top of page

Search Results

73 results found with an empty search

  • eco EAS Technology | WG Security Products, Inc | United States

    Eco Bandit delivers smart, comprehensive protection for your products. It keeps you informed about status changes and daily inventory updates for the items it protects. In the event of theft, Eco Bandit not only triggers alarms but also updates the Cloud with barcode information, identifying the tampered product and its location. Local alerts integrate seamlessly with your video recorder, and Cloud alerts can be tailored to your needs, whether through emails or other notifications. eco EAS TM The Start of Something New eco Bandit Technology LPRC Research Report Elevating Box Protection. Interview and trial results of Bandit IR Smart Tag LPRC Research Bandit Tag analysis. Protect What Matters: Introducing eco Bandit Retail shrinkage is a universal challenge, but eco Bandit is here to change the game. Our advanced security system not only self-alarms when tampered with but also triggers the EAS detection system at store entrances. Whether a thief attempts to remove the anti-theft device or walks out with it still attached, eco Bandit ensures that security is immediately notified. While each retailer has their own protocol for handling theft, eco Bandit offers an extra layer of protection by helping you identify what’s been stolen—especially high-value items. Comprehensive Security Features eco Bandit’s latest design offers all the standard anti-theft features, plus enhanced capabilities. Here’s how it works: General Operation: Retailers often equip their stores with strategically placed cameras, known as “zones.” eco Bandit tags are applied to products within these zones, and readers—called Bubbles—are placed where eco Bandit tags are present. eco Bandit communicates wirelessly with the Bubble during a tampering event or through daily status updates. The Bubble, in turn, provides visual and audible alarms, triggers the video recorder, and sends notifications via WiFi to the Cloud. The Cloud updates its database and notifies the appropriate departments or individuals that an event has occurred. eco Bandit will alarm under several circumstances: Removal without disarming Cable cutting Entry into a 58kHz detection field without proper removal Triggering an EAS antenna The Bubble: The Bubble is a strategic component of the eco Bandit system. Resembling a dome camera, this device is placed in zones where eco Bandit tags are protecting products. Equipped with a dual alarm system—flashing light and audible alarm—Bubble receives wireless signals from eco Bandit and transmits this information to the Cloud via WiFi. Additionally, the Bubble can trigger the video recorder to take pre-programmed actions, such as enlarging the display of a specific camera or issuing its own alert to store personnel. Some versions of Bubble even include an integrated video camera. The Cloud: The Cloud is the backbone of the eco Bandit system, housing a database of product descriptions, barcodes, and locations where eco Bandit tags are applied. When a Bubble receives an alarm from eco Bandit, it identifies the stolen article and alerts the relevant departments or individuals. The Cloud also receives daily updates from each eco Bandit, comparing the information with its database to update inventory and track sold or stolen items. Retailers can easily retrieve reports on their updated inventory, as well as details on sales and thefts. eco Bandit Versions eco Bandit – Version #1: This version features two recessed knobs—Location and Product. The Location knob is set according to the store’s layout or zone where the Bandit is located, while the Product knob reflects the type of item it’s attached to, such as Lego boxes or perfume. Inventory updates to the Cloud occur at preset intervals, enabling retailers to query reports on inventory, sold items, and stolen items. eco Bandit – Version #2: In addition to all the features of Version #1, this version includes local memory and an IR scanner port. By scanning the product’s barcode with the IR scanner, the eco Bandit tag stores the barcode information. If an alert is generated, the barcode data is uploaded wirelessly to the Bubble, which then transmits it to the Cloud along with the alert status. As with Version #1, inventory updates occur at preset intervals, and the Cloud can be queried for detailed reports. Summary: eco Bandit delivers smart, comprehensive protection for your products. It keeps you informed about status changes and daily inventory updates for the items it protects. In the event of theft, eco Bandit not only triggers alarms but also updates the Cloud with barcode information, identifying the tampered product and its location. Local alerts integrate seamlessly with your video recorder, and Cloud alerts can be tailored to your needs, whether through emails or other notifications. With eco Bandit, you get immediate theft notifications and up-to-date inventory reports, ensuring you stay one step ahead. eco Bandit Smart Tag Spec Sheet Remote access to the data management cloud service along with DVR Recording eco EAS the start of something new Our Cloud based data storage is available at no additional charge via Wi-Fi access. This allows the LP or AP departments to conduct forensic investigations and track alarms with video by store location, department and time of day. The eco Bandit is available in 58kHz, 8.2MHz and RFID frequencies. Technology: A.M, R.F, RFID Detachers: Smart IR Detacher Detachers: 3 or 4 Alarm versions: Standard-lock - Super-lock Detachers- S3 Key- IR Detachers Daily Alarm Log Monthly Alarm Log Yearly Alarm Log Location, Time, Date and Department Alarm Log

