Upload
mick-prendergast
View
35
Download
2
Embed Size (px)
Citation preview
1
OverviewMay 2016
Transpeye
Activity Management Solution
“Reveal the Risk”
2Confidential – Provided Under NDA
Agenda
• Principals• Problem space• Architecture• Demo• Loss prevention made simple• Deployment options – Till data• Deployment options – Cameras• Product offering• What makes SilverStar Analytics unique• Platform advantages• Route to markets
3Confidential – Provided Under NDA
User activity management
Cloud platform
Business Intelligence Policy Violations Fraud / Theft Advanced
AnalyticsIrrefutable Visual
Evidence
4Confidential – Provided Under NDA
The insider problem
5Confidential – Provided Under NDA
UK Retail Fraud Survey
National Retail Security Survey
U.S. Retail Fraud Survey 2013
52% of total UK retail sector - 43,000 physical stores and a combined turnover of £148 Billion - 2014Shrinkage increased by over 22.2% in 2014, rising from 0.9% of sales last year to 1.1% Theft or fraud by employees closely follows this with 33%, which has also seen an increase by 6% since last year
Industry reports
U.S. retailers lose an average of 1.3% of sales, $54 billion per yearEmployee theft is the largest area accounting for 37% of total shrinkA high of 1.8% of sales for small-format retailers, down to 0.9% for large-format specialty, hospitality and leisure retailers.
US retailers lost more than $34 billion to theft in 2011Theft as a percentage of revenue was 1.41% Employee theft still constitutes the largest majority of losses at 43.9%
Retail Fraud Survey 2014
One out of every 39.5 employees was apprehended for theft Survey participants apprehended 78,085 dishonest employees in 2013, up 6.5% from 2012On a per case average, dishonest employees steal 5.4 times the amount stolen by shoplifters
6Confidential – Provided Under NDA
Retailers of all sizes face similar insider threats
Large Retailers• Large corporate function• Sophisticated systems• Strong processes• Dedicated loss prevention
staff but adhoc system> 300 Stores
< 300 Stores
< 10 Stores
Medium Retailers• Limited corporate function• Basic systems• Weak processes• Little loss prevention focus
Small Retailers• No corporate function• Adhoc systems• Adhoc processes• No loss prevention focus
• Exactly the same threats as large retailers
• Challenged by cost and complexity
• Limited by resources• Need simple loss
prevention
7Confidential – Provided Under NDA
Cash register manipulation
Cash Register Manipulation
Employee
Refund Loyalty CardsDiscount Manual Price
AdjustmentLine Item
Void Low ValueZero Value Cash TheftLong Duration
Earlier of the day sale
Fake refund details
Repeat of genuine
To cash or card
Cancel/voided sales
Manager override
No sale
Employee discount
Excessive discount
Price overrides
Customer collusion
Repeated use
Stealing points
Customer collusion
Multiple voids
Last item void
Most expensive item
Excessive low value
Customer collusion
Replaces high value items
Modified after customer interaction
Cash draw left open
With draw of cash before/after transaction manipulation
Cash draw opened
High reductions
Excessive reductions
Same item
High value
80% of r
etail
fraud is
at
the poin
t of
sale
8Confidential – Provided Under NDA
Surveillance at the point of sale
Make smarter operations decisions
Visual evidence of operationsStaff and customer behaviourMonitor and optimize Remote accessReal time and historical data
Remotely monitor
Access from anywhere using any deviceReal time alerts for policy violations
Access to irrefutable visual evidence
Detect cashier-related shrinkageTracks suspect patterns and behaviour Unauthorized discounts, manually entered values, no sales or voids
POS exception reporting with video
Discover how often and to what extent your business rules
are violated, by whom, and the impact on your bottom line
Staff productivity and training
9Confidential – Provided Under NDA
Number of point of sale devices - 2009
> 200 Stores
Global Total
25.8
M
6.7
M
EU
5.9
M
NA
Brazil2.
3 M
Turke
ySp
ain
Italy
France
1.7
M
1.3
M
1.1
M
1.1
M
UK1.
