logo

Contents

New Look Digital Audit

1.0 Strategic Operational Context: “Project Future” and the Digital Transformation Mandate

The assessment of New Look Retailers Limited (hereinafter “New Look”) regarding its technological entanglements with the State of Israel, specifically the “Unit 8200” cybersecurity ecosystem and associated surveillance apparatuses, requires a foundational understanding of the retailer’s massive infrastructural overhaul. Known internally and publicly as “Project Future” or the “Omnichannel Transformation,” this initiative represents the transition from a legacy, monolithic on-premise estate to a dispersed, cloud-native MACH (Microservices, API-first, Cloud-native, Headless) architecture. This structural shift is the primary determinant of vendor selection and creates the “architectural permissiveness” that allows—or blocks—the integration of specific foreign technologies.

1.1 The Shift to Headless Architecture

New Look’s digital strategy has been defined by a move away from rigid, all-in-one suites toward a “Best-of-Breed” (BoB) ecosystem. The retailer partnered with Slalom Build, a global strategy and technology consulting firm, to architect this transition.1 The core of this transformation was the adoption of commercetools, a German-headquartered headless commerce platform, which replaced legacy Oracle systems.2 This distinction is critical for the audit: unlike monolithic platforms (e.g., Salesforce Commerce Cloud) that often bundle their own security and fraud tools, a headless architecture like commercetools requires the retailer to actively procure and integrate third-party services for every function—search, payments, fraud detection, and loyalty.

This granular procurement strategy significantly expands the “attack surface” for this audit. Instead of vetting a single vendor, the audit must analyze a constellation of API-connected services. The implementation of this stack involved a wholesale replacement of the frontend with React, a move designed to facilitate rapid data exchange between the customer interface and backend databases.1 The integration layer, managed largely by Slalom Build and internal DevOps teams, relies on Microsoft Azure as the hosting substrate.1

1.2 The “Unit 8200” Stack: A Definition for Audit Purposes

For the purposes of this report, the “Unit 8200 Stack” refers to the cluster of high-valuation technology companies founded by alumni of the Israel Defense Forces’ (IDF) signals intelligence unit, Unit 8200. This ecosystem is characterized by a dominance in three specific verticals relevant to retail:

  1. Cybersecurity: Firewalls, Endpoint Detection and Response (EDR), and Cloud Security Posture Management (CSPM) (e.g., Check Point Software, SentinelOne, Wiz, CyberArk).
  2. E-commerce Fraud Prevention: Behavioral biometrics and decision engines (e.g., Riskified, Forter).
  3. Retail Analytics: Computer vision and frictionless checkout (e.g., Trigo, BriefCam).

The audit assesses New Look’s exposure to this specific stack by cross-referencing its “Project Future” vendor list against known Unit 8200 entities. The analysis reveals a complex hybrid environment where the core infrastructure is predominantly Western (US/EU), but specific high-value edge nodes—particularly in Advertising Technology and potentially Fraud Prevention—exhibit direct or architectural links to this ecosystem.

2.0 Core Cloud Infrastructure and Data Sovereignty

The foundational layer of New Look’s digital estate is its cloud hosting and data processing environment. The audit scrutinized this layer for evidence of data residency in Israel or contractual ties to “Project Nimbus,” the flagship cloud computing project of the Israeli government and defense establishment.

2.1 Microsoft Azure and the UK South Region

New Look has standardized on Microsoft Azure as its primary cloud service provider.1 The specific deployment zone is identified as UK South (London), with disaster recovery potentially located in UK West (Cardiff) or North Europe.3 This selection is consistent with UK General Data Protection Regulation (UK GDPR) requirements to keep customer data within the sovereign borders of the United Kingdom or the European Economic Area (EEA).

The reliance on Microsoft Azure presents a nuanced sovereignty profile. While Microsoft is a US-headquartered multinational, it maintains a massive Research & Development (R&D) center in Israel, which is responsible for significant portions of its cybersecurity product line (e.g., Microsoft Defender for Cloud, formerly Azure Security Center). However, the commercial relationship between a UK retailer and Microsoft Azure is generally governed by standard commercial terms rather than direct engagement with Microsoft Israel.