  • Smart Tag Remote Alarm Video | WG Security Products, Inc Web Site

    Our new WiFi audible and visual alarm activates when IR Smart Tag alarms. Cloud based data storage is available at no additional charge via WiFi access. This allows the LP or AP departments to track alarms with video by store location, department and time of day. A Video Camera can be added WiFi Visual Audible Remote Alarm for Smart Tags Once the tag has been attacked an audible visual remote alarm activates & turns the DVR on to start recording. Bandit Smart Tag Spec Sheet WG’s audible/visual remote alarm sounds once an attempt or an attack has been made to the smart tag. This remote can detect an attack on a tag up to 100 ft away via WG's smart technology Cloud based data storage is available a t no additional charge through WI-FI access. This allows the LP or AP departments to forensically investigate and track alarm activity with video by store, department and time of day. Daily Alarm Log Monthly Alarm Log Yearly Alarm Log Location, Time, Date and Department Alarm Log

  • eco EAS Technology | WG Security Products, Inc | United States

    eco Pebble delivers smart, comprehensive protection for your products. It keeps you informed about status changes and daily inventory updates for the items it protects. In the event of theft, eco Pebble not only triggers alarms but also updates the Cloud with barcode information, identifying the tampered product and its location. Local alerts integrate seamlessly with your video recorder, and Cloud alerts can be tailored to your needs, whether through emails or other notifications. eco EAS The Start of Something New LPRC Research Report Elevating Box Protection. Interview and trial results of Bandit IR Smart Tag eco Pebble Tag Technology LPRC Research Bandit Tag analysis. Protect What Matters: Introducing eco Pebble Tag Retail shrinkage is a universal challenge, but eco Pebble Tag is here to change the game. Our advanced security system not only self-alarms when tampered with but also triggers the EAS detection system at store entrances. Whether a thief attempts to remove the anti-theft device or walks out with it still attached, eco Pebble Tag ensures that security is immediately notified. While each retailer has their own protocol for handling theft, eco Pebble Tag offers an extra layer of protection by helping you identify what’s been stolen—especially high-value items. Comprehensive Security Features eco Pebble Tag latest design offers all the standard anti-theft features, plus enhanced capabilities. Here’s how it works: General Operation Retailers often equip their stores with strategically placed cameras, known as “zones.” eco Pebble Tags are applied to products within these zones, and readers—called Bubbles—are placed where eco Pebble Tags are present. eco Pebble Tag communicates wirelessly with the Bubble during a tampering event or through daily status updates. The Bubble, in turn, provides visual and audible alarms, triggers the video recorder, and sends notifications via WiFi to the Cloud. The Cloud updates its database and notifies the appropriate departments or individuals that an event has occurred. eco Pebble Tag will alarm under several circumstances: Removal without disarming Cable cutting Entry into a 58kHz detection field without proper removal Triggering an EAS antenna The Bubble The Bubble is a strategic component of the eco Pebble Tag system. Resembling a dome camera, this device is placed in zones where eco Pebble Tags are protecting products. Equipped with a dual alarm system—flashing light and audible alarm—Bubble receives wireless signals from eco Pebble Tags and transmits this information to the Cloud via WiFi. Additionally, the Bubble can trigger the video recorder to take pre-programmed actions, such as enlarging the display of a specific camera or issuing its own alert to store personnel. Some versions of Bubble even include an integrated video camera. The Cloud The Cloud is the backbone of the eco Pebble Tag system, housing a database of product descriptions, barcodes, and locations