Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Leadership and ManagementSecurity & Business ResiliencePhysical SecurityRetail/Restaurants/Convenience

How to mitigate retail shrink using visual AI

By Alan O'Herlihy
retail checkout counter
December 28, 2021

Retail security is only growing more complex as in-store shopping and ecommerce models start to blend. Consumers are increasingly turning to buy online, pick up in-store options, curbside pickups and other ways of shopping that reduce how much time they spend in brick-and-mortar locations. Meanwhile, retailers still have to keep a close eye on what happens in the store at all times, especially when businesses are strapped for resources. Security is getting harder to maintain, leading to enormous retail loss.

The global retail industry suffers from $100B in shrink — financial loss due to missing revenue, wasted inventory, stolen goods or improper accounting — every year. Shrink is a huge problem for retailers today and can occur at many stages along the retail supply chain, from the distribution center to the checkout lane. The average shrink rate for retailers was 1.6% in 2020, and nearly 16% of retailers now have shrink rates above 3%, according to the 2021 National Retail Security Survey.

The best way to mitigate retail shrink is to improve security and increase visibility into product movement; but doing so at scale is challenging. Retailers can’t have employees re-checking inventory manually at the back door, in-store, at checkout and outside throughout the entire day. Traditional security tactics simply can’t keep up as shopping methods diversify, which is why visual artificial intelligence (AI) technology (also known as computer vision) is gaining momentum.

AI provides a deep layer of intelligence and a constant watchful eye that can enable retail security executives to maintain inventory count accuracy, minimize shrink and improve real-time decision-making. Through this technology, retailers can boost onsite security and enhance inventory management in a truly scalable fashion.

Computer vision is particularly useful at the front of the store where staff, customers, products and transaction events all come together. The technology elevates oversight at both self-service checkout stations and in checkout lanes, allowing retail security professionals to keep closer tabs on product movements.

Common sources of retail shrink

Computer vision is valuable at the front of the store as it can secure two different types of checkout situations that contribute to retail shrink: malicious and unintentional loss.

Malicious loss typically emerges in the form of customers purposely neglecting to scan certain items or scanning cheaper products in place of more expensive ones. In some cases, store employees will also contribute to the problem by issuing unauthorized discounts. Of course, these actions throw off inventory counts.

But it’s really the unintentional side of the retail shrink equation that is a massive problem. Losses pile up due to shoppers accidentally forgetting to scan items. Some people will mistakenly leave smaller products in their baskets or miss products that they placed underneath their shopping carts. Checkout lane employees also inadvertently forget to scan items, especially smaller goods. These mistakes add up over time, increasing how much downstream work retailers have to do just to keep their records in order.

The challenge for retail security teams that they often don’t discover issues until long after customers have left the store. Unscanned or improperly scanned inventory walks out the door, intentionally or unintentionally, creating problems later when employees attempt to reconcile sales numbers with inventory counts. In many cases, workers can only determine they have too much or too little of certain products without knowing why.

And when employees do have an opportunity to solve a problem in the moment, they still can’t make a perfectly informed decision. For example, a customer could improperly scan an item and place it in their shopping bag, triggering an alert from the machine. When the store clerk walks over, they have to take the customer at their word regarding what caused the error. If the kiosk doesn’t show the last item scanned or take a video of the transaction, there’s little the clerk can do to confirm the event and ensure that the inventory management system accurately reflects what just happened.

The solution to these problems is to increase real-time visibility at checkout, which is difficult to accomplish without computer vision technology. The right tool can prevent these common sources of retail shrink and mitigate inventory management discrepancies that would otherwise persist for far too long.

How AI helps

AI gives retail security leaders the ability to observe all checkout events as they unfold. For instance, AI can monitor live transactions, store video clips, identify un- or improperly scanned items and flag when there’s an inconsistency between what the camera sees and what the self-service machine processes. The technology is sophisticated enough now that it knows what it’s seeing — high-quality solutions can distinguish a pair of shoes from sunglasses or an avocado from a banana, giving retailers more eyes on what occurs in their physical locations.

Whenever something unusual happens, AI can alert staff immediately, creating a real-time opportunity to prevent a future inventory problem. So, in the event that a shopper mistakenly fails to scan an item, an employee could walk over, check video footage to see what happened, and then re-scan any products that weren’t processed correctly.

Beyond checkout lanes and self-service stations, the technology can improve visibility into curbside pickups, buy-online, pickup-in-store counters and other ecommerce-oriented channels that people are using more frequently today. In this way, computer vision is helpful for tracking product movements within newer-age shopping models that are only gaining momentum.

For those struggling to minimize shrink and efficiently manage inventory, computer vision technology is the answer. AI solutions, designed specifically for retail, perpetuate inventory accuracy, streamline operations and enable companies to deliver better overall shopping experiences. They increase visibility across the board, augmenting human workforces with the information they need to avoid inventory headaches and make better decisions in real time.

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users brought to you by Security Magazine. Subscribe here.

KEYWORDS: artificial intelligence (AI) inventory management loss prevention retail security retail shrink store video on camera theft prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Alan O'Herlihy is CEO of Everseen.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Person using ATM

    Use technology to maintain assets and reduce shrink in retail

    See More
  • Hand in front of binary code

    Rogue AI risks and how to mitigate them

    See More
  • Retail technology to reduce shrink, and improve security

    Implementing next-gen retail technology to improve security & mitigate fraud

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products

Events

View AllSubmit An Event
  • September 9, 2025

    Actionable Strategies to Mitigate Active Assailant Risk

    ON DEMAND: Active assailant incidents are surging — Are you ready? 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing