Frequently asked questions

What kind of cash register is suitable for the system?

The POSeidon Control System is suitable for every known electronic cash register.

Is there a limit to the number of cash registers linked to the system?

Due to the modular construction of the system, practically any number of cash registers can be supervised using our system.

How is the preventive effect of the system present in practice?

When setting up the system, we suggest that the already busy guards should not be given the checking task; instead, the chief-cashier should carefully observe its employees work on bigger screen, placed in the cash office. Thus, the cash register observing procedures can easily be followed, the various deletions, the returns’ management, the activity of the novice cashier etc. Considering the public placement of the system, the cash office, all the cashiers can see the on-line information provided by the system and it becomes obvious that their activity control is more efficient and thorough than ever. However, the activity of the POSeidon Investigation is public only to the privileged.

In our store, at rush hours, there are more than 60 cash registers operating. How is it possible to observe the critical transactions using real-time monitoring on such a large paying site?

One of the options of POSeidon is the visual and audio warning, thanks to which the system will signal the critical transactions with a distinctive color signaling (if installed), (for example, row deletion) and/or products (marked in the inventory deficit). Besides the visual warnings, we can draw the attention of the system supervisors to high risk transactions with loud speaking.

Can the data stored in the system be used as evidence?

Yes, because the multilevel protection of the system assures tamper-safe usage. Having appropriate authority, the stored data of the system can easily be saved to external media, and the used video format can be replayed through any operational system.

What do we see if the so called “push-out” method is being used by the perpatrators?

When using the “push-out” method, the information of the block does not appear in real-time.

How can we discover the perpetrator using the method of introducing only a part of the goods in the cash register?

This can be discovered partly with real-time observation, partly with the POSeidon Investigation system, whose key role is to separate and focus on these events, based on certain parameters of the transaction.

What happens if your system does not discover any contravention, or abuse, yet there are numerous deficits?

In this case, the cash register, as a source of these deficits, is excluded. At this moment, using a risk analysis, we can discover other critical points where deficits can appear, such as acquisition, home delivery, over storage etc. We are at our customers’ service in carrying out these kinds of investigations as well.

Our company does not have a security manager, so we can not entrust anyone with the surveillance of the system. Do you have a compromise solution to this problem?

Of course we have. According to the nature, the turnover, the frequency of problems in a given commercial unit, we undertake as a separate service the visit of our colleagues, having great experience in detecting commercial abuses, which will run the POSeidon Investigation risk analysis program at a weekly, two weekly or monthly bases. If they found any irregular transactions, they would investigate them, together with the customer.

How do you solve the customization of the system, knowing that every commercial unit has different processes, and use different principles?

During the design process of the system, our colleagues will thoroughly observe and measure the customer’s trading and treasury system. Making a risk analysis, we process also the previously well-known cases of the customer, in addition we make a survey of the other data needed, and on these bases we create the customized POSeidon Control System.

Could the risk analysis be made automatic?

Certainly. Together with the customer, we can create a number of risk configurations, which will be run by the system with preset frequency concerning the desired interval, therefore at the end of the process only the visual control of those transactions remain which are considered to pose a risk.

Our company has more department stores. Is your system capable of supervising the cash registers of many stores from one location?

Yes, applying remote access, our system is capable of supervising a number of stores with POSeidon Control systems from a central place, thus we can choose the critical transactions from a remote place. With an appropriate bandwidth the continuous real-time control is possible. The gathering of remote information and its control makes possible the modeling with the POSeidon Investigation of a configuration based on the characteristics of a certain abuse, this configuration being run in all the other stores as well. This way, the serial perpetration is easily discovered.

In our store, the treatment of customer complaints and the refund of the price of goods take place at the customer service desk. Is this system suitable for this kind of supervision?

Certainly. Frequent reasons of the missing items are the abuses made during the movement of goods and cash flow at the customer service desk, therefore extra emphasis is put to its supervision.

Can the activity of an individual working at more cash registers in a shift also be tracked?

Yes, as long as he/she is logging in with its individual identification number.

In our hypermarket, the key-value electronics are paid in the place of sale, so that those customers not buying anything else will leave the store at the entrance. Unfortunately, this leads to many abuses. What solutions does your system provide to this problem?

According to the present use, the guard standing at the entrance or the operator in the presence of the guard will have to check the sale and the payment at the given department. Usually, this consists of telling and checking a number on the receipt block. Using our system, the fictive, false and deleted blocks can be also be filtered, and the detection of the guard’s deliberate assistance also comes as a surprise.

How does your system differ from other similar systems?

There are several fundamental differences, namely: The first and most important one is that the POSeidon Control System offers complex solutions to prevent and detect the inventory deficits in the commercial units. Most systems will visualize the block information on the cash register’s screen, whereas our system will process and rate this information. Most security systems convert the text information onto the cash registers’ screen by hardware, instead the POSeidon will carry this out by software, hereby the possibility of malfunction is lower and no character error occurs. Our system features a combinatory logic base by which each perpetration method can be modeled as required. The system being event-centered, based on a continuously expanding knowledge base, is by far surpassing the simple IT solutions. Every single system is created and installed on the customer’s characteristics and individual demands. The knowledge of the POSeidon system is always up-to-date with the upgrade solutions chosen from the service pack, i.e. we continuously update its knowledge base with the newest perpetration methods. Thanks to our risk analysis, the processes become transparent; the loopholes can be closed. With our private investigation support, even the most difficult cases can be solved.

At rush hours, we often employ external cashiers, whose surveillance is not solved, since we are already running low on staff personnel. How can your system help?

In these cases, our suggestion is to place a big LCD monitor in the cash-office, and with the aid of a POSeidon terminal which can display the camera pictures and receipt information, we can separate all those cash registers where external cashiers or trainees work. Thus, the activity of a number of employees can be supervised by a remotely, and corrected if required. The activity of a cashier can also be analyzed with the statistical option of the system, ex. who had the most deletions, the most turnovers, the most customers etc. Even a training syllabus can be compiled on the basis of the gained information.