where eco Pebble Tags are applied. When a Bubble receives an alarm from eco Pebble Tags, it identifies the stolen article and alerts the relevant departments or individuals. The Cloud also receives daily updates from each eco Pebble Tag, comparing the information with its database to update inventory and track sold or stolen items. Retailers can easily retrieve reports on their updated inventory, as well as details on sales and thefts. eco Pebble Tag Versions eco Pebble Tag – Version #1: This version features two recessed knobs—Location and Product. The Location knob is set according to the store’s layout or zone where the eco Pebble Tag is located, while the Product knob reflects the type of item it’s attached to, such as wine and spirts. Inventory updates to the Cloud occur at preset intervals, enabling retailers to query reports on inventory, sold items, and stolen items. eco Pebble Tag – Version #2: In addition to all the features of Version #1, this version includes local memory and an IR scanner port. By scanning the product’s barcode with the IR scanner, the eco Pebble Tag stores the barcode information. If an alert is generated, the barcode data is uploaded wirelessly to the Bubble, which then transmits it to the Cloud along with the alert status. As with Version #1, inventory updates occur at preset intervals, and the Cloud can be queried for detailed reports. Summary eco Pebble Tag delivers smart, comprehensive protection for your products. It keeps you informed about status changes and daily inventory updates for the items it protects. In the event of theft, eco Pebble Tag not only triggers alarms but also updates the Cloud with barcode information, identifying the tampered product and its location. Local alerts integrate seamlessly with your video recorder, and Cloud alerts can be tailored to your needs, whether through emails or other notifications. With Pebble, you get immediate theft notifications and up-to-date inventory reports, ensuring you stay one step ahead. eco Pebble Smart Tag Spec Sheet Remote access to the data management cloud service along with DVR Recording eco EAS the start of something new Our Cloud based data storage is available at no additional charge via Wi-Fi access. This allows the LP or AP departments to conduct forensic investigations and track alarms with video by store location, department and time of day. The eco Pebble Tag is available in 58kHz, 8.2MHz and RFID frequencies. Technology: A.M, R.F, RFID Detachers: Smart IR Detacher Detachers: 3 or 4 Alarm versions: Standard-lock - Super-lock Detachers- S3 Key- IR Detachers Daily Alarm Log Monthly Alarm Log Yearly Alarm Log Location, Time, Date and Department Alarm Log

  • RFID Label Manufacturing | WG Web Site

    In the United States, RFID label manufacturing tailored for retailers is a pivotal industry catering to the evolving needs of the retail sector. Focused on enhancing operational efficiency and inventory management, WG specialize in producing RFID labels designed to seamlessly integrate with retail systems. RFID Label Manufacturing In the United States, RFID label manufacturing tailored for retailers is a pivotal industry catering to the evolving needs of the retail sector. Focused on enhancing operational efficiency and inventory management, WG specialize in producing RFID labels designed to seamlessly integrate with retail systems. The labels incorporate advanced Radio Frequency Identification (RFID) technology, enabling retailers to track and manage inventory with unparalleled accuracy. This technology empowers retailers with real-time insights into stock levels, reduces errors, and facilitates faster checkouts. The RFID label manufacturing sector in the US for retailers is marked by a commitment to providing cost-effective solutions that optimize supply chain processes, ultimately contributing to a more streamlined and responsive retail environment. As retailers increasingly recognize the advantages of RFID technology, WG plays a crucial role in driving its adoption for improved inventory control and customer satisfaction.

