deployments

• Telaid’s Rapid Deployment solutions ensure that critical technologies including wireless networks, physical security technologies, POS, core network technologies and other hardware deployment plans and systems are fully functional and properly deployed on time and on budget.

Read More

Interactive Solutions

• Telaid can integrate audio, visual and supporting technologies to deliver a truly immersive, interactive customer experience.

Read More

Integrated Physical Security

• Fully integrated physical security systems now provide vital insight and data to areas across the business including operations, customer service and marketing. • Starting with key business objectives, Telaid can help develop a plan to achieve a fully unified physical security solution.

Read More

Cloud Services

• The Avigilon Cloud Services platform enables a modern cloud-connected user experience, accessible from a web browser. It lays the foundation for Avigilon Control Center (ACC) customers to connect to the cloud and take advantage of capabilities and features that provide centralized access across distributed systems.

Read More

Facial Recognition

• Avigilon cameras licensed for facial recognition have the ability to detect faces. ACC matches the face comparisons to identify potential matches against the watch list(s). If a match is found, the user is alerted through the Focus of Attention interface within ACC software, helping security personnel quickly determine if further action is necessary. • […]

Read More

Instakey Lock

• Makes theft harder by restricting locations and the key is not easily replicated.
• This technology also is a user-rekeyable lock, allowing for locks to be rekeyed at the master level.

Read More

DeltaLock Lock

• Makes theft harder by restricting locations and the key is not easily replicated.

Read More

Smart Sense Touch (Mounted Under Shelf)

• Active and Smart Sensor.
• Increases risk of theft by detecting merchandise interaction – alerts on unusual activity.
• Make any fixture “smart” – no special fixtures needed – no planogram changes needed.

Read More

Smart PVM (Mounted on Gondala)

• Increases risk of theft by showing potential shoplifters they are actively being monitored.
• Increased credibility by only switching to live camera view when product interaction is detected.
• Improved customer experience – display utilized for marketing/merchandising content.

Read More

Signage (Outdoor)

• The signage denotes the establishment’s use of ALTO’s Alliance technology.
• The signage is marketing that DETERS further criminal activity and ensures offenders learn the retailers using their Alliance technology must be avoided.

Read More

Signage (Indoor)

• The signage denotes the establishment’s use of ALTO’s Alliance technology.
• The signage is marketing that DETERS further criminal activity and ensures offenders learn the retailers using their Alliance technology
must be avoided.

Read More

Security Center

• Featuring integrations with IP cameras (various), access control, license plate recognition (Axis), radar technology (Axis), and other sensors (Indyme)
• Generates alerts to empower decision makers
• Triggers audio alerts in Zone 4 based on input from radar sensor

Read More

SmartDome Active-Deterrent System

• Detects long dwell times and alerts an associate with an audible.
• This technology increases RISK by making potential offenders more noticeable to associates

Read More

Scorpion Wireless Intelligent Security (SWIS)

• Utilizes wireless communication between the comfort zone and the handheld device.
• Upon departure of the comfort zone, the device will alert the offender and alarm.
• Tracking is enabled, along with remote monitoring, and device disabling.

Read More

Genesis

• The Genesis Wireless Security System uses a patented proximity detection technique based on using multiple frequencies and antennas to measure the distance from display to the security devices in any direction or orientation.
• Dta anlaytics is also available to the retailers providing insight into device traffic and usage by brand and model.
• A decrease in the REWARD is acknowledged by a potential offender through the device’s alarm when it leaves its designated bubble.

Read More

BricTECH

• This software acts as a benefit denial (persistent lock).
• The first layer of defense is in-store with an immediate lock and an audible triggered when the phone is removed from display.
• The second layer is a geo-fence which tracks the device out of the store, sends alerts, triggers a permanent audible and allows for tracking.
• This software survives hard reset/factory restore and bootloading.

Read More

Infant Formula Merchandiser

• Makes theft harder by limiting the availability of infant formula.
• Make theft riskier by increasing the amount of time necessary for stealing multiple items.
• Research: Large scale randomized controlled trial, ROI analysis.

Read More

Ground Pad Notification

• Helps retailers enhance the customer experience and improve store operations.
• Sends alert to store associate headset when shopper is standing on ground pad for pre-defined amount of time.

Read More

Fixed Facing Vending Shelf

• Restricts access to multiple items at once, thus deterring shelf sweeps.
• Vending format is obvious and may be easily understood by customers.

Read More

Spiral Anti-Sweep Hook

• Increases time needed to gather multiple items.
• Offenders dislike attention drawn by noise.
• Reports – Offender interviews at Gainesville Innovation Lab.

Read More

Blue Light

• This technology kills bacteria and can be used to deter drug use.

Read More

Serialized Returns Management

• IPC has 20+ years of validating returns for major retailers. Our proprietary solution manages returns to the specific retailer and to that retailers product return policy. • Captures purchase history • Eliminates Return Fraud • Validates returns based on out-of-policy, cross-retailer & purchase history • Tracks product, not people (PI laws are growing across […]

Read More

RFID Tracking

• IPC can manage product throughout the supply chain by serial # or by an assigned IPC# (unique identifier) • Product ownership in the supply chain • Inventory Management • Utilization of a RFID solution external to the POS system, or can be tied into the POS solution

Read More

Sonr Crossbar Shield

• Prevents sweep and theft for an entire row of facings on a shelf, open face gondola, or endcap.
• Lifting the shield initiates a warning beep.
• If shield is lifted for too long, the system alarms for a predetermined amount of time and then resets with no deactivation device.

Read More

Sonr Pusher

• Open security system keeps product accessible for customers.
• Functions the same as standard pusher systems but notifies retailers of shopper activity.
• A single beep if one item is removed. Multiple chirps if too many products are removed in a short amount of time.

Read More

Wire Hook Locks

• Versatile locking solution for merchandise.
• Robust lock that reduces the risk of theft.
• A customizable message can be included.

Read More

3000 Money Counter Scale

• Counts cash and coins
• Keeps a running tab on the currency and each count shows up on display
• Can be used to count coupons, ticket, and other non-cash items

Read More

Skim Reaper

• Used to determine whether a skimmer is present.
• Ordinarily, a card is read once. If a skimmer is present, the card is read twice and the reaper alerts with a red light.
• Can be used to test pumps, ATMs, and other POS devices.

Read More

Sign In

Register

Reset Password

Please enter your username or email address, you will receive a link to create a new password via email.