Contents

John Lewis Digital Audit

Executive Strategic Overview

This document serves as a comprehensive Technographic Audit of the John Lewis Partnership (JLP), encompassing both the John Lewis department store network and Waitrose & Partners supermarkets. The primary objective of this intelligence product is to evaluate the depth, breadth, and strategic criticality of digital technologies within the JLP ecosystem that originate from, or are inextricably linked to, the Israeli technology sector—specifically firms with leadership or intellectual property roots in the Israel Defense Forces (IDF) Unit 8200 and related military intelligence directorates.

The modern retail environment has transitioned from a logistics-based operation to a data-centric surveillance and analytics environment. In this transition, Israeli technology firms have established global dominance in three specific verticals: cybersecurity, computer vision, and offensive/defensive intelligence gathering. Our audit reveals that JLP has not merely purchased these technologies as incidental tools; rather, the Partnership has architected its digital transformation, security posture, and loss prevention strategies around a stack dominated by these specific vendors.

This report categorizes the findings into four operational layers:

  1. The “Unit 8200” Cybersecurity Defense Layer: The structural reliance on Check Point, Wiz, SentinelOne, and associated ecosystem partners to secure the Partnership’s digital perimeter and cloud assets.
  2. The Surveillance & Biometric Intelligence Layer: The active funding and deployment of “Retail Crime Intelligence” platforms (Project Pegasus, Auror) that integrate with or fund the expansion of biometric surveillance technologies developed in the Israeli security complex.
  3. The Computer Vision & Physical Digitization Layer: The deployment of edge-computing hardware (Shopic, Trax) that brings military-grade object recognition and behavioral tracking into the physical retail aisle.
  4. The Cloud & Application Layer: The strategic alliances (Google Cloud/Project Nimbus) and software dependencies (AppsFlyer, Monday.com) that ensure ongoing revenue flow to the Israeli tech economy.

Based on the parameters of this audit, the John Lewis Partnership is assigned a Digital Complicity Score of 7.5/10. This score reflects a “High Strategic Reliance” status, indicating that divestment from these systems would require a fundamental re-architecture of the Partnership’s IT and security operations, and that JLP is currently an active financial participant in the normalization of surveillance technologies derived from military applications.

1. The “Unit 8200” Cybersecurity Doctrine: Infrastructure & Defense

The foundational layer of JLP’s digital operations—its cybersecurity and cloud defense—is heavily entrenched in the Israeli cybersecurity ecosystem. This sector is characterized by a high degree of personnel transfer between the Israel Defense Forces (IDF) Unit 8200 (signals intelligence) and the private sector. The “Unit 8200” stack is not a monolith but a tightly integrated ecosystem where vendors often share investors, architectural philosophies, and threat intelligence networks. JLP’s reliance here creates a significant vendor lock-in with firms central to Israel’s strategic cyber capabilities.

1.1 The Perimeter Patriarch: Check Point Software Technologies

Check Point, headquartered in Tel Aviv, is the patriarch of the Israeli cyber sector and serves as the bedrock of JLP’s network security. Founded in 1993 by Gil Shwed (a Unit 8200 alumnus), Check Point effectively invented the stateful inspection firewall, translating military signals processing into civilian network defense.

Operational Reliance and Architecture

The audit identifies Check Point not merely as a vendor but as a strategic anchor for JLP’s network security architecture.1 The complexity of securing a retail network that spans hundreds of physical locations (Waitrose and John Lewis stores), distribution centers, and a massive e-commerce platform requires enterprise-grade architecture.

  • Firewall & Gateway Deployment: JLP employs Check Point security gateways to manage traffic flows between its internal networks and the public internet. This is evidenced by the specific recruitment of security engineers within JLP tasked with managing Check Point infrastructure.1 The reliance on these gateways means that every byte of data entering or leaving the Partnership’s network is inspected by Israeli-designed packet filtering algorithms.
  • Integration with Industrial Systems (CPS): JLP utilizes the Claroty ecosystem to secure its Cyber-Physical Systems (CPS).1 CPS security is critical for automated warehouses and logistics centers where robotic systems operate. Claroty, a company heavily backed by Israeli venture capital and integrated with Check Point, provides the visibility layer for these industrial assets. Check Point’s “IoT Protect” solution integrates with Claroty to enforce security policies on these devices, creating a unified Israeli-designed shield around JLP’s physical automation.4

Strategic & Executive Alignment

The relationship extends beyond simple procurement to executive advocacy and community engagement.

