3VR — Video Intelligence Platform

Search form

  • Blog  >>   
  • Support Portal >>
  • Products
    • Video Management Software (VMS)
      • VMS Features
      • VMS Applications
      • Enterprise
      • VMS Resources
    • Hybrid & Network Video Recorders
      • 1000-Series Hybrid NVRs
      • 2000-Series NVRs
      • 2100-Series NVR For ATM
      • 3000-Series NVRs & Hybrid NVRs
      • 4000-Series NVRs & Hybrid NVRs
      • 5000-Series NVRs & HVRs
      • Enterprise Appliance
    • Video Analytics
      • Demographics
      • Facial Surveillance
      • License Plate Recognition
      • Advanced Object Tracking
      • Dwell Time
      • Queue Management Analysis
      • People Counting
    • Customer Insights
      • Retail Analytics
      • 3VR People Counter
    • CrimeDex
    • Third-Party Integrations
      • Data Integration
      • Camera Integration
  • Solutions
    • Financial Services
    • Retail
      • Loss Prevention
      • Marketing
      • Operations
    • Critical Infrastructure
    • Other Industries
      • Hospitality
      • Healthcare
  • Partners
    • Security System Integrators
      • Overview
      • Partner Resources
      • Partner Portal
    • Architects & Engineers
    • Technology Partners
      • Overview
      • Cameras
      • Access Control
      • ATM & Teller
      • Other Partners
      • Partner Resources
  • Resources
    • Customers
      • Testimonials
      • Case Studies
      • In The News
    • Product Integrations
    • Product Datasheets
    • Vertical-Specific Resources
    • Whitepapers
    • Webinars
    • Videos
    • Software Documentation
    • Supported Cameras List
  • Support
    • Software Maintenance
    • Training
    • Technical Support
    • FAQs
      • 3VR Software
      • 3VR Hardware
      • 3VR Evidence Viewer
      • Cameras
    • Documentation
  • About Us
    • Overview
    • Management
    • Investors
    • Advisors
    • Events
      • ISC West 2017
      • ISC West 2018
      • Retail's BIG Show 2016
    • News
      • In The News
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
        • <nolink>
      • Press Releases
        • <nolink>
        • <nolink>
      • Blog
      • Social Media
    • Careers
      • Computer Vision Architect
      • IT Manager
      • Senior Product Manager
      • Software Architect
    • Contact Us
      • 3VR Sales
      • 3VR Corporate
      • 3VR Tech Support

You are here

Blog Archive>>
  • Preventing Return Fraud This Holiday Season

    3VR Team's picture
    By 3VR Team   |   Tuesday Nov 29, 2011

    receiptsThe retail industry has seen a return fraud increase this year, but expects to see a decrease in fraud during this holiday season. According to NRF survey results, retailers lost $3.73 billion last year but are only expected to lose $3.48 this year, a 6.7% decrease. This decrease is partially due to many retailers tightening their security protocols this year on their return policies, such as requiring a customer’s identification for making a return without a receipt (Private Officer News Network, 2011).

    • Read more about Preventing Return Fraud This Holiday Season
    • 3VR Team's blog
  • Using Facial Recognition to Combat Fraud

    3VR Team's picture
    By 3VR Team   |   Tuesday Nov 22, 2011

    Reuter's LogoWhen it comes to financial fraud, no technology is building cases faster than facial recognition. Having relevant video evidence at hand in cases of identity theft and fraud is making a huge impact in financial institutions to prevent and combat fraud.

    • Read more about Using Facial Recognition to Combat Fraud
    • 3VR Team's blog
  • 5 Best Practices for Banks and Credit Unions to Halt Skimming

    3VR Team's picture
    By 3VR Team   |   Thursday Nov 17, 2011

    ATM SkimmingAutomated Teller Machines (ATMs) are increasingly the target of a type of credit card fraud called skimming. Today’s best practices help banks and credit unions ensure their ATMs are monitored to detect tampering and teach customers to protect themselves from skimming fraud.

    #1 — Focus monitoring efforts on high-volume ATMs for skimmer fraud activities.

    • Employ both staff and a surveillance system to systematically monitor ATMs for skimming devices and be sure to create a clear notification process for staff and investigators to follow if a suspicious device it found.

    • Read more about 5 Best Practices for Banks and Credit Unions to Halt Skimming
    • 3VR Team's blog
  • LinkedIn 101 for Security Professionals

    3VR Team's picture
    By 3VR Team   |   Tuesday Nov 15, 2011

    LinkedInLinkedIn, the social networking site for professionals, offers many opportunities to engage and connect with those in your industry. It can be a place to reconnect with past colleagues, to get recruited for your next job opportunity and even to join interesting discussions that may introduce you to new connections. LinkedIn can also be a vital resource for discovering what’s new in the security industry - where collaboration and keeping up-to-date on information is crucial.

    Here are some quick tips for signing up and/or updating your information on LinkedIn to help you develop yourself professionally and grow your business

    1. Profile Name

    • Read more about LinkedIn 101 for Security Professionals
    • 3VR Team's blog
  • 9 People You Should Follow on Twitter in the Security Industry

    3VR Team's picture
    By 3VR Team   |   Thursday Nov 10, 2011

    1) Cheryl Watterson, Security Consultant at ADT Security Services
    Cheryl Watterson







    2) Ksenia Coffman, Marketing Manager at Firetide, Security professional

    Ksenia Coffman





    • Read more about 9 People You Should Follow on Twitter in the Security Industry
    • 3VR Team's blog
  • Too Late for Zero Day: How can cyber security teams stay ahead of malware attacks?

