Compare Your Reports People vs Alarms – VisiPlus

Checkpoint systems create reports for their towers (door pedestal alarm systems). Within these reports are drill downs of the quantity or alarms, which exit doors (if multiple exits within a location) and the time and date of all alarms.  Some of the more updated Checkpoint systems will break down the report by cause (failure to deactivate, test, false alarm) if it is enabled with user response codes.
Coincidentally, VisiPlus people counting systems create similar reports. The difference is instead of alarm activations like the Checkpoint Systems, the VisiPlus tracks customer counts within the store. There are breakdowns for days of the week as well as time of day.
Since both the VisiPlus reports and the Checkpoint systems reports are of similar metrics, it is easy to compare the two. When you have two independent sets of quantifiable data, you create a better picture of the overall well being of your business.
From a security standpoint, criminals often have spotted a store’s weak points before the stores do. They know when you are short handed and when you are fully staffed. They also know which employees are complacent and which ones are attentive. They prey on your weak points and take advantage of your blind eye for their own good- shoplifting.
If you see on your Checkpoint systems report that you have larger quantities of alarms during certain periods of time, compare it to your VisiPlus report. Do your people counting systems have a high traffic count or a low one? Compare to your sales for that hour.
High alarms plus high traffic and low sales can indicate inattentive employees and shoplifters making several trips in and out of your store (running up your traffic count).
High alarms plus low traffic and high sales can indicate inattentive employees because they are tied up with major sales transaction- again causing an open playing field for shoplifters. Look into increasing employees during this time frame.
By comparing your people counting systems against your alarm activations, you should be able to see the complete picture before you allowing you to make more necessary adjustments to your security to prevent shoplifting and theft.

Checkpoint systems create reports for their towers (door pedestal alarm systems). Within these reports are drill downs of the quantity or alarms, which exit doors (if multiple exits within a location) and the time and date of all alarms.  Some of the more updated Checkpoint systems will break down the report by cause (failure to deactivate, test, false alarm) if it is enabled with user response codes.

Coincidentally, VisiPlus people counting systems create similar reports. The difference is instead of alarm activations like the Checkpoint Systems, the VisiPlus tracks customer counts within the store. There are breakdowns for days of the week as well as time of day.

Since both the VisiPlus reports and the Checkpoint systems reports are of similar metrics, it is easy to compare the two. When you have two independent sets of quantifiable data, you create a better picture of the overall well being of your business.

From a security standpoint, criminals often have spotted a store’s weak points before the stores do. They know when you are short handed and when you are fully staffed. They also know which employees are complacent and which ones are attentive. They prey on your weak points and take advantage of your blind eye for their own good- shoplifting.

If you see on your Checkpoint systems report that you have larger quantities of alarms during certain periods of time, compare it to your VisiPlus report. Do your people counting systems have a high traffic count or a low one? Compare to your sales for that hour.

High alarms plus high traffic and low sales can indicate inattentive employees and shoplifters making several trips in and out of your store (running up your traffic count).

High alarms plus low traffic and high sales can indicate inattentive employees because they are tied up with major sales transaction- again causing an open playing field for shoplifters. Look into increasing employees during this time frame.

By comparing your people counting systems against your alarm activations, you should be able to see the complete picture before you allowing you to make more necessary adjustments to your security to prevent shoplifting and theft.

 

A Work In Progress- Checkpoint Labels

Checkpoint Labels are the primary form of source tagging used by companies like Checkpoint Systems. Source Tagging is when a vendor applies an EAS device for theft prevention during the manufacturing process. This frees up time and resources spent by the retailer to apply these anti theft devices, while maintaining a measurable standard for consistency and execution rates.
The added benefit of having Checkpoint Labels source tagged by the vendors is that these labels can be internally affixed. This means the label can be sewn into a garment or shoe lining or built into the product’s components, preventing any access to prematurely defeat the label. Checkpoint Labels can also be enclosed inside of the packaging where they would be harder to locate and remove.
Checkpoint Systems is working hard to get vendors and manufacturers to have source tagging available for retailers. They have taken the initiative to make source tagging an industry standard for a very wide range of merchandise.
Unlike in years past where retail businesses had to lead the charge, Checkpoint Systems is doing the work for you. As a small business, you no longer need to worry about spearheading the fight to get your vendors on board with source tagging.
Now, all you really need to do is to provide the Checkpoint Systems for your location. Next you can contact your specific vendors to see who can provide you with your inventory already source tagged. Since many of these vendors are already providing this service to other retailers, it should be an easier transition than it was even a few years ago.
Because Checkpoint Systems is doing the footwork for you, your business can better benefit from this work in progress.

Checkpoint Labels are the primary form of source tagging used by companies like Checkpoint Systems. Source Tagging is when a vendor applies an EAS device for theft prevention during the manufacturing process. This frees up time and resources spent by the retailer to apply these anti theft devices, while maintaining a measurable standard for consistency and execution rates.

The added benefit of having Checkpoint Labels source tagged by the vendors is that these labels can be internally affixed. This means the label can be sewn into a garment or shoe lining or built into the product’s components, preventing any access to prematurely defeat the label. Checkpoint Labels can also be enclosed inside of the packaging where they would be harder to locate and remove.

Checkpoint Systems is working hard to get vendors and manufacturers to have source tagging available for retailers. They have taken the initiative to make source tagging an industry standard for a very wide range of merchandise.

Unlike in years past where retail businesses had to lead the charge, Checkpoint Systems is doing the work for you. As a small business, you no longer need to worry about spearheading the fight to get your vendors on board with source tagging.

Now, all you really need to do is to provide the Checkpoint Systems for your location. Next you can contact your specific vendors to see who can provide you with your inventory already source tagged. Since many of these vendors are already providing this service to other retailers, it should be an easier transition than it was even a few years ago.

Because Checkpoint Systems is doing the footwork for you, your business can better benefit from this work in progress.

 

Current and Relevant – Library Theft Detection System

I was talking with one of my friends, who is a manager for a large city library. He was telling me how excited his library was to be installing a library theft detection system. He didn’t say if it was specifically Checkpoint Systems they were installing.

He was telling me about the relatively quick process that they were about to go through to make the changes. His entire library  would be converted to the library theft detection system in about five days. Considering how many thousands of books, catalogues, tapes, magazines and other equipment would be tagged for the library theft prevention.

The process is pretty simple. They would begin in one end of the library and systematically apply a tag or Checkpoint label to each item. The tags are a paper label that affrixes to the inside cover of the book or magazine, etc.

When a library patron comes to check out the books, the librian will go through their normal checkout process. At this time the library theft detection system label is deactivated so the alarm does not register on their way out.

When the patron checks the books back in, this same label is scanned and then reactivated for the alarm. The book is no longer checked out to that particular patron, is restocked to its shelf and the label is back in action for library theft prevention.

Visit the Loss Prevention Store to purchase Library Theft Detection System devices and your Electronic Article Surveillance or EAS system from Checkpoint Systems to stop inventory losses.

For more information on a Library Theft Detection System, Library Theft Prevention, or a Checkpoint System and how they can work with your Electronic Article Surveillance or Eas system contact us at Retail theft prevention to stop inventory losses in your library or call 1.770.426.0547