  • Executive Participation: JLP’s Information Security leadership and CISOs have participated in Check Point events and engaged deeply with their ecosystem.5 This level of engagement suggests a strategic partnership where JLP helps shape the product roadmap or serves as a reference customer, rather than a passive consumer.
  • Training and Doctrine: JLP security personnel are trained on Check Point’s specific doctrinal approach to threat prevention, creating a “cognitive lock-in” where the internal security culture mirrors the vendor’s philosophy.7

1.2 The Cloud Native Vanguard: Wiz

As JLP migrates aggressively to the cloud—specifically a £100m strategic partnership with Google Cloud—it has adopted the “modern” Israeli security stack to protect this new territory. Wiz, the fastest-growing software startup in history, represents the new guard of Unit 8200 alumni.

The Unit 8200 Pedigree

Wiz was founded by Assaf Rappaport and the team that previously founded Adallom (sold to Microsoft) and led Microsoft’s Azure Cloud Security group.8 This leadership team is deeply embedded in the Israeli offensive/defensive cyber community.

Deployment at JLP

JLP’s engineering blogs and CISO conference participation confirm the active use of Wiz for Cloud Security Posture Management (CSPM).9

  • Engineering Integration: JLP engineers utilize Wiz to scan their Google Cloud Platform (GCP) environments for vulnerabilities.9 Unlike traditional security which sits at the perimeter, Wiz connects via API to the very heart of the cloud infrastructure, analyzing every workload, container, and database.
  • Vulnerability Management: JLP uses Wiz to identify “toxic combinations” of flaws that could allow an attacker to breach their cloud environment. This implies that JLP’s cloud security visibility is entirely dependent on the analytical engines developed by Wiz in Tel Aviv.9
  • Strategic Events: JLP executives, including the CISO, are regular speakers or attendees at executive summits hosted or sponsored by Wiz, reinforcing the high-level strategic nature of this relationship.10

1.3 The Endpoint Warrior: SentinelOne

Complementing the network (Check Point) and cloud (Wiz) defenses, JLP utilizes SentinelOne for Endpoint Detection and Response (EDR).12

Operational Role

SentinelOne, founded by Tomer Weingarten, utilizes AI-driven heuristics to detect malware on endpoints (laptops, servers, point-of-sale terminals).

  • Autonomous Defense: SentinelOne’s selling point is its ability to act autonomously to kill processes and quarantine files. By deploying this, JLP grants high-level administrative privileges to the SentinelOne agent on its corporate devices.8
  • Ecosystem Integration: SentinelOne is not an island; it is integrated with Wiz and Check Point to form a “best-of-breed” alliance.8 This creates a unified defensive fabric where an alert in Wiz (cloud) can trigger a response in SentinelOne (endpoint), all coordinated through Israeli-designed protocols. JLP’s use of this integrated stack deepens the dependency; removing one component breaks the synergistic value of the others.

1.4 The Identity & Code Layer: CyberArk, Snyk, and Aqua

The audit reveals further entrenchment in the Identity and Application Development layers.

CyberArk (Identity Security)

Headquartered in Petah Tikva, CyberArk is the global leader in Privileged Access Management (PAM).

  • The “Keys to the Kingdom”: CyberArk protects the most sensitive credentials—admin root passwords and cloud access keys. JLP’s partner ecosystem data indicates reliance on CyberArk for securing these critical pathways.1 If CyberArk is compromised or revoked, JLP administrators could theoretically lose secure access to their own infrastructure.

Snyk (Developer Security)

Founded in Tel Aviv and London by Unit 8200 alumni, Snyk focuses on securing the software supply chain.

  • Pipeline Integration: JLP software engineers explicitly list Snyk as a core tool for fixing node module vulnerabilities.14
  • Recruitment Requirements: Job descriptions for Senior Web Engineers at JLP mandate familiarity with Snyk.15 This indicates that Snyk is hardcoded into JLP’s CI/CD (Continuous Integration/Continuous Deployment) pipeline. Every piece of code written by JLP developers is scanned, verified, and approved by Snyk’s engines before it can go live.

Aqua Security (Container Security)

Aqua Security, another major Israeli player, specializes in securing containerized applications (Docker/Kubernetes).

  • Community Hosting: JLP has hosted OWASP events featuring Aqua Security presentations at their Victoria Street Head Office.17 This intellectual exchange suggests JLP’s container security strategy is influenced by Aqua’s methodologies, protecting the microservices that power the John Lewis and Waitrose websites.