    3VR Team's picture
    By 3VR Team   |   Tuesday Nov 8, 2011

    malwareThe focal point of almost all security teams, whether cyber or physical, is traffic. Who is entering the bank or the store? Who is coming into your network? Who is visiting the company website? Two important tips for all security professionals to keep in mind are, according to Stephen Northcutt, president of The SANS Technology Institute, to “First, configure the system and network correctly and keep it that way.

    • Read more about Too Late for Zero Day: How can cyber security teams stay ahead of malware attacks?
    • 3VR Team's blog
  • Criminal Flash Mobs: What All Retailers Should Know

    3VR Team's picture
    By 3VR Team   |   Thursday Nov 3, 2011

    flash mobFlash mobs are a trend that began as a creative form of social entertainment where large groups of people use social media to coordinate a spontaneous event, such as a choreographed dance or a performance. What many retailers have started to see now is a rise in flash mob tactics to commit multiple offender crimes. These criminal flash mobs occur when large groups of people organize and plan online to descend on a store together to steal as much merchandise as possible - putting a dangerous and illegal spin on what was once a fun social activity.

    • Read more about Criminal Flash Mobs: What All Retailers Should Know
    • 3VR Team's blog
  • Organized Crime Groups Utilize Crime-sourcing Strategies

    3VR Team's picture
    By 3VR Team   |   Tuesday Nov 1, 2011

    O’Reilly Radar recently introduced a new term within the security area, “crime-sourcing,” coined to describe a strategy now being utilized by organized crime groups to commit criminal acts and outsource it to mostly unsuspecting individuals.

    One example of crime-sourcing is the standard phishing operation, where an organized crime group will create scam web pages, hire a broker to pull thousands of email addresses, then use an intermediary to access a compromised computer and rent a botnet to distribute spam emails for a set period of time. Victims of the spam emails often provide their banking and credit card information to the crime group who will collect and distribute them. The criminals then rent distributed proxy networks to hide their locations and run transactions against the compromised accounts.

    • Read more about Organized Crime Groups Utilize Crime-sourcing Strategies
    • 3VR Team's blog

Connect with us






3VR Blog Home


Contact us



Tweets by @3VR


ATM Skimming Whitepaper


ATM Skimming Infographic


Top 10 Factors In-Store Conversions 2013 whitepaper


Leveraging Video Analytics whitepaper


Blog Archive

  • September 2016 (1)
  • June 2016 (1)
  • March 2016 (2)
  • February 2016 (1)
  • December 2015 (1)
  • September 2015 (1)
  • July 2015 (1)
  • June 2015 (1)
  • January 2015 (1)
  • December 2014 (1)
  • June 2014 (2)
  • May 2014 (1)
  • April 2014 (2)
  • March 2014 (1)
  • January 2014 (3)
  • December 2013 (2)
  • November 2013 (4)
  • October 2013 (5)
  • September 2013 (2)
  • August 2013 (3)
  • July 2013 (5)
  • June 2013 (4)
  • May 2013 (7)
  • April 2013 (9)
  • March 2013 (7)
  • February 2013 (10)
  • January 2013 (14)
  • December 2012 (10)
  • November 2012 (11)
  • October 2012 (5)
  • September 2012 (5)
  • August 2012 (2)
  • July 2012 (3)
  • June 2012 (2)
  • May 2012 (4)
  • April 2012 (7)
  • March 2012 (9)
  • February 2012 (6)
  • January 2012 (9)
  • December 2011 (7)
  • November 2011 (8)
  • October 2011 (8)
  • September 2011 (7)
  • August 2011 (3)
  • July 2011 (6)
  • June 2011 (8)
  • May 2011 (5)
  • April 2011 (1)
  • June 2010 (2)
  • May 2010 (1)
  • April 2010 (2)
  • March 2010 (8)
  • February 2010 (1)
  • January 2010 (4)
  • December 2009 (5)
  • November 2009 (2)
  • October 2009 (5)
  • September 2009 (2)
  • August 2009 (3)
  • July 2009 (5)
  • June 2009 (6)
  • May 2009 (4)

Next Steps

  • Schedule a Live Demo
  • Become an Integrator
  • Find an Integrator
  • © 2016 3VR Inc.
  • Site Map
  • Terms of Use
  • Privacy Policy
  • Contact Us
  • 877-387-6061
Contact 3VR to Schedule a Demo
3VR proactively captures and analyzes visual information that helps companies make better business decisions. Its video data platform solves problems associated with searching video content and gathering real-time intelligence from the unstructured data produced by a single camera or a global network of cameras. 3VR uses analytics as the cornerstone of video search and manages both security and business intelligence applications from a single video management system (VMS). The company is based in San Francisco and is backed by top-tier venture capital firms, including Kleiner Perkins, Menlo Ventures, Vantage Point, DAG, In-Q-Tel and Focus. For more information, please see www.3vr.com.