0 M
25 Million
7 Million
6 Million
2 Million
1 Million
Source: World BankNote: Excludes China
10Confidential – Provided Under NDA
Transpeye solution3 key pillars to the solution
Advanced Data
Analytics
Modern Cloud Platform
Irrefutable Visual
Evidence from CCTV
integration
11Confidential – Provided Under NDA
Passive to active surveillance Data Analytics
Takes events from a wide range of systemse.g. epos, access control, cash countingDetermines policy violations and ‘outliers’ to normal Raises weighted alerts for investigation
Irrefutable Visual EvidenceUses stored video at the ‘edge’ Retrieves clips of video from appropriate camerasUses storage and network resources efficientlyFinds the 0.5% of valuable CCTV footage
User Activity ManagementBaselines behaviour patternsIdentifies and scores anomaliesOutliers to normal employee activityReal time alerts, reports, drill downs
Advanced policy engine Integrates with epos and other devicesFrictionless deployment via cloudAccess anywhere – web application
12Confidential – Provided Under NDA
Architecture
EPOS
CCTV management deviceManage the interaction of the CCTV
cameras and the Cloud
Transpeye AnalyticsCloud Service
CCTV
Live streaming of EPOS transactions
Retail Store
13Confidential – Provided Under NDA
Policy based exception
Data analytics
Integrated visual evidence
Simple yet powerful policy capabilityBuild policies around indicative behaviour57 built in policy templates covering a wide range of indicatorsReal-time alerts delivered to smartphones
Key features
Intelligent CCTV integration focused on the 0.1% to 0.5% of valuable footageMakes valuable CCTV footage available and stored independentlyFlexible mapping of cameras to epos (many-to-many) Automatic by policy retrieval of visual evidence. Manual override
Dynamic dashboard providing real-time status on key parametersInteractive drill down reports allowing rapid focus on worst performersHigh quality pdf reports with built in schedulingSimple to use forensics supporting granular investigations
Frictionless deployment
Cloud platform – zero servers or software to deploy or maintainSmall collector agents to retrieve epos data, device and CCTV footageWorks on the most basic networks. Minimal bandwidth requirementsApplication accessible from any web browser including tablets, smartphones
14Confidential – Provided Under NDA
Product screenshot - dashboardFeatures
1. Alert over time graph2. Regular data refresh3. Alert number and score tracking4. Last five policy violations5. Policy violation reason6. Policy violation score7. Top 5 policy violating stores8. Top 5 policy violating staff9. Top 5 policy violating new staff
1
2
3
4
5 6
78 9
15Confidential – Provided Under NDA
Product screenshot – visual evidence Features
1. Transaction summary data2. Policy violation3. Transaction details4. Raw receipt5. Manual video retrieval6. Multiple CCTV views7. Till screenshot8. Till desktop video9. Video playback controls 10. HD/side-by-side viewer
10
1
2
3
4
5
67 8
9
16Confidential – Provided Under NDA
Product screenshot – drilldown reportsFeatures
1. Location filter2. Date filter3. Activity selector4. Top worst stores5. Top worst stores by number6. Top worst stores by value7. Top worse staff8. Top worst staff by number9. Top worst staff by value
1 23
4
5 6
7
8 9
17Confidential – Provided Under NDA
Product screenshot – data forensicsFeatures
1. Selection filters2. Tabular display3. Links to transactions4. Multiple pages
1
2 3
4
5
6
18Confidential – Provided Under NDA
Demo
19Confidential – Provided Under NDA
Frictionless Delivery
Finds and solves the problem
Made Simple
Supports existing tills and camerasUses existing networkZero additional infrastructure investmentTiny agent within retailers environment
Loss Prevention Made Simple
Built for modern world on web based technologiesCloud based deliveryDesigned for the novice userIntuitive user experienceMonthly usage based bill at commodity prices
Analytics to find hot spotsBuilt in intelligence to guide the user Alerts, email notification and reports to aid understandingActive remediation using visual evidence
20© Transpeye Ltd. All rights reserved.
