{"id":495,"date":"2020-04-23T15:47:33","date_gmt":"2020-04-23T15:47:33","guid":{"rendered":"http:\/\/www.klsecurity.com\/blog\/?p=495"},"modified":"2020-04-23T16:04:34","modified_gmt":"2020-04-23T16:04:34","slug":"march-networks-managing-loss-prevention-with-artificial-intelligence","status":"publish","type":"post","link":"https:\/\/www.klsecurity.com\/blog\/march-networks-managing-loss-prevention-with-artificial-intelligence\/","title":{"rendered":"March Networks: Managing Loss Prevention with Artificial Intelligence"},"content":{"rendered":"\n<p>By Shelley Swearingen &#8211; April 23, 2020<\/p>\n\n\n\n<p>We\u2019ve all seen a heist movie where the robber spray paints a security camera. His partners all rush in undetected to steal the money, jewels, high valued art, or priceless relic. Thanks to March Networks, these techniques are now antiquated. <\/p>\n\n\n\n<p>March Networks offers surveillance systems with cameras equipped with intelligent video. These systems are able to interpret what they see and trigger alarms accordingly. And unlike people, cameras don\u2019t sleep (gone are the days of the snoozing security guard). <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.klsecurity.com\/index.php\/march-networks-8-camera-package.html\"><img loading=\"lazy\" width=\"1024\" height=\"268\" src=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/cameras-with-logo-1024x268.jpg\" alt=\"\" class=\"wp-image-496\" srcset=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/cameras-with-logo-1024x268.jpg 1024w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/cameras-with-logo-300x79.jpg 300w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/cameras-with-logo-768x201.jpg 768w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/cameras-with-logo-1536x403.jpg 1536w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/cameras-with-logo-1200x315.jpg 1200w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/cameras-with-logo.jpg 1942w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>ME6\nCameras, the IR DuraBullet &amp; the IR Dome, record footage, evaluate the\nfootage, and sound alarms when necessary. For example, all of these situations\nwould trigger an alarm: <\/p>\n\n\n\n<ul><li>an\nobject is abandoned in one space for too long<\/li><li>a\nperson or object moves in the wrong direction<\/li><li>people\nloiter in an area for too long<\/li><li>a\nvehicle stays in an area for too long<\/li><li>a\nperson or vehicle enters a certain area<\/li><li>a\ncamera is tampered with <\/li><\/ul>\n\n\n\n<p>But what if you\u2019re not worried about the burglar in the black hoodie? For retail establishments, internal theft and shoplifting are bigger concerns. Surveillance cameras and accurate record keeping are the two best factors to prevent and minimize shrinkage.<sup>1 <\/sup>The integration of Searchlight software with March Networks surveillance systems make it easier than ever to identify instances of diversion.\u00a0 Searchlight software allows loss prevention associates to quickly &amp; easily search transactions to match the incident with the footage. This significantly cuts down on man hours spent on reviewing recordings to identify culprit(s). March Networks is even available to manage and maintain this solution with the help of certified partners. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"325\" src=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/TB-quote-and-storefront-1024x325.jpg\" alt=\"\" class=\"wp-image-498\" srcset=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/TB-quote-and-storefront-1024x325.jpg 1024w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/TB-quote-and-storefront-300x95.jpg 300w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/TB-quote-and-storefront-768x244.jpg 768w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/TB-quote-and-storefront-1200x381.jpg 1200w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/TB-quote-and-storefront.jpg 1413w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Cannabis\nentrepreneurs know just how important loss prevention is to a business plan.\nThe product these business grow, cultivate, test, transport, and sell is highly\nprofitable and easily sold on the black market. Furthermore, marijuana\nbusinesses are forced to do a large amount of their transactions in cash due to\nthe illegality of the substance federally. For these two reasons, experts\nsuggest investing in quality surveillance measures and storing cash and product\nin <a href=\"https:\/\/www.klsecurity.com\/products\/medical-marijuana-dea-storage\/medical-marijuana-modular-vaults.html\">cannabis\nsecurity vaults<\/a>.<sup>2<\/sup>\n<\/p>\n\n\n\n<p>The partnership of March Networks and KL Security takes diversion prevention one step further. These security experts have integrated artificially intelligent camera systems and Searchlight monitoring software with <a href=\"https:\/\/www.klsecurity.com\/products\/safes\/cash-management.html\">cash safes<\/a>. These smart safes offer bill validating, cash currency counting, cash management, and cash recycling. If your Smart Safe Point of Sale (SSPOS) unit reports a discrepancy, it\u2019s tied to the surveillance system and all guesswork is removed as to when\/where\/how the incident occurred.