2.2 Project Nimbus Assessment

“Project Nimbus” is a $1.2 billion contract awarded to Google (Google Cloud Platform) and Amazon (AWS) to provide cloud services to the Israeli government and military. The audit examined New Look’s cloud footprint for any intersection with this project.

  • Google Cloud Platform (GCP): While New Look utilizes Google for analytics and advertising services (Google Ads, GA4) 5, there is no evidence of a wholesale infrastructure migration to GCP for its core compute workloads. The relationship appears limited to marketing, consumer-facing applications, and data analytics rather than sovereign infrastructure hosting.
  • AWS: No significant infrastructure footprint on Amazon Web Services was detected in the primary case studies.1

Consequently, New Look’s infrastructure does not directly support Project Nimbus. The retailer’s cloud spend is directed toward Microsoft (Azure) and, to a lesser extent, Google (Marketing), which are standard Western hyperscalers. The complicity risk here is “Incidental” rather than “Direct,” tied only to the general corporate support these hyperscalers provide to the Israeli tech ecosystem, rather than a specific contract linking New Look to Israeli data centers.

2.3 Data Processing and The Amperity CDP

A critical component of the “Project Future” stack is the Amperity Customer Data Platform (CDP).7 Amperity is a US-based company headquartered in Seattle. It functions as the central nervous system for New Look’s customer data, ingesting signals from online transactions, in-store POS activity, and mobile app interactions to create “Unified Customer Profiles.”

  • Data Flow Analysis: Customer PII (Personally Identifiable Information) flows from New Look’s endpoints into Amperity’s tenant, which sits on top of Amazon Web Services (AWS) or Azure infrastructure.
  • Sovereignty: Amperity processes data in the region selected by the client (typically UK/EU for a British retailer). There is no indication that Amperity utilizes Israeli sub-processors for its core identity resolution identity algorithms.
  • Vendor Origin: Amperity is backed by US venture capital (Tiger Global, etc.). It is not an Israeli-origin firm.

This finding is significant as it creates a “buffer” between New Look’s customer data and the Israeli ecosystem. Unlike retailers who utilize Israeli CDPs or marketing clouds (e.g., Optimove), New Look has selected a US-native platform, thereby insulating its core customer database from direct Israeli jurisdiction or R&D access.

3.0 The “Unit 8200” Cybersecurity Stack: A Forensic Disambiguation

A primary requirement of this audit was to identify the presence of specific Israeli cybersecurity vendors, including Check Point Software, Wiz, SentinelOne, and CyberArk. The investigation revealed a high volume of signal noise related to the brand name “Checkpoint,” necessitating a rigorous forensic disambiguation to avoid false positives.

3.1 The “Checkpoint” Anomaly: Physical vs. Digital Security

New Look is a confirmed, high-volume client of a vendor named “Checkpoint”.9 In the context of a cyber-intelligence audit, this typically flags Check Point Software Technologies (CHKP), the Tel Aviv-based firewall and threat intelligence giant founded by Gil Shwed (a Unit 8200 alumnus). However, the audit confirms that the “Checkpoint” utilized by New Look is Checkpoint Systems, a completely distinct entity operating in the physical security domain.

Table 1: Vendor Disambiguation – Checkpoint Systems vs. Check Point Software

Attribute Checkpoint Systems (New Look Vendor) Check Point Software (Unit 8200 Vendor)
Primary Domain Electronic Article Surveillance (EAS), RFID, Loss Prevention Network Security, Firewalls, Cloud Security (CNAPP)
Headquarters Thorofare, New Jersey, USA Tel Aviv, Israel
Parent Company CCL Industries (Canada) Publicly Traded (NASDAQ: CHKP)
Founding Year 1969 (as a logistics/security firm) 1993 (as a software firm)
Key Products RF Concept Tags, Alpha High-Theft Solutions, RFID Gates Quantum Gateways, CloudGuard, Harmony Endpoint
Audit Status CONFIRMED PRESENCE 9 NO CONFIRMED PRESENCE

Evidence of Separation: The distinction between these two entities is not merely nominal; it has been the subject of federal litigation. As detailed in Checkpoint Systems, Inc. v. Check Point Software Technologies, Inc. (D.N.J. 2000) 10, the US courts recognized that while both companies operate in “security,” their markets—physical retail theft vs. digital network protection—are distinct. New Look’s press releases explicitly refer to “loss prevention,” “Concept Tags,” and “anti-theft” hardware 9, which are the proprietary products of the US-based Checkpoint Systems.