21Confidential – Provided Under NDA
Cloud to device
Cloud to back office
Cloud to cloud
Tills hosts agent and communicates directly with cloudCameras/DVR’s can be accessed directly by cloudVirtual DVR can be deployed to make use of the most basic cameras
Flexible Deployment Options
Cloud to cloud synchronization to retrieve till dataCloud to cloud synchronization to retrieve video data
Single deployment to get data from back offices systemsSingle deployment to get data from cameras and DVR’s
22Confidential – Provided Under NDA
Option 1: Cloud to SSA Cloud
Deployment options – Till data
Option 2: Corporate back office to SSA Cloud
Option 3: Store back office to SSA Cloud
Option 4: Till to SSA Cloud
DataTill
• Zero deployment requirement• Add till cloud credentials to SSA cloud (mins)• Next generation epos vendors provide open API’s• Support POSLavu today, Vend by 1st December• Others by demand (Shopkeep, Lightspeed, Kounta, Revel)
Data
• Single point deployment requirement• SSA till agent on dedicated hardware (1 small server)• High performance agent > 100,000 transaction per hour• All data compressed and encrypted before being pushed to
SSA cloud • Minimal additional network load
HQ back office
Data
• Multi point deployment requirement• SSA till agent on shared hardware (server or desktop)• High performance agent > 10,000 transaction per hour• All data compressed and encrypted before being pushed to
SSA cloud • Minimal additional network load• Good for when data collection needs to be on same LAN
Data
• Per till deployment requirement• SSA till agent on till – screenshots and desktop video• Minimal memory and CPU utilization• All data compressed and encrypted before being pushed to
SSA cloud • Minimal additional network load• When data collection needs to be directly from the till
Store back office
23Confidential – Provided Under NDA
Small data
Network friendly
Scheduling
All video stored locally – close to cameraTypically transfer 0.1% to 0.5% of video that has valueNo need for ‘big pipes’ or high grade networkStore and forward architecture
Making best use of available networks
Video upload can be controlled and scheduledBlack out periods e.g. over lunchtimeUse dead periods for video transfer e.g. over night
Advanced ‘traffic shaping’ built inUnderstands the capacity of the end-to-end linkBy default uses a maximum of 50% of available bandwidthAllows your high priority traffic to always flow unhindered
24Confidential – Provided Under NDA
Option 1: SSA Cloud to DVR Cloud
Deployment options – CamerasOption 2: SSA Cloud to DVR/Camera
VideoDVR
• Zero deployment requirement• Add cloud DVR cloud credentials to SSA cloud (mins) • Automatically discovers and registers new cameras
Video
• Zero deployment required• Firewall configuration required to allow remote access• Manual addition of cameras to configuration
Option 3: Cameras or NVR’s with storage and programmable access
Option 4: Cameras with no storage or NVR’s with no programmable access
Video
Video
Video
Video
OR
HQ level
Store level
• Single or multiple camera manager agents• Low spec server or PC – minimal storage• Acts as gateway between the SSA cloud and the cameras• Behind the corporate firewall• Reverses direction of traffic between cloud <-> camera/NVR• Single or multiple agents dependent on network topology
VideoVideo
Video Store level
• Camera manager agent on same LAN as camera• Low spec server, PC or till – some storage requirements• Camera management agents acts as a mini-DVR• Storage estimates (720p@1fps) of around 2Gb for 7 days• The most basic of deployments
Request
Video
Request
25Confidential – Provided Under NDA
Security
• Servers hosted in Europe (Ireland)• No credit card data recorded, transmitted or retained• PCI-DSS expressly allow the usage of cloud based services – see link• PCI-DSS compliant cloud infrastructure – see link• All data is encrypted using the same technology as the UK financial industry • All customer data is ‘zoned’ to be logically compartmentalized• Service built to the highest security standards
26Confidential – Provided Under NDA
Transpeye Solution
Virtual security perimeter around your cash and operations
Intelligent monitoring and advanced surveillance
Data AnalyticsProcess all electronic events - Correlate Advanced policy engine – out of policy eventsReal time alerts – reports – interactive drill downs
Irrefutable Visual EvidenceIntelligent integrates with CCTVAutomatic collection via policy - Manual override available
Easy DeploymentCloud based platform – accessibleNetwork bandwidth friendly – small data sizesSmall agents to interface to devices
27Confidential – Provided Under NDA
CCTV availability Vast bulk of CCTV data stays local
All video stored ‘close’ to cameraEither DVR/NVR or on modern ‘edge’ camerasVideo associated with policy violations retrievedTypically 0.1% to 0.5% of video is valuable
Efficient network utilization Systems automatically retrieves small video clipsTypically 30secs to 1min (i.e. small in size)Copies over the network in backgroundCan schedule transfer. Avoids network impactMakes HD quality video accessible
Modern UIWeb application in the cloudAccessible from any device including tabletsCorrelates policy violations and CCTV
Requests
Video clips