  • New IR Technology | WG Security Products, Inc | United States

    The audible/visual remote alarm sounds once an attempt or an attack has been made to the tag. The remote alarm can detect the attack on the tag from upto 40 ft away via WG's Smart Technology. New IR Technology IR Smart Bandit Tag LPRC Research Bandit Tag Analysis. IR Smart Tag Our new slide lever feature once engaged activates the IR Bandit II Smart Tag. When the tag has been deactivated the slide will automatically open allowing for an easy release. (One Handed Operation) The new full-size plunger with anti-slip backing covers a greater surface area, this eliminates false alarms. The Bandit IR Smart Tag or any WG IR Smart Tag can only be deactivated with a WG IR detacher or a WG handheld remote control, as a security feature the remote remains activated for a pre determined period of time. Bandit Tag Spec Sheet IR Extreme Tag IR Extreme new slide lever feature once engaged activates the IR Extreme Smart Tag. When the tag has been deactivated the slide will automatically open allowing for an easy release. (One Handed Operation) The new full-size plunger with anti-slip backing covers a greater surface area, this eliminates false alarms. The Extreme IR Smart Tag or any WG IR Smart Tag can only be deactivated with a WG IR detacher or a WG handheld remote control, as a security feature the remote remains activated for a pre determined period of time. Once the tag has been attacked an audible visual remote alarm activates & turns the DVR on to start recording. WG’s audible/visual remote alarm sounds once an attempt or an attack has been made to the smart tag. This remote can detect an attack on a tag up to 100 ft away via WG's smart technology Cloud based data storage is available a t no additional charge through WI-FI access. This allows the LP or AP departments to forensically investigate and track alarm activity with video by store, department and time of day. Daily Alarm Log Monthly Alarm Log Yearly Alarm Log Location, Time, Date and Department Alarm Log Annual Alarm Log IR Smart Detachers The IR Smart Detacher plays a vital role in the IR Technology. Without this uniquely designed detacher the fourth alarm setting, which makes our IR smart tags the powerful protection tool they are, would be negated. The IR Smart Detacher is also a deactivator. Smart electronics surrounding the magnet emit a coded IR signal that disarms the smart tag upon detachment. Now the tag can be removed without self-alarming. Any attempt to use any other detacher or magnetic material to remove the IR Smart device will result in a self-alarming. The IR Smart Detacher can also detach any other hard tag. It is available in a desktop, a handheld multi-functional, or flush mounted version which can be installed into your cash wrap.

  • IR 4 Alarm Smart BottleTag | WG Security Products, Inc | United States

    Premium Champagnes, Cognacs, Whiskeys, and exquisite wine blends are prime targets for theft. The more exclusive these products, the more appealing they become to shoplifters. Smart Bottle Tag Premium Champagnes, Cognacs, Whiskeys, and exquisite wine blends are prime targets for theft. The more exclusive these products, the more appealing they become to shoplifters. Such high-end items demand a more robust and secure tagging solution than conventional labels or hard tags. The 3 and IR 4 Alarm Bottle Tags. Equipped with a sensor, this innovative tag detects tampering or unauthorized removal. If the tag is interfered with or if a shoplifter attempts to remove it, the tag-alarm is triggered instantly. The 3-Alarm Bottle Tag is compatible with a super Lock detacher for added convenience. Not only does it provide heightened security, but it is also reusable, making it a cost effective solution. The IR4-Alarm Bottle Tag is compatible with a WG IR super Lock detacher for an extra layer of protection added. Not only does it provide heightened security, but it is also reusable, making it a cost-effective solution Available in two sizes: A larger size designed for Champagne. A regular size suitable for wine and spirits. Bottle tag in regular (on the right) and large size (above), Tag IR/O BT 58 BS Tag IR/O BT 58 BS-L Frequency: 58Khz — 8.2Mhz — RFID WG’s audible/visual remote alarm sounds once an attempt or an attack has been made to the smart tag. This remote can detect an attack on a tag up to 100 ft away via WG's smart technology Cloud based data storage is available at no additional charge through WI-FI access. This allows the LP or AP departments to forensically investigate and track alarm activity with video by store, department and time of day. Alarm Reports Daily Alarm Log Monthly Alarm Log Yearly Alarm Log Location, Time, Date and Department Alarm Log