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/www.klsecurity.com\/index.php\/gunnebo-d11-secure-cash-deluxe.html\"><img loading=\"lazy\" src=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/gunnebo_securecash_deluxe-1024x1024.jpg\" alt=\"\" class=\"wp-image-499\" width=\"329\" height=\"329\" srcset=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/gunnebo_securecash_deluxe-1024x1024.jpg 1024w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/gunnebo_securecash_deluxe-300x300.jpg 300w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/gunnebo_securecash_deluxe-150x150.jpg 150w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/gunnebo_securecash_deluxe-768x768.jpg 768w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/gunnebo_securecash_deluxe-1536x1536.jpg 1536w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/gunnebo_securecash_deluxe-1200x1200.jpg 1200w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/04\/gunnebo_securecash_deluxe.jpg 1829w\" sizes=\"(max-width: 329px) 100vw, 329px\" \/><\/a><\/figure>\n\n\n\n<p>March Networks and KL Security are revolutionizing the way businesses prevent theft. This technology is sure to be seen as the gold standard for loss prevention going forward, known as Total Retail Coverage and <a href=\"http:\/\/www.thc360.com\">Total Harvest Coverage for Cannabis dispensaries and grow operations<\/a>. To discuss how we can assist your business shrink loss and grow profits, you can <em>reach out to a qualified expert at 866-867-0306 or <\/em><a href=\"mailto:contact@klsecurity.com\"><em>contact@klsecurity.com<\/em><\/a>.<\/p>\n\n\n\n<p class=\"has-background has-medium-font-size has-luminous-vivid-amber-background-color\">SearchLight &amp; Retail POS Software Integrations<\/p>\n\n\n\n<p><strong>Features<\/strong><\/p>\n\n\n\n<ul><li>Improve retail security and loss prevention efforts with Point of Sale      exception-based reports integrated with intelligent video<\/li><li>Oversee operations with video images from all of your business locations<\/li><li>Track and analyze customer behavior with people counting, queue length and dwell      time analytics<\/li><li>Receive      alerts about suspicious activity<\/li><\/ul>\n\n\n\n<p class=\"has-background has-medium-font-size has-luminous-vivid-amber-background-color\">Total Retail Coverage Security and loss prevention efforts<\/p>\n\n\n\n<p>From\nshoplifting to internal employee theft as well as organized retail crime, your\nprofits are affected. With Total Retail Coverage, retail business can utilize\nintelligent video that proactively alerts you to suspicious transactions and\nother potentially problematic activity in your retail stores. Searchlight\u2019s\npowerful combination of surveillance video, transaction data and analytics\nhelps you improve retail security and reduce losses. The software\u2019s business\nintelligence reporting tools also let you gather valuable data on employee\nbehavior and customer interests, information you can use to improve operations,\ncustomer service, marketing, and profitability.<\/p>\n\n\n\n<p>Information has been\ngathered from sources deemed reliable but not guaranteed and is subject to\nchange without notice.<\/p>\n\n\n\n<ol><li>Alstete,\nJeffrey (2006), \u201cInside advice on educating managers for preventing employee\ntheft\u201d, <em>International Journal of Retail &amp; Distribution Management<\/em>,\nVol. 34 No. 11 pp. 833-844<\/li><li>Helmer,\nJodi. November 12, 2019. <em>Cannabis Security: How Growers Can Prevent Internal\nTheft<\/em>. Cannabis Business Times. Retrieved from: <a href=\"https:\/\/www.cannabisbusinesstimes.com\/article\/prevent-employee-theft-cannabis-facility-industry\/\">https:\/\/www.cannabisbusinesstimes.com\/article\/prevent-employee-theft-cannabis-facility-industry\/<\/a><\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"<p>By Shelley Swearingen &#8211; April 23, 2020 We\u2019ve all seen a heist movie where the robber spray paints a security camera. His partners all rush in undetected to steal the money, jewels, high valued art, or priceless relic. Thanks to March Networks, these techniques are now antiquated. March Networks offers surveillance systems with cameras equipped &hellip; <a href=\"https:\/\/www.klsecurity.com\/blog\/march-networks-managing-loss-prevention-with-artificial-intelligence\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">March Networks: Managing Loss Prevention with Artificial Intelligence<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[143,211],"tags":[219,221,40,167,218,220,145,162,139],"_links":{"self":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/495"}],"collection":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/comments?post=495"}],"version-history":[{"count":2,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/495\/revisions"}],"predecessor-version":[{"id":501,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/495\/revisions\/501"}],"wp:attachment":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/media?parent=495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/categories?post=495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/tags?post=495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}