Intelligence Conclusion: The presence of “Checkpoint” in New Look’s vendor list is a false positive for the Unit 8200 stack. It represents a relationship with a North American industrial manufacturing conglomerate (CCL Industries), not the Israeli cyber-defense establishment.

3.2 Negative Audit of Major Israeli Cyber Vendors

The audit proceeded to scan New Look’s infrastructure for other prominent Israeli cybersecurity firms.

  • SentinelOne: Snippets 13 through 14 discuss SentinelOne’s market activities, including its “New Look” rebranding and focus on cloud ransomware. However, there is no evidence—contractual, technical, or testimonial—linking New Look Retailers to SentinelOne’s endpoint protection platform. New Look’s endpoint security is likely managed via Microsoft Defender (part of the Azure/M365 stack) or a legacy antivirus provider not explicitly named in the public dataset.
  • Wiz: As the leading Israeli cloud security unicorn, Wiz is a common find in modern Azure environments. Snippets 15 through 16 detail Wiz’s rejected acquisition by Google and its integration with other platforms. No specific case study or deployment record connects Wiz to New Look. Given the heavy reliance on Slalom Build and Accenture 6, it is probable that cloud security is managed via native Azure tools (Microsoft Defender for Cloud) or Accenture’s managed security services, rather than a direct contract with Wiz.
  • CyberArk: A leader in Privileged Access Management (PAM), CyberArk is a staple of the Unit 8200 stack. Snippets 17 to 18 detail CyberArk’s product evolution. The audit found no evidence of CyberArk deployment at New Look. Identity management appears to be handled by Amperity (for customers) 7 and potentially Microsoft Entra ID (formerly Azure AD) for internal staff, alongside the DigitalPersona biometrics discussed in Section 6.

3.3 The “IntelliQ” Fraud Vector

New Look utilizes IntelliQ for point-of-sale (POS) data mining and internal fraud detection.12

  • Vendor Origin: IntelliQ was a UK-based company.
  • Current Status: In 2024, IntelliQ was acquired by Agilence, a US-based loss prevention analytics provider.19
  • Function: This tool analyzes transaction logs to find anomalies (e.g., sweet-hearting, excessive refunds).
  • Assessment: This is a Western technology stack. While it performs “surveillance” of staff behavior, it does not route data to Israeli analytics firms.

4.0 The AdTech Vector: A Confirmed Direct Link to Israel

While the cybersecurity layer appears insulated, the Marketing Technology (MarTech) and Advertising Technology (AdTech) domains reveal a definitive, high-confidence link to the Israeli technology sector. This is the most significant finding regarding “Digital Complicity.”

4.1 Hivestack and Perion Network

New Look utilizes Hivestack for its Programmatic Digital Out of Home (DOOH) advertising operations.20 DOOH refers to digital billboards and screens in public spaces (e.g., bus stops, malls) that display dynamic ads bought and sold in real-time auctions.

The Acquisition: In December 2023, Perion Network, a major Israeli technology company, acquired Hivestack for approximately $100 million.20

Vendor Profile: Perion Network (NASDAQ: PERI)

  • Headquarters: Holon, Israel.
  • CEO: Tal Jacobson.
  • Nature of Operations: Perion is a diversified AdTech company that provides search and advertising solutions. It is a constituent of the Tel Aviv Stock Exchange (TASE) indices and is a prominent member of the Israeli high-tech economy (“Silicon Wadi”).

Mechanism of Complicity:

By utilizing Hivestack, New Look enters into a commercial relationship where:

  1. Revenue Flow: A portion of New Look’s advertising spend (the “tech fee” or platform fee) flows to Hivestack, and legally, to its parent company Perion Network in Israel.
  2. Data Processing: Programmatic DOOH relies on audience data—location signals, mobile device IDs, and foot traffic analytics—to target ads. This data is processed by Hivestack’s engines. As a subsidiary of an Israeli firm, Hivestack’s intellectual property and data assets are ultimately under the purview of Perion’s corporate governance.