  • How To Apply and remove Bandit Tag S3 Key | WG Web Site

    eco bandit tag can be removed with an S3 key. this allows retailers that use the S3 products to seamlessly add bandit to their theft protection portfolio How To Appy and Remove Bandit Tag How to apply and remove a bandit tag with an S3 Key How the bandit tag works with smart video recording

  • RFID EAS Antenna | WG Web Site

    This convenient upgrade effortlessly integrates Radio Frequency Identification (RFID) technology into your current Acousto-Magnetic (AM) systems, enhancing both shrink control and inventory visibility while safeguarding Electronic Article Surveillance (EAS) infrastructure. RFID/EAS Antenna Wit h the advent of Radio Frequency Identification (RFID), WG has been working tireless ly to maximize the benefits of this innovative technology for the retail loss prevention field. In cooperation with business partners, WG has developed tools for proper utilization of RFID that have a retail asset protection application. Where RFID coils w ere once only used in labels, WG developed three-dimensional reading technology to enable coils embedded in hard tags, increasing pick rates on any compatible EAS system. WG’s revolutionary RFID readers detect signals better than any existing technology and with our state-of-the-art software monitoring, WG’s tags and labels can improve store logistics, inventory management, as well as asset protection applications. WG RFID readers feature special 3-D detection technology. This allows the reader to detect an RFID coil embedded in an EAS tag with greater accuracy than any other RFID antennas in the industry today. The reader emits a radio frequency that is cone-shaped, enabling a large area of coverage. There is no limit to the number of readers, but a single reader can cover a standard six foot glass double-door entrance. The RFID coil is assigned an identifier unique to each individual tag. Identifiers are associated with merchandise, e.g. blue polo shirt or size 10 tennis shoe, and a centralized computer stores the data. RFID readers can read multiple RFID equipped tags at once and record data such as inventory units on hand, quantity and types of merchandise sold; which can provide a perpetual inventory. Because these RFID coils are embedded into tags, they function in conjunction the EAS tag offering information with protection. WG can help any retailer develop an ideal RFID/EAS integration strategy. No two store environments are alike and many factors such as ceiling height, entry points, and employee areas can factor into how many readers are needed for complete logistical merchandise management and asset protection application. Contact WG for more information about this revolutionary technology. This convenient upgrade effortlessly integrates Radio Frequency Identification (RFID) technology into your current Acousto-Magnetic (AM) systems, enhancing both shrink control and inventory visibility while safeguarding Electronic Article Surveillance (EAS) infrastructure. Key Features: Offers an easy-to-install RFID upgrade compatible with existing AM pedestals, ensuring a straightforward and cost-effective enhancement. Safeguards your EAS infrastructure investment while providing advanced RFID functionality. Seamlessly combines reliable AM EAS technology with sophisticated RFID capabilities, enabling precise item-level intelligence. Introduces genuine directional sensing of RFID tag movement through innovative technology at exits, transition areas, or zones.