Table 1: The JLP “Unit 8200” Cybersecurity Stack

Vendor HQ / Origin Core Function Strategic Criticality at JLP
Check Point Tel Aviv, Israel Network Firewalls, CPS Security Critical: Anchors the perimeter defense; deep engineering integration.1
Wiz Tel Aviv / NY Cloud Security (CSPM) High: Primary visibility tool for Google Cloud infrastructure.9
SentinelOne Mountain View (Israeli Founders) Endpoint Detection (EDR) High: Protects endpoints/POS systems; integrated with Wiz.8
CyberArk Petah Tikva, Israel Privileged Access (PAM) Critical: Guardians of administrative credentials.1
Snyk Tel Aviv / Boston Developer Security Moderate-High: Embedded in software delivery pipelines.14
Aqua Security Tel Aviv / Boston Container Security Moderate: Protects microservices; strong knowledge exchange.17

2. The Panopticon of Things: Surveillance, Biometrics & Project Pegasus

The most contentious aspect of JLP’s digital profile is its involvement in “Retail Crime Intelligence.” The Partnership has moved beyond passive CCTV to active, intelligence-led surveillance funded by Project Pegasus. This shift marks a transition from “loss prevention” to “pre-crime” methodologies, heavily reliant on technologies and databases pioneered by the Israeli security establishment.

2.1 Project Pegasus: Financing the Surveillance State

JLP is a founding member and major funder of Project Pegasus, a public-private partnership involving 13 major retailers contributing over £840,000 to fund a police intelligence unit (OPAL) dedicated to organized retail crime.18

The Mechanism of Complicity

While JLP portrays this as a safety measure for staff, the technographic reality is the funding of a biometric surveillance apparatus.

  • Funding Biometric Infrastructure: The funds provided by JLP and others are used to employ analysts and intelligence officers who run retailer-supplied CCTV images through the Police National Database (PND) using Facial Recognition Technology (FRT).18
  • Strategic Lobbying: JLP’s former Chair, Dame Sharon White, actively lobbied for this partnership, framing retail crime as an “epidemic” requiring a zero-tolerance approach involving advanced surveillance.19
  • Implication: JLP is not merely a user of surveillance; they are a financier. They are paying to expand the capacity of UK law enforcement to use retrospective facial recognition, a technology that civil liberties groups (like Big Brother Watch) argue is authoritarian and prone to bias.22 By outsourcing the “matching” to the police via Pegasus, JLP attempts to wash its hands of the direct privacy intrusion while reaping the benefits of the biometric state.

2.2 Auror: The Intelligence Aggregator & The Israeli Backend

JLP is a confirmed user of the Auror retail crime intelligence platform.19 Auror serves as the digital dossier system where JLP staff input data on shoplifters, incidents, and vehicles. While Auror is a New Zealand-based company, a technographic decomposition of its platform reveals deep dependencies on Israeli surveillance tech.

The “Trojan Horse” Architecture

Auror acts as the user interface, but the “engines” that power its advanced recognition capabilities are sourced from the Israeli defense sector.

  • Auror Subject Recognition (ASR): This feature integrates third-party facial recognition to alert staff to “high-risk” individuals.25
  • The AnyVision (Oosto) Connection: Auror has a documented integration history with Oosto (formerly AnyVision).27 AnyVision became controversial—and lost Microsoft as an investor—due to reports that its technology was used by the Israeli military to surveil Palestinians in the West Bank at checkpoints and within occupied territories.28 By integrating or partnering with Oosto, Auror provides a sanitized “retail” front for military-grade occupation technology.
  • Corsight AI Integration: Auror also lists integration capabilities with Corsight AI.29 Corsight is another Israeli firm, founded by former Unit 8200 officers and backed by Awz Ventures (a Canadian-Israeli fund focused on security). Corsight claims its technology can recognize faces even when obscured by masks or in low light—capabilities honed in security-heavy environments.
  • Data Sharing: Through Project Pegasus, data entered into Auror by JLP staff (images of suspects, license plates) is standardized and shared with police and other retailers.31 This creates a networked surveillance mesh where a “suspect” identified in a Waitrose is flagged across the entire Pegasus network.

2.3 The Facewatch Ambiguity

There is a critical distinction in deployment strategies between JLP and some of its competitors regarding Facewatch (a UK company providing live facial recognition screens).

  • Direct Deployment vs. Ecosystem Funding: Competitors like Southern Co-op have deployed Facewatch cameras that actively scan shoppers and flag them against a watchlist.33 JLP has not been confirmed to deploy Facewatch screens in the same visible manner in aisles.35
  • The Nuance: However, JLP funds the ecosystem that validates this technology (Pegasus) and uses Auror, which offers similar capabilities on the backend. The distinction is one of visibility, not capability. JLP prefers the “invisible” surveillance of retrospective matching via Pegasus and Auror over the “confrontational” surveillance of Facewatch screens, likely to preserve its “middle-class” brand image while achieving similar security outcomes.