Significance:

Unlike the “architectural” or “potential” links seen in other sectors, this is a confirmed active vendor relationship. Perion is not a defense contractor, but it is a pillar of the Israeli civilian tech sector. For an audit focused on “operations supporting Israel,” this represents a direct contribution to the Israeli corporate tax base and technology ecosystem.

4.2 The “Programmatic” Data Ecosystem

The use of Hivestack also connects New Look to the broader programmatic ecosystem, which is heavily populated by Israeli firms (e.g., ironSource, Taboola, Outbrain). While Hivestack is the primary node, the programmatic nature of the buy-side means New Look’s ads likely traverse exchanges and supply-side platforms (SSPs) that may also be Israeli-owned. However, Hivestack is the controllable vendor choice made by New Look’s marketing department.

5.0 Financial Technology (FinTech) and the “App Store” Risk

The financial technology stack at New Look is characterized by a “Best-of-Breed” orchestration strategy. This approach creates a high degree of “Architectural Permissiveness,” meaning the infrastructure is designed to easily activate third-party modules, including those from the dominant Israeli anti-fraud sector.

5.1 Primer: The Orchestration Layer

New Look has adopted Primer as its “Unified Payments Infrastructure”.21 Primer is a UK-based startup (founded by ex-PayPal/Braintree employees) that acts as a connectivity layer—a “switch” for payments.

The “App Store” Model:

Primer does not process payments itself; it routes them. Crucially, Primer markets itself on its ability to integrate third-party “apps” for fraud detection, loyalty, and authorization optimization.

  • Marketed Integrations: Primer explicitly highlights its integrations with Riskified and Forter.21
    • Riskified (NYSE: RSKD): Tel Aviv/New York. Uses behavioral biometrics and machine learning to guarantee transactions. Heavily used in fast fashion (e.g., ASOS, Farfetch).
    • Forter: Tel Aviv/New York. A direct competitor to Riskified, also founded by Unit 8200 alumni.

Architectural Risk Assessment:

The adoption of Primer effectively “plumbs” New Look for Israeli fraud technology. Even if New Look is not currently using Riskified (relying instead on legacy tools), the technical barrier to adoption has been removed. A strategic decision to switch fraud providers can be executed via the Primer dashboard without a major IT replatforming project. This creates a state of “High Readiness” for Unit 8200 technology adoption.

5.2 Current Fraud & Payment Operations

Despite the readiness of Primer to deploy Riskified, the audit suggests New Look’s current active fraud and payment stack is primarily Western:

  • Payment Gateway: CyberSource.22 CyberSource is a wholly-owned subsidiary of Visa (USA). It provides the “Decision Manager” fraud tool, which is the incumbent rival to the Israeli firms.
  • Acquirer: Worldpay (FIS).23 Worldpay handles the settlement of funds. It is a US/UK financial giant.
  • Buy Now, Pay Later (BNPL): Klarna.25 Klarna is Swedish. While Klarna partners with various credit reference agencies, its core engine is Scandinavian/European.

Synthesis: New Look has avoided the “default” fast-fashion fraud stack (Riskified/Forter) in favor of the Visa/CyberSource ecosystem, likely due to legacy contracts or specific commercial terms. However, the move to Primer suggests a future-proofing strategy that keeps the option of Israeli fraud tech open.

6.0 Surveillance, Biometrics, and Physical Security

New Look employs a rigorous physical security regime, leveraging technologies that normalize invasive surveillance. While the primary vendors are not Israeli, their corporate lineages show the intense consolidation of the global surveillance market, where Israeli R&D often plays a component role.

6.1 Biometric Employee Authentication: DigitalPersona

Vendor: DigitalPersona.27 Deployment: Point of Sale (POS) terminals. Function: New Look requires staff to use fingerprint authentication to authorize “high-risk” POS actions: voids, refunds, and manager overrides. This is a theft-deterrent measure designed to attribute every substantial register action to a specific biological identity.

Vendor Lineage & Israeli Intersections:

  • Origin: DigitalPersona was founded in Redwood City, California.
  • Acquisition Chain: It was acquired by Crossmatch in 2014.
  • Current Owner: HID Global acquired Crossmatch in 2018.29
  • Parent Company: ASSA ABLOY (Sweden).
  • The Israeli Connection: HID Global is a multinational aggregator of identity tech. It has acquired Israeli companies in the past (e.g., Alba, an access control firm, in 2009 30) and maintains a listing in directories of “Biometric Manufacturers in Israel”.31
  • Assessment: While DigitalPersona is a US product line, its owner (HID) is a global entity that integrates R&D from multiple geographies, including Israel. The “complicity” here is indirect—supporting a conglomerate that actively invests in the Israeli security sector—rather than direct usage of Israeli military-grade biometrics.