  • 3 Alarm Bandit Tag | WG Web Site

    The Bandit  Smart Tag is specifically designed for advanced security of boxed merchandise and is easy for your employees to use. It boasts faster application and removal by an authorized IR detacher than any other EAS box tag. 3 Alarm Bandit Tag Bandit Smart Tag Spec Sheet WG’s selection of Smart Tags provides multiple layers of protection for any retail format. WG has a solution for merchandise such as luggage, women's handbags and boxed goods. The Bandit Smart Tag is specifically designed for advanced security of boxed merchandise and is easy for your employees to use. It boasts faster application and removal by an authorized IR detacher than any other EAS box tag. Features: Bandit Tag easily attaches to boxed merchandise. The WG Bandit slide lever feature, when engaged activates the smart tag. When the tag has been deactivated the lever will automatically unlock, allowing for an easy release. (One Handed Operation) The plunger on the bottom of the tag detects when the tag is resting against the surface The Bandit smart tag can only be deactivated with Superlock detacher Bandit full-size plunger with anti slip backing covers a greater surface area and holds the tag firmly in place. Remote Alarm: Our Wi-Fi visual and audible alarm activates when the Bandit tag alarms. Cloud based data storage is available at no additional charge via Wi-Fi access. This allows the LP or AP departments to conduct forensic investigations and track alarms with video by store location, department and time of day. The Bandit is available in 58kHz and 8.2 kHz frequencies and can be deactivated with a WG IR detacher. EAS Alarm: When tag is in armed status, any events causing tag to enter the EAS system’s field will trigger the tag to self-alarm as well as the system will alarm. Removal of the Tag: The sales associate places the tagged merchandise on the Superlock Detacher, You will hear a beep from the tag (this indicates that the tag is deactivated), the locking lever will automatically switch to the unlocked position. The sales associate can now safely remove the tag from the package box. Available with Active RFID chip set. Measurements: Width: 1.377” / 34.97mmLength: 2.7” / 70mmThickness: 0.5” / 14.10mm Band Length S 4" / 101mm Expands to 8"/202mm Band Length L 10" / 254mm Expands to 20"/508mm Once the tag has been attacked an audible visual remote alarm activates, & turns the DVR on to start recording. WG’s audible/visual remote alarm sounds once an attempt or an attack has been made to the smart tag. This remote can detect an attack on a tag up to 100 ft away via WG's smart technology Cloud based data storage is available at no additional charge through WI-FI access. This allows the LP or AP departments to forensically investigate and track alarm activity with video by store, department and time of day. Daily Alarm Log Monthly Alarm Log Yearly Alarm Log Location, Time, Date and Department Alarm Log

  • Retail RFID | WG Web Site

    Radio Frequency Identification (RFID), WG has been working tirelessly to maximize the benefits of this innovative technology for the retail loss prevention field. In cooperation with business partners, WG has developed tools for proper utilization of RFID that have a retail asset protection application. Where RFID coils were once only used in labels, WG developed three-dimensional reading technology to enable coils embedded in hard tags, increasing pick rates on any compatible EAS system. Retail RFID With the advent of Radio Frequency Identification (RFID), WG has been working tirelessly to maximize the benefits of this innovative technology for the retail loss prevention field. In cooperation with business partners, WG has developed tools for proper utilization of RFID that have a retail asset protection application. Where RFID coils were once only used in labels, WG developed three-dimensional reading technology to enable coils embedded in hard tags, increasing pick rates on any compatible EAS system. WG’s revolutionary RFID readers detect signals better than any existing technology and with our state-of-the-art software monitoring, WG’s tags and labels can improve store logistics, inventory management, as well as asset protection applications. WG RFID readers feature special 3-D detection technology. This allows the reader to detect an RFID coil embedded in an EAS tag with greater accuracy than any other RFID antennas in the industry today. The reader emits a radio frequency that is cone-shaped, enabling a large area of coverage. There is no limit to the number of readers, but a single reader can cover a standard six foot glass double-door entrance. The RFID coil is assigned an identifier unique to each individual tag. Identifiers are associated with merchandise, e.g. blue polo shirt or size 10 tennis shoe, and a centralized computer stores the data. RFID readers can read multiple RFID equipped tags at once and record data such as inventory units on hand, quantity and types of merchandise sold; which can provide a perpetual inventory. Because these RFID coils are embedded into tags, they function in conjunction the EAS tag offering information with protection. WG can help any retailer develop an ideal RFID/EAS integration strategy. No two store environments are alike and many factors such as ceiling height, entry points, and employee areas can factor into how many readers are needed for complete logistical merchandise management and asset protection application. Contact WG for more information about this revolutionary technology.