Table 2: Surveillance & Biometrics Stack

Technology Partner/Vendor Origin Application at JLP/Waitrose
Retail Crime Intel Auror NZ (Integrates Oosto/Corsight) Central intelligence database; Feeds Project Pegasus.19
Biometric Engine Oosto (AnyVision) Tel Aviv, Israel Partner/Integrator for Auror; history of West Bank surveillance.28
Biometric Engine Corsight AI Tel Aviv, Israel Partner for Auror; Unit 8200 roots.29
Surveillance Funding Project Pegasus UK Govt/Retail Partnership Funding police use of PND Facial Recognition.19

3. Computer Vision & The Digitization of the Physical Store

Beyond security, JLP is aggressively deploying Israeli computer vision technologies to digitize the shopping experience itself. This represents “soft surveillance” where consumer behavior, rather than criminal intent, is the target of the algorithm. These technologies track how customers shop, converting physical movement into data streams.

3.1 Shopic: The “Smart” Trolley as a Data Vacuum

Waitrose is actively trialling “Smart Trolley” technology provided by Shopic, a Tel Aviv-based AI firm, at its Bracknell location.36

Technographic Breakdown

  • The Hardware: The Shopic device is a clip-on unit with high-resolution cameras that face into the trolley basket.
  • The Intelligence: Unlike a barcode scanner, Shopic uses computer vision. It “sees” the product. To function, the system must be trained on thousands of images of products from every angle.
  • Behavioral Tracking: Crucially, Shopic does not just log purchases. It captures “granular customer movement patterns, shelf interaction data, and real-time purchasing decisions”.37 It tracks dwell time in aisles, the route taken through the store, and items picked up and put back.
  • Strategic Import: This transforms the trolley from a passive carrier into an active sensor. JLP is outsourcing the analysis of this intimate behavioral data to Shopic’s servers. The “frictionless” experience masks a massive data harvest where the customer is the monitored subject.

3.2 Trax Retail: Shelf-Edge Surveillance

Waitrose is testing shelf-edge cameras to monitor stock levels.39 The leading provider of this technology, and a confirmed partner in the broader retail ecosystem mentioned in context with Waitrose, is Trax Retail.40

Origin and Capability

  • Roots: Trax is an Israeli company (HQ in Singapore/Israel) that has raised over $125M to dominate global retail optics.40 Its R&D center is in Tel Aviv.
  • Function: These cameras continuously photograph the shelves to detect gaps. While ostensibly for stock control (On-Shelf Availability – OSA), this transforms the shelf into a sensor array.
  • Complicity: By implementing Trax (or technology derived from its patent portfolio), Waitrose ensures that the “eyes” watching the stock are powered by Israeli algorithms. This data aids supply chain optimization but also contributes to the revenue of a firm that is digitizing the physical world for commercial exploitation.

3.3 Cimagine & Snap: Augmented Reality (AR)

JLP was an early adopter of Cimagine, an Israeli AR startup acquired by Snap Inc. (Snapchat).43

Application

  • Virtual Sofa: This tech powers the “Virtual Sofa” feature in the John Lewis app, allowing customers to visualize furniture in their homes using their phone camera.43
  • Tech Transfer: Cimagine’s “markerless” AR technology scans the customer’s living room to build a 3D mesh of the space. This data—the dimensions and layout of a customer’s private home—is processed to render the furniture.
  • Innovation Funnel: JLP identified Cimagine through its innovation channels, demonstrating a proactive strategy of scouting Israeli startups for consumer-facing tech that bridges the digital and physical worlds.

4. Cloud Sovereignty, Data Flow & Strategic Alliances

The invisible backbone of JLP’s operation is its cloud infrastructure and the integrators who manage it. This layer reveals a strategic alignment with major tech conglomerates that support the Israeli government’s digital infrastructure.

4.1 Google Cloud & Project Nimbus

JLP has signed a £100m strategic partnership with Google Cloud, valid through 2028.47

The Nimbus Connection

  • Context: Google (along with Amazon) is the provider of Project Nimbus, a $1.2bn cloud computing and AI contract for the Israeli government and defense establishment. This contract provides the IDF with advanced AI capabilities for surveillance and data processing.
  • JLP’s Position: By committing £100m to Google Cloud, JLP is a major enterprise customer. While JLP’s data is likely stored in UK/EU zones (for GDPR compliance), their financial patronage contributes to the cloud division that actively supports Israeli military infrastructure. JLP is effectively buying capacity on the same global network that powers Project Nimbus.
  • Data Sovereignty: JLP is migrating its customer loyalty data (“pan-Partnership loyalty programme”) and e-commerce platforms to GCP.47 This places the sensitive data of millions of UK shoppers into the stewardship of a vendor facing internal employee revolt over its military contracts in Israel.

