Leveraging Technology to Solve Retail Asset Protection Challenges Mark Stinde- Sr. Director, Asset Protection January 3, 2012.

Slides:



Advertisements
Similar presentations
Leveraging an Integrated ERP and CRM System - Featuring Sage MAS 500 ERP and Sage SalesLogix CRM.
Advertisements

Exception Based Video Analytics Panda Restaurant Group Executive Director Loss Prevention Lyle Forcum Automated Analytics.
IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
XProtect ® Professional Efficient solutions for mid-sized installations.
TabWare Overview for NetSuite
Merit Consulting Terje Myrseth MUA – October 2008.
Eleven Food Stores. 1 Our Beginning The Convenience Concept Give the customers what they want, when and where they want it.
SECAM Systems Product Presentation SECAM Systems © 2010.
Continuing to Leverage Technology to Solve Retail Asset Protection Challenges Byron Smith – Corporate Asset Protection Manager October 2013.
LOSS PREVENTION AND RETURN ON INVESTMENT Point of Sale Software and Video Integration.
A Federated Approach to Systems Management Todd Nugent Mike Huffstatler Sr. Product Specialist Systems Engineer.
LOSS PREVENTION SOLUTIONS USING VIDEO ANALYTICS reduce shrinkage, protect profits A Bikal Distribution GKB Ltd Company © All Rights Reserved.
Experience, Technology and Focus in Mid Market CRM Soffront Asset management: An Overview.
Chapter 10: Auditing the Expenditure Cycle
Workload Management BMO Financial Group Case Study IRMAC, January 2008 Sorina Faur, Database Development Manager.
EDI Future Environment Initiative Project Kickoff 12/15/2004 Corporate Information Technology.
Planning the Audit Linking Audit procedures to Risk By
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
In an increasingly aggressive retail marketplace, protecting assets and combating loss is more imperative than ever for maintaining profits and a competitive.
System Center Operations Manager 2007 Dave Northey Microsoft Ireland.
1.Knowledge management 2.Online analytical processing 3. 4.Supply chain management 5.Data mining Which of the following is not a major application.
Competitive Differentiation: Using Technology to Deliver on Staples EASY Brand Promise Scott Floeck, Sr. Vice President, Staples, Inc.
M2M Cloud-based Platform M2M Market The total M2M connections will grow from 62 million in 2010 to 2.1 billion in 2020, with an annual rate of 36%. M2M.
Know the Difference™ ITIL Solution Martin Perlin Marketing Director, Evolven BOOST YOUR ITIL ® INITIATIVES Evolven Comparison assists in many ITIL v3 areas.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
DEVELOPING SUSTAINABLE ICT INFRASTRUCTURE. Start Feasibility assessment – Understanding our core business In 1998 it was clear that a disproportionate.
1 The Networked Transaction Environment. 2 Blackboard’s Product Strategy Leading institutions are wiring their campuses to connect people and resources.
Journey to a Real Time Enterprise
Security considerations for mobile devices in GoRTT
Zensar Technologies Analyst Meet March 26 th, 2007 Pune, India A CMMI Level 5 Company
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Purpose: These slides are for use with customers by the Microsoft Dynamics NAV sales force and partners. How to use: Add these slides to the core customer.
Profits, Right Before Your Eyes. Instant Image Verification.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Copyright 2014 Intel Corporation. All rights reserved. Taking Advantage of Digital Security & Surveillance January 2014.
HRM Human Resource management. HRM Class Emphasis Show “best-in-class” HRM practices Understand how HRM practices support business strategy How to use,
PTGC Part Time General Counsel Prepared for:. The Concept Having a high caliber, senior level “legal insider” on location part-time, compared to the outside.
Case Study: How Web Technology Facilitated Implementation of a Business Plan NAPEO 2004 Presented by: Dan Danzig, VP Marketing SpectrumHR, LLC.
C r e a t i n g S o l u t i o n s B u i l d i n g C a r e e r s Lee Bramman NCR Corporation January 26, 2006.
 The mission of the Human Resources Department is to safeguard the employee’s best interest, as they are Garrison’s most valuable asset, and without.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Company Confidential Leverage Your E-Business Suite as Part of Your Sales Performance Management Strategy January 17, 2008.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
SMARTER. TOGETHER. The Mobility of Fraud Michael Loox, CFI Director of Loss Prevention & Safety Coffee Bean and Tea Leaf David Johnston.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
Embedded PowerPoint Video By PresenterMedia.com Wild, Wacky & Out of the Box Ways to Deliver Loss Prevention Awareness & Highly Effective Investigations.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
One of the fastest growing international software companies Managing more than 3 Million desktops and 600 thousand servers Presence in 19 countries; More.
Empowering Your Business Infrastructure CORPORATE PROFILE PRESENTATION.
Anytime, Anywhere Access Benefits Functionality Work Order Administration Dispatch Work Order Work Order Details New Work Order Additional Functionality.
A Brief Introduction Radiant Pay, a global provider of payment processing services to all kinds of business, Radiant Pay Services.
OFFICE OF INNOVATION & TECHNOLOGY CITY OF PHILADELPHIA Innovation & Technology Status Update Adel W. EbeidCity of Philadelphia, Office of Innovation &
Loss Prevention, Auditing & Safety Conference 2009 Title Sponsor:
Scales Technology FZCO
WHY VIDEO SURVELLIANCE
Best Practices Consortium
Chapter 19: Network Management
Managed Services.
Outsourcing: The Brinker Experience
ServiceNow Implementation Knowledge Management
The New Technology Frontier
Transforming IT Management
Organisation Model Assistant Director: IT & Digital
Week Thirteen – CAATs & Continuous Auditing
League of Arizona Cities and Towns
Automating Profitable Growth™
IBM Global Financing IBM Asset Recovery Solutions
WHY VIDEO SURVELLIANCE
GRC - A Strategic Approach
Capitalize on Your Business’s Technology
Presentation transcript:

Leveraging Technology to Solve Retail Asset Protection Challenges Mark Stinde- Sr. Director, Asset Protection January 3, 2012

Session Agenda Overview of 7-Eleven Asset Protection Challenges at 7-Eleven In-Flight Technology Solutions for Asset Protection Integration of Solutions to Maximize Systems Building Infrastructure that Supports both the Current and Future Needs of the Business Questions

3 7-Eleven – World’s Largest Convenience Retailer 40,000 Stores Worldwide Operating in 16 Countries Worldwide Revenue $62.5 Billion Over 7,000 Stores U.S. and Canada Predominately Franchised

Asset Protection- Overview 2010 Strengths Robbery Prevention Programs Response to theft and fraud Incident Management/Loss Recovery Opportunities Reactive versus Proactive Event Driven Respond and Report Limited Technology Data Mining inefficient and ineffective Case Management non-existent Significant theft, fraud in the stores Safety/Risk Management Limited resources in Asset Protection Transition from Corporate to Franchise Respond and Report Critical Incidents Theft and Fraud Focus Reactive Approach SME on all areas of Asset Protection Business Leaders Strong Business Acumen Leveraging Technology and Data Proactive Approach CurrentBest in Class

Revenue/ Profit Assurance Inventory Variation Control Incidents and Investigations Safety and AP Awareness Asset Protection Team Asset Protection Core Strategy

7-Eleven Franchise System- Partnership Franchisee Initial Franchise Fee Labor Expenses Payroll Workers Compensation Insurance Maintenance (Some) Inventory Shortage 7-Eleven Own the location or hold the lease Responsible for most of the occupancy costs Utilities Maintenance Expense (Most) General Liability Expense Marketing/Brand Finance Inventory Shared Merchandise Write-offs Gross Profit *** Franchisee can purchase up to 15% of their merchandise from Non-Recommended Vendor

Talent Investment Investigations Field AP Specialists Exception Based Reporting Exception Reporting Fraud Management System Integration Case Management System Case Management “Cradle to Grave” Resolution Asset Recovery System Integration Networked In-Store Video DVR Technology in all Stores Networked for Remote Access System Integration The utilization of Video Analytics In Flight Technology Solutions

1) Transaction activity captured in the POS T-Log is sent from the store’s ISP to the HP Data Center. 2) The POS T-Log is captured in an unedited form and sent along with other data feeds (21 in total) to the “Secure” Exception Based Reporting tool. Some feeds are also sent to APIS. 3) The “Secure” EBR tool (SaaS) collects data & flags potential fraud or other risk conditions based on the criteria established by the AP team. 4) The video is networked at the store and is called up for exceptions identified in the Secure Tool. Video evidence can be stored in either Secure or APIS as digital evidence. 5) When a condition of concern is identified a ticket is logged in the Case Management tool (SaaS) with the associated data from the EBR tool. 6) The Asset Protection Field Manager accesses both systems via the web and manages the investigation information and results. The Asset Protection System Data Center Asset Protection Team

Investigators have an overview of system activity, quick links to reports and system configuration The portal is customized for each user’s or role requirements The Secure Portal

Secure Questions Automated queries are created to monitor specific fraud risk areas are saved in the system to process data

Secure Investigations Results of Saved questions are fed into the Investigation Center where investigators can review suspect transactions

Secure Transaction Viewer Transaction viewer will have access to details such as: Receipt View Tlog Audit View Store Sequence CCTV footage Users can drill into the investigation results to see the details of specific transactions which have been flagged by the system.

Infrastructure to Support the Future In considering all of our technology solutions, we are balancing our current needs with those of the future. How flexible is the solution, and can it accommodate future needs? Is the provider committed to further development of their solution? Can the solution continue to support our needs as we grow in store count and scale? Can the solution easily integrate with other solutions that are currently in place or may be added?

Front Door Path Analysis

Front Door Pay & Leave

Arlington Advanced ATM Path

Arlington - People Count

Questions