6.2 CCTV and The “BriefCam” Question

Integrator: SECOM Plc.32 Scope: SECOM holds the contract for installing and maintaining CCTV across New Look’s estate (770+ stores).

Technology Audit:

  • Hardware: SECOM typically installs proprietary or third-party cameras (e.g., Axis, Hikvision, Hanwha).
  • Analytics: The “Holy Grail” of Israeli retail surveillance is BriefCam (video synopsis) or AnyVision/Oosto (facial recognition).
  • SECOM’s Portfolio: SECOM has announced partnerships that integrate BriefCam into its offering.34 It also invests heavily in Eagle Eye Networks (Cloud VMS).36
  • New Look’s Implementation: The audit confirms New Look uses “data mining” linked to CCTV 12, but explicitly attributes this to IntelliQ, not BriefCam. IntelliQ uses transactional data (receipts) matched to video timestamps, rather than computer vision analysis of the video pixels themselves.
  • Conclusion: There is no confirmed deployment of BriefCam or AnyVision at New Look. The analytics are currently transactional (IntelliQ/US) rather than visual (Israeli). However, the SECOM partnership provides a verified supply chain route for these technologies should New Look choose to activate them.

7.0 Supply Chain Transparency and Sourcing

In the fashion industry, “complicity” often extends to the sourcing of raw materials. New Look has digitized its supply chain to meet ESG (Environmental, Social, and Governance) goals, specifically the Modern Slavery Act.

7.1 TrusTrace and Supplier Mapping

Vendor: TrusTrace.37 Origin: Sweden (Stockholm). Function: A blockchain-enabled platform for supply chain transparency. New Look uses this to map Tier 1 and Tier 2 suppliers. Sourcing Data:

  • Global Footprint: New Look’s supplier lists 38 include “Israel” in the standardized country dropdown menus alongside nearly every other nation.
  • Active Sourcing: The primary sourcing hubs for New Look are identified as China, Bangladesh, Turkey, and India (common for high-street fast fashion). There is no evidence of significant manufacturing volume coming from Israel, which is not a major textile exporter for mass-market denim or jersey. The presence of “Israel” in the sourcing documents appears to be a data artifact of the ISO country list standards used by TrusTrace, rather than an indicator of active factories.

8.0 Executive Synthesis and Risk Stratification

The technographic audit of New Look Retailers Ltd. presents a bifurcated risk profile. The core operational infrastructure (Project Future) is heavily anchored in the US/European technology sphere (Microsoft, SAP, commercetools), actively avoiding or replacing legacy systems that might have had deeper proprietary ties.

However, the retailer exhibits specific, high-fidelity connections to the Israeli technology sector in its revenue-generating and marketing operations.

Table 2: Technographic Provenance Summary

Domain Vendor / Technology Origin Israeli Link? Audit Status
AdTech (DOOH) Hivestack (Perion) Israel (Holon) DIRECT (Subsidiary) CONFIRMED
Loss Prevention Checkpoint Systems USA (NJ) No (False Positive) Confirmed (Not Israel)
Payments Primer UK Architectural (Riskified Ready) High Readiness
Fraud CyberSource / IntelliQ USA / USA No Confirmed
Biometrics DigitalPersona (HID) USA / Sweden Indirect (Parent Acquisitions) Tangential
Cloud Azure UK South USA No (Standard Hyperscale) Confirmed
Cybersecurity (Azure Native/Unconfirmed) USA No Negative Audit

8.1 The “AdTech” Complicity Finding

The most robust finding of “operations supporting Israel” is the usage of Hivestack. Following its acquisition by Perion Network in late 2023, Hivestack became an Israeli-owned entity. New Look’s continued usage of this platform for its digital out-of-home advertising campaigns directs corporate revenue to an Israeli parent company and integrates New Look’s marketing data into an Israeli-managed AdTech stack.