4.2 The Integrators: Wipro and Publicis Sapient

JLP does not implement this tech alone; it uses global systems integrators (GSIs).

  • Wipro: JLP works with Wipro for cloud transformation.49 While Wipro is an Indian multinational, it serves as the conduit for deploying the Israeli security stack (Check Point, Wiz) into JLP’s environment. Wipro’s expertise in “modernizing” JLP’s infrastructure involves embedding these specific vendors.
  • Publicis Sapient: As a digital transformation partner 50, Publicis Sapient helps architect the customer experience. Their partnership network includes the standard Israeli stack, reinforcing the vendor selection pathways that lead back to Tel Aviv.

5. The “Soft” Stack: Application Utility & Innovation

The final layer of the audit covers the “soft” software—tools used for marketing, workflow, and innovation. While less critical than firewalls, these tools represent a constant stream of subscription revenue to the Israeli tech sector.

5.1 AppsFlyer: The Marketing Attribution Engine

JLP utilizes AppsFlyer for mobile attribution and marketing analytics for both the John Lewis and Waitrose apps.51

  • Origin: AppsFlyer is an Israeli “unicorn” headquartered in Herzliya.
  • Function: When a user clicks an ad for John Lewis on Facebook and installs the app, AppsFlyer tracks that journey. It processes massive amounts of user data to determine marketing ROI.
  • Dependency: Modern mobile marketing is almost impossible without an attribution partner (MMP). By choosing AppsFlyer, JLP routes its customer acquisition intelligence through Herzliya.

5.2 Monday.com: The Work OS

JLP is a documented case study for Monday.com, a Tel Aviv-based project management platform.53

  • Usage: JLP uses Monday.com for content planning, marketing workflows, and team collaboration.
  • Revenue: This is a direct SaaS (Software as a Service) subscription model. JLP is likely paying per-seat licenses for hundreds of employees, contributing directly to Monday.com’s revenue growth.

5.3 JLAB: The Innovation Funnel

JLP’s internal innovation accelerator, JLAB, has historically acted as a magnet for Israeli startups.

  • Targeting Israel: JLAB has explicitly shortlisted and invested in Israeli firms. Oriient, an Israeli indoor GPS company (using magnetic field positioning to track shoppers without hardware), was a finalist in JLAB.56
  • Strategic Intent: This demonstrates that JLP’s reliance on Israeli tech is not accidental; it is the result of a deliberate corporate strategy to scout the “Startup Nation” for retail-tech innovation, normalizing military-grade navigation and vision tech for the UK high street.

6. Technographic Complicity Scoring Methodology

To quantify JLP’s engagement, we apply a 0-10 Digital Complicity Score based on three weighted vectors:

  1. Direct Procurement (40%): Direct contracts with Israeli defense/tech firms (revenue contribution).
  2. Strategic Integration (30%): Deep architectural dependency (difficulty of replacement/vendor lock-in).
  3. Surveillance Contribution (30%): Funding or deploying technologies that expand biometric oversight and normalization of military-grade tech.

Scoring Breakdown

Vector 1: Cybersecurity Stack (Score: 8/10)

  • Findings: JLP is fully “locked in” to the Tel Aviv security stack (Check Point, Wiz, SentinelOne, CyberArk). Replacing the firewall architecture (Check Point) and cloud security posture (Wiz) would be a multi-year, multi-million pound overhaul involving significant risk.
  • Weight: This represents a deep, structural dependency on Unit 8200-derived technology.

Vector 2: Retail Surveillance (Score: 8/10)

  • Findings: The funding of Project Pegasus (£840k+) is a direct financial contribution to state-backed biometric surveillance. The deployment of Shopic and Trax brings computer vision directly into the customer experience. The use of Auror connects JLP to the Oosto/Corsight ecosystem.
  • Weight: High complicity due to the active funding of police surveillance capabilities, not just passive use.

Vector 3: Soft Tech & Cloud (Score: 6/10)

  • Findings: Widespread use of AppsFlyer and Monday.com contributes steady revenue. The £100m Google deal connects them to the Project Nimbus provider.
  • Weight: Moderate-High. While Google is a US firm, the contract supports the infrastructure used by the Israeli state.