  • eco EAS one piece tag | WG Security Products, Inc | United States

    eco One piece Tag delivers smart, comprehensive protection for your products. It keeps you informed about status changes and daily inventory updates for the items it protects. In the event of theft, eco One piece Tag not only triggers alarms but also updates the Cloud with barcode information, identifying the tampered product and its location. Local alerts integrate seamlessly with your video recorder, and Cloud alerts can be tailored to your needs, whether through emails or other notifications. eco EAS TM The Start of Something New LPRC Research Report Elevating Box Protection. Interview and trial results of Bandit IR Smart Tag eco One Piece Tag Technology LPRC Research Bandit Tag analysis. Protect What Matters: Introducing eco One Piece Tag Retail shrinkage is a universal challenge, but eco One Piece Tag is here to change the game. Our advanced security system not only self-alarms when tampered with but also triggers the EAS detection system at store entrances. Whether a thief attempts to remove the anti-theft device or walks out with it still attached, eco One Piece Tag ensures that security is immediately notified. While each retailer has their own protocol for handling theft, eco One Piece Tag offers an extra layer of protection by helping you identify what’s been stolen—especially high-value items. Comprehensive Security Features eco One Piece Tag latest design offers all the standard anti-theft features, plus enhanced capabilities. Here’s how it works: General Operation Retailers often equip their stores with strategically placed cameras, known as “zones.” eco One Piece tags are applied to products within these zones, and readers—called Bubbles—are placed where eco Lanyard tags are present. eco One Piece Tag communicates wirelessly with the Bubble during a tampering event or through daily status updates. The Bubble, in turn, provides visual and audible alarms, triggers the video recorder, and sends notifications via WiFi to the Cloud. The Cloud updates its database and notifies the appropriate departments or individuals that an event has occurred. eco One Piece Tag will alarm under several circumstances: Removal without disarming Entry into a 58kHz detection field without proper removal Triggering an EAS antenna The Bubble The Bubble is a strategic component of the eco One Piece Tag system. Resembling a dome camera, this device is placed in zones where eco One Piece Tags are protecting products. Equipped with a dual alarm system—flashing light and audible alarm—Bubble receives wireless signals from eco One Piece Tag and transmits this information to the Cloud via WiFi. Additionally, the Bubble can trigger the video recorder to take pre-programmed actions, such as enlarging the display of a specific camera or issuing its own alert to store personnel. Some versions of Bubble even include an integrated video camera. The Cloud The Cloud is the backbone of the eco One Piece Tag system, housing a database of product descriptions, barcodes, and locations where eco One Piece Tag tags are applied. When a Bubble receives an alarm from eco One Piece Tag, it identifies the stolen article and alerts the relevant departments or individuals. The Cloud also receives daily updates from each eco One Piece Tag, comparing the information with its database to update inventory and track sold or stolen items. Retailers can easily retrieve reports on their updated inventory, as well as details on sales and thefts. eco One Piece Tag Versions eco One Piece Tag – Version #1: This version features two recessed knobs—Location and Product. The Location knob is set according to the store’s layout or zone where the eco One Piece Tag is located, while the Product knob reflects the type of item it’s attached to, such as Jackets, coats, dresses and other soft garments. Inventory updates to the Cloud occur at preset intervals, enabling retailers to query reports on inventory, sold items, and stolen items. eco One Piece Tag – Version #2: In addition to all the features of Version #1, this version includes local memory and an IR scanner port. By scanning the product’s barcode with the IR scanner, the eco One Piece Tag stores the barcode information. If an alert is generated, the barcode data is uploaded wirelessly to the Bubble, which then transmits it to the Cloud along with the alert status. As with Version #1, inventory updates occur at preset intervals, and the Cloud can be queried for detailed reports. Summary eco One Piece Tag delivers smart, comprehensive protection for your products. It keeps you informed about status changes and daily inventory updates for the items it protects. In the event of theft, eco One Piece Tag not only triggers alarms but also updates the Cloud with barcode information, identifying the tampered product and its location. Local alerts integrate seamlessly with your video recorder, and Cloud alerts can be tailored to your needs, whether through emails or other notifications. With eco One Piece Tag, you get immediate theft notifications and up-to-date inventory reports, ensuring you stay one step ahead. Remote access to the data management cloud service along with DVR Recording eco One Piece Tag Spec Sheet eco EAS the start of something new Our Cloud based data storage is available at no additional charge via Wi-Fi access. This allows the LP or AP departments to conduct forensic investigations and track alarms with video by store location, department and time of day. The eco One Piece Tag is available in 58kHz, 8.2MHz and RFID frequencies. Technology: A.M, R.F, RFID Detachers: Smart IR Detacher Detachers: 3 or 4 Alarm versions: Standard-lock - Super-lock Detachers- S3 Key- IR Detachers Daily Alarm Log Monthly Alarm Log Yearly Alarm Log Location, Time, Date and Department Alarm Log

