Stuart Wheeler, Managing Director of Keynetics explores access control transformations in the retail sector.
Retail is one of the industries where both digital and physical security is of extreme importance.
While digital security focuses fundamentally on data protection from phishing, data theft, spoofing, ransomware and other threats that can affect both business operations and customer information, physical store security is gaining traction among retailers as a result of the latest developments not only nationally, but globally.
The latest Crime Survey 2024 Report published by the British Retail Consortium (BRC) reveals that retailers are highly concerned about violence against staff and theft by customers, which are two issues that have received widespread attention in national media recently.
However, in addition to the Bonnie and Clyde attitude among a small percentage of the population, which causes distress to employees, financial loss to businesses and was even acknowledged in election manifestos, large-scale crime has not disappeared.
The same group of the BRC survey respondents confirmed that burglary remains in the top nine most significant threats to their business over the upcoming two years.
These challenges are not limited to retail.
According to the latest Official Statistics on Crime Against Businesses by GOV UK, 28% of all commercial premises in the UK were targeted by criminals, with burglary (including attempts) accounting for 9% of all criminal activity.
As a result, the security industry is thriving and, according to Technavio’s Private Security Services Market Analysis, is expected to grow due to increasing crime rates, burglaries, vandalism, and the need to safeguard against potential threats.
Burglary and vandalism are two forms of crime that typically occur after-hours.
While there is a plethora of security products designed to prevent, detect and delay criminals, such as CCTV and security alarms, a key factor is to ensure that the alarm response time is as short as possible to minimise loss to retailers.
Firstly, lets discuss the traditional keyholding approach, which no longer appears to be an efficient solution for tackling such crime.
In most cases, all keys allocated to a keyholder (whether it is a security or specialised keyholding company) are stored at a central location.
At the start of each work shift, security guards collect a vast number of assigned keys and keep them in secure key lockers in their vans during patrol hours.
There are various aspects in this method that can cause delays in responding.
First, the patrol with the required keys may be on a different callout dealing with an emergency situation, or they may be quite a distance away from the location.
While the nearest patrol guards could cover ground, they would be unable to gain entry to check the premises without the keys and may have to search for a specific location where intruders gained entry.
This is especially relevant given the recent popularity of the “stop-the-clock” approach, in which security companies demonstrate phenomenal alarm response times by sending the nearest patrol to the premise doors.
However, the service stops there as they cannot physically enter the building and must remain waiting for a keyholder to arrive.
One modest adjustment to the current keyholding method can change that significantly and allow not only for a timely arrival but also completion of a property inspection.
Undoubtedly, access control must be reviewed in order to address the highlighted issue.
Implementing a fully digital system that uses credentials for access can be a costly exercise, especially with hundreds of retail locations that may require not only lock but also door replacements.
Furthermore, such a system may be ideal for office settings but unsuitable for retail operations, so it appears that physical keys are here to stay for quite some time.
One of the most cost-effective and efficient ways of ensuring quick, authorised access to a locked property is to deploy a digital key safe at the point of entry.
This would allow the nearest patrol to arrive on the scene, gain access immediately and inspect the premises for intruders without having to search for keys.
So it is no surprise that more and more security companies are adopting this keyholding method, while also reaping additional benefits of the digital element of the system by granting and revoking access remotely and running audit reports.
Keynetics has a track record of effectiveness of this approach, having assisted a client in reducing their alarm response time from more than two hours to approximately 45 minutes after implementing its key safe solution across hundreds of branches throughout the UK.
While deploying key safes may appear to be a straightforward answer, a critical question must be asked prior to adopting such a system: how safe is the product and how to assess its security levels?
After all, a key safe must be stronger than the entrance door; otherwise, unauthorised entry is only a matter of time.
Over-the-counter key safes are clearly not a wise choice as they are not designed for higher-risk commercial applications, but there are multiple products available from various key safe brands that claim to provide sufficient levels of security for business use.
This is when accreditation comes into play.
However, there are just a few reliable and globally recognised standards that are appropriate for key safes.
For example, Keynetics’ SentriGuard key safes are LPS 1175 C1 and C3 certified, with security rankings unrivalled by any other key safe provider.
This loss prevention standard by Loss Prevention Certification Board (LPCB) follows a thorough process that includes product design evaluation, manufacturing audits including factory production control (FPC), as well as rigorous attack tests by BRE.
Digital key safes create a bridge between traditional keyholding or mechanical key safes and fully digital access control solutions.
Yet the scale and scope of digital (and thus remote) capabilities varies depending on the key safe system.
SentriGuard, Keynetics’ latest key management solution, for example, offers remote access management via its cloud-based platform and key safes can be opened with either the app or a code.
All access is date and time stamped, providing a complete audit trail.
Furthermore, the system incorporates a key detection feature that alerts when keys are not returned, ensuring you always know where your key is and who has access to it.
Since there are designs with different security ratings and capabilities, the end user should determine which criteria are most essential to them, as well as conduct due diligence on product security checks.
Regardless of the keyholding method adopted by retailers, it is critical to evaluate how to enhance store operations while preventing unnecessary expenses and potential security breaches.
This article was originally published in the August Edition of Security Journal UK. To read your FREE digital edition, click here.
Click to Open Code Editor