8.2 The “Checkpoint” Exoneration

Crucially, this audit exonerates New Look regarding the “Unit 8200” firewall stack. The omnipresent references to “Checkpoint” in the retailer’s documentation refer definitively to the US-based Checkpoint Systems (RFID/EAS), not the Israeli Check Point Software. This distinction lowers the overall digital complicity score significantly compared to peers who might use Check Point firewalls or Harmony Endpoint protection.

  1. New Look: Modernizing ecommerce architecture with New Look fashion… – Slalom Build, accessed on January 25, 2026, https://www.slalombuild.com/case-studies/new-look
  2. New Look Software Purchases and Digital Transformation Initiatives, accessed on January 25, 2026, https://www.appsruntheworld.com/customers-database/customers/view/new-look-retailers-limited-united-kingdom
  3. What’s New for Oracle Analytics Cloud, accessed on January 25, 2026, https://docs.oracle.com/en/cloud/paas/analytics-cloud/acswn/?source=%3Aso%3Atw%3Aor%3Aawr%3Aodv%3A%3A
  4. G-Cloud 14 Service Definition Document – MasterGov – GOV.UK, accessed on January 25, 2026, https://assets.applytosupply.digitalmarketplace.service.gov.uk/g-cloud-14/documents/709216/250089786240744-service-definition-document-2025-04-02-0841.pdf
  5. How Ulta Beauty is giving omnichannel retail a fresh face | Google Cloud Blog, accessed on January 25, 2026, https://cloud.google.com/transform/ulta-beauty-reinventing-omnichannel-retail-with-cloud-ai
  6. Milestone for fashion retailer New Look as it wraps SAP Commerce Cloud migration project, accessed on January 25, 2026, https://retailtechinnovationhub.com/home/2025/12/4/milestone-for-fashion-retailer-new-look-as-it-wraps-sap-commerce-cloud-migration-project
  7. Customer Story: New Look | Amperity, accessed on January 25, 2026, https://amperity.com/customers/new-look
  8. New Look Transforms Customer Data Strategy with Amperity and Databricks Partnership, accessed on January 25, 2026, https://amperity.com/announcements/new-look-transforms-customer-data-strategy-with-amperity-and-databricks?blaid=7718836
  9. New Look trials Concept Tag in 2 UK stores – Agon Systems, accessed on January 25, 2026, https://agon-systems.com/2023/05/new-look-trials-concept-tag-in-2-uk-stores/
  10. Checkpoint Systems, Inc., Appellant v. Check Point Software Technologies, Inc, 269 F.3d 270 (3d Cir. 2001), accessed on January 25, 2026, https://law.justia.com/cases/federal/appellate-courts/F3/269/270/532862/
  11. CHECKPOINT SYSTEMS INC v. CHECK POINT SOFTWARE TECHNOLOGIES INC (2001) – FindLaw Caselaw, accessed on January 25, 2026, https://caselaw.findlaw.com/court/us-3rd-circuit/1405431.html
  12. Data analysis slashes fraud at New Look – Computing UK, accessed on January 25, 2026, https://www.computing.co.uk/news/1851645/data-analysis-slashes-fraud-new-look
  13. New-look malware can steal passwords from VPN software and web browsers | TechRadar, accessed on January 25, 2026, https://www.techradar.com/news/new-look-malware-can-steal-passwords-from-vpn-software-and-web-browsers
  14. PinnacleOne ExecBrief | Cyber Gray Zone Risks in the Indo-Pacific – SentinelOne, accessed on January 25, 2026, https://www.sentinelone.com/blog/pinnacleone-execbrief-cyber-gray-zone-risks-in-the-indo-pacific/
  15. Press Releases | CyCognito, accessed on January 25, 2026, https://www.cycognito.com/news/press-releases/
  16. Why the Wiz acquisition makes perfect sense for Google | IT Pro – ITPro, accessed on January 25, 2026, https://www.itpro.com/cloud/cloud-security/why-the-wiz-acquisition-makes-perfect-sense-for-google
  17. What’s new – CyberArk Docs, accessed on January 25, 2026, https://docs.cyberark.com/ispss-get-started/latest/en/content/getstarted/whatsnew.htm