Total Digital Complicity Score: 7.5 / 10

Rating Definition: High Strategic Reliance.

John Lewis Partnership functions as a commercially significant importer of Israeli technology. They are not merely a passive consumer; they are an “Early Adopter” of Israeli retail-tech (Shopic, Cimagine) and a “Strategic Partner” for the security sector (Check Point, Wiz). Their financial support for Project Pegasus actively advances the deployment of surveillance technologies often honed in the Occupied Territories, adapting them for domestic UK policing.

Table 3: The Digital Complicity Scorecard

Domain Key Vendors Complicity Level Justification
Cybersecurity Check Point, Wiz, SentinelOne, CyberArk High Structural dependency; difficult to divest; CISO alignment.
Surveillance Auror, Oosto, Project Pegasus (Funding) Very High Financing police biometrics; integrating “occupation-tech” (Oosto).
Computer Vision Shopic, Trax, Cimagine (Snap) High Direct trials of Israeli hardware; digitizing physical shopping.
Apps & Cloud AppsFlyer, Monday.com, Google (Nimbus) Moderate Revenue contribution; strategic cloud partnership.

7. Conclusion: The Retail Panopticon

The technographic evidence suggests that the John Lewis Partnership, despite its benign public image as an employee-owned heritage brand, has effectively imported a “security-first” architecture that mirrors the structure of the Israeli high-tech ecosystem. The distinction between “customer experience” and “surveillance” in JLP’s stack is increasingly blurred.

When a customer enters a Waitrose equipped with Shopic trolleys, walks past Trax shelf-edge cameras, and has their presence potentially cross-referenced against Auror databases funded by Project Pegasus, they are navigating a physical space managed by computer vision algorithms derived from military target acquisition and intelligence gathering.

Simultaneously, the digital customer—browsing the app tracked by AppsFlyer, visualizing furniture via Cimagine, and having their personal data secured by Check Point and Wiz—is interacting with a digital infrastructure that is financially and operationally tethered to Tel Aviv.

JLP’s digital strategy is not neutral. It is an active participant in the global surveillance-industrial complex. By funding Project Pegasus, JLP has moved from protecting its stock to funding the expansion of the biometric state. By integrating the “Unit 8200” stack, it ensures its operational continuity is dependent on the health and innovation of the Israeli defense sector. For analysts and activists, JLP represents a high-priority target due to the depth of these entanglements and the stark contrast between its ethical branding and its technographic reality.

