Infotech Lead America: Apparel retailer C&A will scale up its Radio Frequency Identification (RFID) project from five to 25 stores. In partnership with Checkpoint Systems, C&A will extend RFID solutions to reduce out of stocks and increase customer satisfaction.
C&A Germany will benefit from Checkpoint’s RF/RFID antennas, point of sale RFID solution, software and consulting services.
The project will to ensure that the merchandise is available on C&A store shelves in the right color, size and fit. RFID enables retailers to more effectively and efficiently able to manage inventory and enhance loss prevention efforts.
C&A selected Check Point for the RFID project to analyze processes and procedures for store deliveries, replenishment and inventories.
Joachim Wilkens, Supply Chain Development, C&A Group, said: “We already noticed a clear reduction in out of stocks and increase in the availability of items on store shelves for purchase by our customers where the Checkpoint RFID solution has been installed.”
Checkpoint’s OAT Foundation Suite software enables C&A store employees to cycle count with a Motorola handheld RFID reader, equipped with the Checkpoint Merchandise Visibility software, allowing employees to maintain accurate perpetual inventory. The software’s reporting facility includes sales, stock and replenishment data for the apparel retailer to get real time and full visibility of its merchandise and sales.
Per Levin, president, Shrink Management and Merchandise Visibility Solutions, Checkpoint Systems, said: “As apparel retailers and brand owners increasingly adopt RFID-based solutions, they are looking for scalable, deployable and operational solutions.”
Recently, Checkpoint Software Technologies 2013 Security Report revealed major security risks that impact organizations.
The report says most of the serious threats stayed hidden from network administrators. Criminal hackers keep changing their techniques and employees unintentionally indulge in risky online activities that make the corporate network vulnerable. To strengthen the security blueprint, organizations need to be aware of and fully understand the activities occurring on their networks.