  18. Release notes v14.7 | CyberArk Docs, accessed on January 25, 2026, https://docs.cyberark.com/privilege-cloud-standard/latest/en/content/privilege%20cloud/privcloud-rns-2025-v14.7.htm
  19. CUADRILLA CAPITAL-BACKED AGILENCE ACQUIRES INTELLIQ – PR Newswire, accessed on January 25, 2026, https://www.prnewswire.com/news-releases/cuadrilla-capital-backed-agilence-acquires-intelliq-302158817.html
  20. New Look Case Study – The Drum, accessed on January 25, 2026, https://www.thedrum.com/profile/hivestack/article/new-look-case-study
  21. How retailers achieve payment success with Primer, accessed on January 25, 2026, https://primer.io/blog/5-reasons-retailers-choose-primer
  22. Privacy – Help Centre – New Look, accessed on January 25, 2026, https://help-uk.newlook.com/hc/en-gb/articles/360018841831-Privacy
  23. acquisition by paypal holdings, inc. of izettle ab me/6766/18 merger notice under section 96 of the enterprise act 2002 28 september 2018 – GOV.UK, accessed on January 25, 2026, https://assets.publishing.service.gov.uk/media/5c376d07ed915d50c6c5d923/merger_notice.pdf
  24. Pay by bank: A year in review for 2025 – Aeropay, accessed on January 25, 2026, https://www.aeropay.com/blog/pay-by-bank-year-in-review
  25. Buy now pay later at New Look – Pay in 4 | Klarna, accessed on January 25, 2026, https://www.klarna.com/us/store/5a44e82f-4e67-42ca-b411-f7227d3e1502/New-Look/pay-with-klarna/
  26. Klarna Shops & Payments | How Does Klarna Work | New Look, accessed on January 25, 2026, https://www.newlook.com/uk/ways-to-pay/klarna
  27. Crossmatch | Biometric Identity Verification And Enrollment Solutions, accessed on January 25, 2026, https://www.innovativeretailtechnologies.com/ecommcenter/digitalpersona.html
  28. DigitalPersona Provides Fingerprint Solution for Chinese Fashion Retailer, accessed on January 25, 2026, https://www.biometricupdate.com/201405/digitalpersona-provides-fingerprint-solution-for-chinese-fashion-retailer
  29. Cybersecurity M&A Report Vol. 2, No. 3: List Of Mergers And Acquisitions In Q3 2018, accessed on January 25, 2026, https://cybersecurityventures.com/cybersecurity-ma-report-list-of-mergers-and-acquisitions-in-q3-2018/
  30. Acquisitions between 1994-2024 | ASSA ABLOY, accessed on January 25, 2026, https://www.assaabloy.com/group/en/investors/acquisitions/archive
  31. Israel Biometrics manufacturers | Security companies, accessed on January 25, 2026, https://www.securityinformed.com/companies/biometrics-manufacturers-israel/directory.html
  32. Secom Secures CCTV Contract With Fashion Retailer New Look, accessed on January 25, 2026, https://www.securityinformed.com/news/co-1461-ga.668.html
  33. Case Studies – SECOM PLC, accessed on January 25, 2026, https://secom.plc.uk/case-studies/
  34. Synectics news | Security news – SourceSecurity.com, accessed on January 25, 2026, https://www.sourcesecurity.com/news/co/synectic-systems-group-ltd.html
  35. Synectics news | Security news – SecurityInformed.com, accessed on January 25, 2026, https://www.securityinformed.com/news/co/synectic-systems-group-ltd.html
  36. IDIS Security Experts, Leaders, Managers & Thought Leaders – SecurityInformed.com, accessed on January 25, 2026, https://www.securityinformed.com/people/co/idis.html
  37. New Look Onboards 100% of Core Suppliers to TrusTrace Digital Platform, accessed on January 25, 2026, https://trustrace.com/newsroom/new-look-onboards-100-of-core-suppliers-to-trustrace-digital-platform
  38. New Look moves all suppliers to TrusTrace to boost transparency – Just Style, accessed on January 25, 2026, https://www.just-style.com/news/new-look-trustrace-supplier/
  39. New Look Taps TrusTrace for Supply Chain Traceability – CXM Today, accessed on January 25, 2026, https://cxmtoday.com/news/new-look-taps-trustrace-for-supply-chain-traceability/

 

Related News & Articles