  • WG Warranty | WG Web Site

    STANDARD WARRANTY STATEMENT This is the warranty statement for WG products STANDARD WARRANTY STATEMENT WG Standard Product Warranty 1. Warranty Coverage WG ("Seller") warrants that its hardware products will be free from defects in materials and workmanship and will perform in accordance with the applicable product specifications under normal use and service. This limited warranty applies only to physical hardware products manufactured or supplied by WG. It does not apply to software, consumables, third-party accessories, or products modified outside of WG-authorized service channels. Product Type Standard WG Products Warranty Period 1 year from shipment date WG Repairs 90 days from shipment date 2. Warranty Eligibility Requirements To be eligible for warranty service, the following conditions must be met: The Buyer must provide written notice to WG of any alleged defect within the applicable warranty period. The Buyer must request and obtain a Return Material Authorization (RMA) number from WG before shipping the product. The product must be returned to WG’s designated facility with all freight and insurance prepaid by the Buyer. WG must verify, upon inspection, that: The defect exists, The defect is due to faulty materials or workmanship, The product has not been subjected to misuse, abuse, unauthorized repair, improper installation, negligence, accident, alteration, or environmental damage (e.g., electrical surges, humidity, dust, or failure of climate control systems). 3. Scope of Warranty Service If WG determines that the returned product is covered under this warranty, WG will, at its sole discretion, do one of the following: Repair the product using new or refurbished parts, Replace the product with a new or refurbished unit of equal or greater functionality, Provide a refund of the original purchase price (only in cases where repair or replacement is not feasible). Repairs or replacements under warranty do not reset or extend the original warranty period. If a returned product is determined by WG to be free of defects or outside the scope of warranty coverage, the Buyer will be responsible for: WG’s standard diagnostic and handling fees, The cost of return shipping, Any repair fees, quoted and approved in advance. 4. Exclusions and Limitations This warranty does not cover: Cosmetic damage (e.g., scratches, dents, or discoloration), Damage caused by external causes such as accidents, acts of nature, power surges, or unauthorized use, Failure resulting from use outside the intended operating environment or specifications, Software, firmware, consumable items, or non-WG components, Normal wear and tear. WG is not responsible for any labor, installation, or removal costs related to product replacement. 5. Return & Restocking Policy (Non-Defective Items) Returns of non-defective WG products are subject to the following conditions: All returns must be pre-approved by WG and accompanied by a valid RMA number. Products must be returned in new, unused, and resalable condition, in original packaging with all components and documentation included. Restocking Fees will apply as follows: Standard Items: 25% of the original invoice price Custom-Built or Special-Order Items: 30%–50%, depending on product type and reusability Shipping charges are non-refundable and return shipping must be prepaid by the Buyer. WG reserves the right to refuse returns that do not meet these conditions. 6. Transferability This warranty is extended to the original Buyer only and is non-transferable unless explicitly agreed to in writing by WG. 7. Exclusive Remedy The remedies described in this document are the sole and exclusive remedies available to the Buyer. In no event shall WG’s liability exceed the original purchase price of the product. 8. Limitation of Liability To the maximum extent permitted by law: WG shall not be liable for indirect, incidental, consequential, punitive, or special damages, including but not limited to loss of revenue, profits, business opportunities, or data. WG’s total liability under any circumstance shall not exceed the amount paid by the Buyer for the product giving rise to the claim. 9. Disclaimer of Other Warranties This warranty is provided in lieu of all other warranties, whether express or implied, including, but not limited to, any implied warranties of merchantability, fitness for a particular purpose, or non-infringement. No agent, representative, or employee of WG is authorized to create or modify any warranty terms unless expressly approved in writing by an authorized WG officer.

bottom of page