2. 2Confidential – Provided Under NDA
Agenda
• Principals
• Problem space
• Architecture
• Demo
• Loss prevention made simple
• Deployment options – Till data
• Deployment options – Cameras
• Product offering
• What makes SilverStar Analytics unique
• Platform advantages
• Route to markets
3. 3Confidential – Provided Under NDA
User activity management
Cloud platform
Business
Intelligence
Policy Violations Fraud / Theft
Advanced
Analytics
Irrefutable Visual
Evidence
5. 5Confidential – Provided Under NDA
UK Retail Fraud
Survey
National Retail
Security Survey
U.S. Retail Fraud
Survey 2013
52% of total UK retail sector - 43,000 physical stores and a combined turnover
of £148 Billion - 2014
Shrinkage increased by over 22.2% in 2014, rising from 0.9% of sales last year
to 1.1% Theft or fraud by employees closely follows this with 33%, which has
also seen an increase by 6% since last year
Industry reports
U.S. retailers lose an average of 1.3% of sales, $54 billion per year
Employee theft is the largest area accounting for 37% of total shrink
A high of 1.8% of sales for small-format retailers, down to 0.9% for large-
format specialty, hospitality and leisure retailers.
US retailers lost more than $34 billion to theft in 2011
Theft as a percentage of revenue was 1.41% Employee theft still constitutes
the largest majority of losses at 43.9%
Retail Fraud Survey
2014
One out of every 39.5 employees was apprehended for theft
Survey participants apprehended 78,085 dishonest employees in 2013, up
6.5% from 2012
On a per case average, dishonest employees steal 5.4 times the amount stolen
by shoplifters
6. 6Confidential – Provided Under NDA
Retailers of all sizes face similar insider threats
Large Retailers
• Large corporate function
• Sophisticated systems
• Strong processes
• Dedicated loss prevention
staff but adhoc system
> 300
Stores
< 300 Stores
< 10 Stores
Medium Retailers
• Limited corporate function
• Basic systems
• Weak processes
• Little loss prevention focus
Small Retailers
• No corporate function
• Adhoc systems
• Adhoc processes
• No loss prevention focus
• Exactly the same threats
as large retailers
• Challenged by cost and
complexity
• Limited by resources
• Need simple loss
prevention
7. 7Confidential – Provided Under NDA
Cash register manipulation
Cash Register Manipulation
Employee
Refund
Loyalty
Cards
Discount
Manual Price
Adjustment
Line Item
Void
Low ValueZero Value Cash Theft
Long
Duration
Earlier of the day sale
Fake refund details
Repeat of genuine
To cash or card
Cancel/voided sales
Manager override
No sale
Employee discount
Excessive discount
Price overrides
Customer collusion
Repeated use
Stealing points
Customer collusion
Multiple voids
Last item void
Most expensive item
Excessive low value
Customer collusion
Replaces high value
items
Modified after customer
interaction
Cash draw left open
With draw of cash
before/after transaction
manipulation
Cash draw opened
High reductions
Excessive reductions
Same item
High value
8. 8Confidential – Provided Under NDA
Surveillance at the point of sale
Make smarter operations decisions
Visual evidence of operations
Staff and customer behaviour
Monitor and optimize
Remote access
Real time and historical data
Remotely monitor
Access from anywhere using any device
Real time alerts for policy violations
Access to irrefutable visual evidence
Detect cashier-related shrinkage
Tracks suspect patterns and
behaviour
Unauthorized discounts, manually
entered values, no sales or voids
POS exception reporting with video
Discover how often and to what
extent your business rules
are violated, by whom, and the
impact on your bottom line
Staff productivity and training
9. 9Confidential – Provided Under NDA
Number of point of sale devices - 2009
> 200
Stores
Global Total
25.8M
6.7M
EU
5.9M
NA
2.3M
1.7M
1.3M
1.1M
1.1M
1.0M
25 Million
7 Million
6 Million
2 Million
1 Million
Source: World Bank
Note: Excludes China
10. 10Confidential – Provided Under NDA
Transpeye solution
3 key pillars to the solution
Advanced
Data
Analytics
Modern Cloud
Platform
Irrefutable
Visual
Evidence from
CCTV
integration
11. 11Confidential – Provided Under NDA
Passive to active surveillance
Data Analytics
Takes events from a wide range of systems
e.g. epos, access control, cash counting
Determines policy violations and ‘outliers’ to normal
Raises weighted alerts for investigation
Irrefutable Visual Evidence
Uses stored video at the ‘edge’