Works cited

  1. Technology Alliance Partners | Claroty, accessed November 26, 2025, https://claroty.com/partners/technology-alliances
  2. Louisville Geek: Managed IT Services & Expert Solutions, accessed November 26, 2025, https://louisvillegeek.com/
  3. Introduce Yourself! – Professional Development – Indeni Community, accessed November 26, 2025, https://community.indeni.com/t/introduce-yourself/48?page=2
  4. Claroty & Check Point IoT (Industrial), accessed November 26, 2025, https://claroty.com/resources/integration-briefs/claroty-and-check-point-integration-brief
  5. Women Know Cyber: 150 Fascinating Females Fighting Cybercrime, accessed November 26, 2025, https://cybersecurityventures.com/women-in-cybersecurity-list/
  6. The Cyber Security Threat: Lessons Learned from Devastating Attacks in Ukraine and the US – Center on Democracy, Development and the Rule of Law – Stanford University, accessed November 26, 2025, https://cddrl.fsi.stanford.edu/events/cyber-security-threat-lessons-learned-devastating-attacks-ukraine-and-us
  7. Introduce Yourself! – Check Point CheckMates, accessed November 26, 2025, https://community.checkpoint.com/t5/The-CheckMates-Blog/Introduce-Yourself/ba-p/1822/jump-to/first-unread-message
  8. Wiz and SentinelOne announce exclusive partnership to deliver end to end cloud security, accessed November 26, 2025, https://www.wiz.io/blog/wiz-and-sentinelone-announce-exclusive-partnership-to-deliver-end-to-end-security
  9. Real-world gen AI use cases from the world’s leading organizations | Google Cloud Blog, accessed November 26, 2025, https://cloud.google.com/transform/101-real-world-generative-ai-use-cases-from-industry-leaders
  10. 2024 UK & Ireland CISO Executive Summit – Gartner C-level Communities, accessed November 26, 2025, https://www.evanta.com/ciso/uk/uk-ireland-ciso-executive-summit-7356
  11. Check Point Software Technologies and Wiz Enter Strategic Partnership to Deliver End-to-End Cloud Security, accessed November 26, 2025, https://www.checkpoint.com/press-releases/check-point-software-technologies-and-wiz-enter-strategic-partnership-to-deliver-end-to-end-cloud-security/
  12. SentinelOne and CyberArk Joint Solution Brief, accessed November 26, 2025, https://assets.sentinelone.com/singularity-marketplace-briefs/sentinelone-cyberark-sb
  13. Cybersecurity Awareness Month 2025 – UC IT security, accessed November 26, 2025, https://security.ucop.edu/resources/security-awareness/cyber-security-month-2025.html
  14. How to use Snyk for fixing node module vulnerabilities – DEV Community, accessed November 26, 2025, https://dev.to/craigmorten/how-to-use-snyk-for-fixing-node-module-vulnerabilities-5b5b
  15. IAG GBS | Product Lead – Software Engineering / AI – theround, accessed November 26, 2025, https://www.theround.com/iag-gbs-jobs/product-lead—software-engineering–ai/9393d3ab-4ade-4dd2-9ecb-e5dc2929ea0d
  16. AWS Infrastructure Architect Senior Staff FULL TIME REMOTE – Lockheed Martin Careers, accessed November 26, 2025, https://www.lockheedmartinjobs.com/job/colorado-springs/aws-infrastructure-architect-senior-staff-full-time-remote/694/88319925936
  17. OWASP London, accessed November 26, 2025, https://owasp.org/www-chapter-london/
  18. UK police, retailers partner to fight shoplifting with biometrics, accessed November 26, 2025, https://www.biometricupdate.com/202309/uk-police-retailers-partner-to-fight-shoplifting-with-biometrics
  19. Retail violence — Government launches Project Pegasus – Weightmans, accessed November 26, 2025, https://www.weightmans.com/media-centre/news/retail-violence-government-launches-project-pegasus/
  20. Project Pegasus to improve information sharing between police and retailers, accessed November 26, 2025, https://nbcc.police.uk/news/project-pegasus-to-improve-information-sharing-between-police-and-retailers
  21. Partnership to crack down on shoplifting – National Police Chiefs’ Council, accessed November 26, 2025, https://news.npcc.police.uk/releases/partnership-to-crack-down-on-shoplifting
  22. Shoplifting crackdown to include £55m for facial recognition tools in England and Wales, accessed November 26, 2025, https://www.theguardian.com/business/2024/apr/10/shoplifting-crackdown-to-include-55m-for-facial-recognition-tools-in-england-and-wales
  23. Major UK retailers urged to quit ‘authoritarian’ police facial recognition strategy, accessed November 26, 2025, https://www.theguardian.com/technology/2023/oct/28/major-uk-retailers-urged-to-quit-authoritarian-police-facial-recognition-strategy
  24. Morrisons is making big change to make all 500 UK stores ‘safer’ | Bristol Live, accessed November 26, 2025, https://www.bristolpost.co.uk/news/uk-world-news/morrisons-making-big-change-make-10636535
  25. Auror Subject Recognition: One platform to protect stores from known high-risk threats with responsible facial recognition, accessed November 26, 2025, https://www.auror.co/the-intel/auror-subject-recognition
  26. Auror Trust Centre – Auror Subject Recognition, accessed November 26, 2025, https://www.auror.co/auror-subject-recognition
  27. Biometrics Companies, accessed November 26, 2025, https://www.biometricupdate.com/biometric-companies
  28. Surveillance Vendor – MISP galaxy, accessed November 26, 2025, https://misp-galaxy.org/surveillance-vendor/