Retrieves clips of video from appropriate cameras
Uses storage and network resources efficiently
Finds the 0.5% of valuable CCTV footage
User Activity Management
Baselines behaviour patterns
Identifies and scores anomalies
Outliers to normal employee activity
Real time alerts, reports, drill downs
Advanced policy engine
Integrates with epos and other devices
Frictionless deployment via cloud
Access anywhere – web application
12. 12Confidential – Provided Under NDA
Architecture
EPOS
CCTV management device
Manage the interaction of the CCTV
cameras and the Cloud
Transpeye Analytics
Cloud Service
CCTV
Live streaming of EPOS transactions
Retail Store
13. 13Confidential – Provided Under NDA
Policy based
exception
Data analytics
Integrated visual
evidence
Simple yet powerful policy capability
Build policies around indicative behaviour
57 built in policy templates covering a wide range of indicators
Real-time alerts delivered to smartphones
Key features
Intelligent CCTV integration focused on the 0.1% to 0.5% of valuable footage
Makes valuable CCTV footage available and stored independently
Flexible mapping of cameras to epos (many-to-many)
Automatic by policy retrieval of visual evidence. Manual override
Dynamic dashboard providing real-time status on key parameters
Interactive drill down reports allowing rapid focus on worst performers
High quality pdf reports with built in scheduling
Simple to use forensics supporting granular investigations
Frictionless
deployment
Cloud platform – zero servers or software to deploy or maintain
Small collector agents to retrieve epos data, device and CCTV footage
Works on the most basic networks. Minimal bandwidth requirements
Application accessible from any web browser including tablets, smartphones
14. 14Confidential – Provided Under NDA
Product screenshot - dashboard
Features
1. Alert over time graph
2. Regular data refresh
3. Alert number and score tracking
4. Last five policy violations
5. Policy violation reason
6. Policy violation score
7. Top 5 policy violating stores
8. Top 5 policy violating staff
9. Top 5 policy violating new staff
1
2
3
4
5 6
7
8 9
15. 15Confidential – Provided Under NDA
Product screenshot – visual evidence
Features
1. Transaction summary data
2. Policy violation
3. Transaction details
4. Raw receipt
5. Manual video retrieval
6. Multiple CCTV views
7. Till screenshot
8. Till desktop video
9. Video playback controls
10. HD/side-by-side viewer
10
1
2
3
4
5
67 8
9
16. 16Confidential – Provided Under NDA
Product screenshot – drilldown reports
Features
1. Location filter
2. Date filter
3. Activity selector
4. Top worst stores
5. Top worst stores by number
6. Top worst stores by value
7. Top worse staff
8. Top worst staff by number
9. Top worst staff by value
1 2
3
4
5 6
7
8 9
17. 17Confidential – Provided Under NDA
Product screenshot – data forensics
Features
1. Selection filters
2. Tabular display
3. Links to transactions
4. Multiple pages
1
2 3
4
5
6
19. 19Confidential – Provided Under NDA
Frictionless Delivery
Finds and solves
the problem
Made Simple
Supports existing tills and cameras
Uses existing network
Zero additional infrastructure investment
Tiny agent within retailers environment
Loss Prevention Made Simple
Built for modern world on web based technologies
Cloud based delivery
Designed for the novice user
Intuitive user experience
Monthly usage based bill at commodity prices
Analytics to find hot spots
Built in intelligence to guide the user
Alerts, email notification and reports to aid
understanding
Active remediation using visual evidence
21. 21Confidential – Provided Under NDA
Cloud to device
Cloud to back office
Cloud to cloud
Tills hosts agent and communicates directly with cloud
Cameras/DVR’s can be accessed directly by cloud
Virtual DVR can be deployed to make use of the most basic
cameras
Flexible Deployment Options
Cloud to cloud synchronization to retrieve till data
Cloud to cloud synchronization to retrieve video data
Single deployment to get data from back offices systems
Single deployment to get data from cameras and DVR’s
22. 22Confidential – Provided Under NDA
Option 1: Cloud to SSA Cloud
Deployment options – Till data
Option 2: Corporate back office to SSA Cloud
Option 3: Store back office to SSA Cloud
Option 4: Till to SSA Cloud
DataTill
• Zero deployment requirement
• Add till cloud credentials to SSA cloud (mins)
• Next generation epos vendors provide open API’s
• Support POSLavu today, Vend by 1st December