  29. Surveillance | Biometric Update, accessed November 26, 2025, https://www.biometricupdate.com/service-directory/surveillance
  30. Auror launches facial recognition tool for retail crime prevention and safety, accessed November 26, 2025, https://www.biometricupdate.com/202511/auror-launches-facial-recognition-tool-for-retail-crime-prevention-and-safety
  31. Announcing the Auror product integration – Reveal Media, accessed November 26, 2025, https://www.revealmedia.co.uk/articles/announcing-the-auror-product-integration
  32. Law Enforcement – Auror, accessed November 26, 2025, https://www.auror.co/us/law-enforcement
  33. Collaborators, accessed November 26, 2025, https://reports.retail-week.com/the-tech-list-2024/collaborators/index.html
  34. Facewatch at the Southern Co-op, accessed November 26, 2025, https://www.facewatch.co.uk/2020/10/05/facewatch-at-the-southern-co-op/
  35. Committee Office House of Lords London SW1A 0PW www.parliament.uk/lords Rt. Hon. Dame Diana Johnson MP 4 November 2024 Minist, accessed November 26, 2025, https://committees.parliament.uk/publications/45526/documents/225393/default/
  36. Waitrose taps Shopic tech as grocery retailer kicks off smart cart and frictionless payment trial, accessed November 26, 2025, https://retailtechinnovationhub.com/home/2025/8/29/waitrose-taps-shopic-tech-as-grocery-retailer-kicks-off-smart-cart-and-frictionless-payment-trial
  37. Waitrose’s AI Shopping Trolleys Signal a Retail Revolution for Supply Chain Intelligence, accessed November 26, 2025, https://www.traxtech.com/ai-in-supply-chain/waitroses-ai-shopping-trolleys-signal-a-retail-revolution-for-supply-chain-intelligence
  38. Waitrose trials AI smart trolleys to keep track of purchases – Retail Gazette, accessed November 26, 2025, https://www.retailgazette.co.uk/blog/2025/08/waitrose-ai-smart-trolley/
  39. Waitrose to trial AI-powered employee app as part of ‘largest ever’ tech investment, accessed November 26, 2025, https://retail-systems.com/rs/Waitrose_To_Trial_AI_Powered_Employee_App_As_Part_Of_Largest_Ever_Tech_Investment.php
  40. Retail Intelligence Company Trax Raises $125 Million, Brings Cameras to Supermarket Shelves, accessed November 26, 2025, https://traxretail.com/media/retail-intelligence-company-trax-raises-125-million-brings-cameras-supermarket-shelves/
  41. Retailers Are Using Cameras to Help Keep Their Shelves Stocked. Here’s How – Trax Retail, accessed November 26, 2025, https://traxretail.com/media/retailers-using-cameras-help-keep-shelves-stocked-heres/
  42. Rebooting the retail store through in-store automation – Capgemini, accessed November 26, 2025, https://www.capgemini.com/wp-content/uploads/2020/01/Report-%E2%80%93-Smart-Stores.pdf
  43. John Lewis partners with Cimagine – ISRAEL21c, accessed November 26, 2025, https://www.israel21c.org/john-lewis-partners-with-cimagine/
  44. Looking good from all angles – The Merchandising Report 2015 – InternetRetailing, accessed November 26, 2025, https://internetretailing.net/research-articles/looking-good-from-all-angles—the-merchandising-report-2015/
  45. C-Imagine The Possibilities, accessed November 26, 2025, https://yucommentator.org/2017/05/c-imagine-possibilities/
  46. John Lewis adds Virtual Sofa AR feature to its iOS app – Mobile Marketing Magazine, accessed November 26, 2025, https://mobilemarketingmagazine.com/john-lewis-had-added-a-virtual-sofa-augmented-reality-feature-to-its-ios-app/
  47. John Lewis Partnership accelerates technology transformation with £100m Google Cloud agreement, accessed November 26, 2025, https://www.johnlewispartnership.co.uk/media-centre/latest-news/2023/17387
  48. John Lewis Partnership Accelerates Technology Transformation with £100m Agreement with Google Cloud – PR Newswire, accessed November 26, 2025, https://www.prnewswire.com/news-releases/john-lewis-partnership-accelerates-technology-transformation-with-100m-agreement-with-google-cloud-301896475.html
  49. Cloud Transformation Project for John Lewis Partnership – Wipro, accessed November 26, 2025, https://www.wipro.com/newsroom/press-releases/2024/wipro-extends-relationship-with-the-john-lewis-partnership-to-complete-cloud-transformation-project/
  50. Partnerships – Publicis Sapient, accessed November 26, 2025, https://www.publicissapient.com/partnerships
  51. Website Cookies | Waitrose & Partners, accessed November 26, 2025, https://www.waitrose.com/ecom/help-information/website-cookies
  52. Data & Analytics Partners – Braze, accessed November 26, 2025, https://www.braze.com/docs/partners/data_and_analytics
  53. 25 Top Video Ads That’ll Revolutionize Your Marketing Strategy – Content Beta, accessed November 26, 2025, https://www.contentbeta.com/blog/best-video-ads/
  54. The Importance of Brand Consistency, accessed November 26, 2025, https://brandmotion.co.uk/content-hub/importance-of-brand-consistency
  55. Unlocking the power of the platform | John Lewis Partnership – Adaptavist, accessed November 26, 2025, https://www.adaptavist.com/case-studies/john-lewis
  56. John Lewis shortlists six more startups for retail tech accelerator programme – The Drum, accessed November 26, 2025, https://www.thedrum.com/news/john-lewis-shortlists-six-more-startups-retail-tech-accelerator-programme

Related News & Articles