• Others by demand (Shopkeep, Lightspeed, Kounta, Revel)
Data
• Single point deployment requirement
• SSA till agent on dedicated hardware (1 small server)
• High performance agent > 100,000 transaction per hour
• All data compressed and encrypted before being pushed to
SSA cloud
• Minimal additional network load
HQ back
office
Data
• Multi point deployment requirement
• SSA till agent on shared hardware (server or desktop)
• High performance agent > 10,000 transaction per hour
• All data compressed and encrypted before being pushed to
SSA cloud
• Minimal additional network load
• Good for when data collection needs to be on same LAN
Data
• Per till deployment requirement
• SSA till agent on till – screenshots and desktop video
• Minimal memory and CPU utilization
• All data compressed and encrypted before being pushed to
SSA cloud
• Minimal additional network load
• When data collection needs to be directly from the till
Store
back
office
23. 23Confidential – Provided Under NDA
Small data
Network friendly
Scheduling
All video stored locally – close to camera
Typically transfer 0.1% to 0.5% of video that has value
No need for ‘big pipes’ or high grade network
Store and forward architecture
Making best use of available networks
Video upload can be controlled and scheduled
Black out periods e.g. over lunchtime
Use dead periods for video transfer e.g. over night
Advanced ‘traffic shaping’ built in
Understands the capacity of the end-to-end link
By default uses a maximum of 50% of available bandwidth
Allows your high priority traffic to always flow unhindered
24. 24Confidential – Provided Under NDA
Option 1: SSA Cloud to DVR Cloud
Deployment options – Cameras
Option 2: SSA Cloud to DVR/Camera
VideoDVR
• Zero deployment requirement
• Add cloud DVR cloud credentials to SSA cloud (mins)
• Automatically discovers and registers new cameras
Video
• Zero deployment required
• Firewall configuration required to allow remote access
• Manual addition of cameras to configuration
Option 3: Cameras or NVR’s with storage and
programmable access
Option 4: Cameras with no storage or NVR’s with no
programmable access
Video
Video
Video
Video
OR
HQ level
Store level
• Single or multiple camera manager agents
• Low spec server or PC – minimal storage
• Acts as gateway between the SSA cloud and the cameras
• Behind the corporate firewall
• Reverses direction of traffic between cloud <-> camera/NVR
• Single or multiple agents dependent on network topology
Video
Video
Video Store level
• Camera manager agent on same LAN as camera
• Low spec server, PC or till – some storage requirements
• Camera management agents acts as a mini-DVR
• Storage estimates (720p@1fps) of around 2Gb for 7 days
• The most basic of deployments
Request
Video
Request
25. 25Confidential – Provided Under NDA
Security
• Servers hosted in Europe (Ireland)
• No credit card data recorded, transmitted or retained
• PCI-DSS expressly allow the usage of cloud based services – see link
• PCI-DSS compliant cloud infrastructure – see link
• All data is encrypted using the same technology as the UK financial industry
• All customer data is ‘zoned’ to be logically compartmentalized
• Service built to the highest security standards
26. 26Confidential – Provided Under NDA
Transpeye Solution
Virtual security perimeter around
your cash and operations
Intelligent monitoring and
advanced surveillance
Data Analytics
Process all electronic events - Correlate
Advanced policy engine – out of policy events
Real time alerts – reports – interactive drill downs
Irrefutable Visual Evidence
Intelligent integrates with CCTV
Automatic collection via policy - Manual override available
Easy Deployment
Cloud based platform – accessible
Network bandwidth friendly – small data sizes
Small agents to interface to devices
27. 27Confidential – Provided Under NDA
CCTV availability
Vast bulk of CCTV data stays local
All video stored ‘close’ to camera
Either DVR/NVR or on modern ‘edge’ cameras
Video associated with policy violations retrieved
Typically 0.1% to 0.5% of video is valuable
Efficient network utilization
Systems automatically retrieves small video clips
Typically 30secs to 1min (i.e. small in size)
Copies over the network in background
Can schedule transfer. Avoids network impact
Makes HD quality video accessible
Modern UI
Web application in the cloud
Accessible from any device including tablets
Correlates policy violations and CCTV
Requests
Video clips