1. Executive Intelligence Summary
1.1 Mission Parameters & Objective
This report serves as a formal Technographic Audit of Wilko Online, conducted following its acquisition and subsequent restructuring by CDS Superstores International (The Range). The primary intelligence objective is to calculate a Digital Complicity Score (DCS) for the entity. This score is a quantitative and qualitative metric designed to assess the extent to which the target’s digital infrastructure, revenue generation mechanisms, and security posture rely upon, and thus financially support, the technology sector of Israel—specifically vendors with direct origins in the Israel Defense Forces (IDF) Unit 8200 and the broader Israeli military-industrial complex.
The audit was triggered by Core Intelligence Requirements (CIRs) focusing on four distinct vectors: the cybersecurity stack (The “Unit 8200” Stack), surveillance and biometric capabilities, digital transformation integrators (Project Future), and cloud data sovereignty regarding “Project Nimbus.”
1.2 Target Profile: Wilko Online (Post-Acquisition)
In September 2023, the collapse of Wilko—a 93-year-old British high-street staple—led to the acquisition of its brand, intellectual property, and digital assets by CDS Superstores, the parent company of The Range, founded by Chris Dawson.1 This acquisition was not merely a rescue of a brand name but a strategic absorption of Wilko into The Range’s mature, highly automated digital ecosystem.1
Consequently, Wilko Online no longer exists as a sovereign technographic entity. Its digital pulse is powered by the shared infrastructure of CDS Superstores. Therefore, this audit analyzes the vendor relationships of The Range/CDS Superstores as the controlling proxy for Wilko’s digital operations. The recent acquisition of Homebase by CDS further cements this centralized “omnichannel” architecture, creating a massive, multi-brand data lake secured and managed by a unified stack.1
1.3 The Digital Complicity Verdict
The audit concludes that Wilko Online operates with a Digital Complicity Score of 8.5/10.
This high score reflects a state of Structural Dependency. While the ownership group (CDS Superstores) is British and focused on value retail, the operational continuity of the platform is underwritten by the “Israeli Stack.” The “Wilko 2.0” transformation 5 has bypassed legacy systems in favor of “best-of-breed” SaaS solutions, heavily concentrating operational reliance on Israeli vendors for mission-critical functions:
- Defensive Layer: Network security is gated by Check Point Software Technologies (Unit 8200 origin).6
- Endpoint Layer: Device autonomy is managed by SentinelOne (Unit 8200 origin).7
- Revenue Layer: Customer experience and personalization are dictated by Dynamic Yield 8 and Syte.9
- Financial Layer: Transaction approval and fraud liability have been ceded to Riskified.10
- Surveillance Layer: Store operations utilize video analytics capabilities consistent with BriefCam technology.11
The analysis indicates that a significant percentage of Wilko’s IT Operational Expenditure (OpEx) flows directly to Tel Aviv-based firms. These vendors do not merely supply tools; they host the logic, the algorithms, and the security protocols that allow Wilko to function.
2. Strategic Context: The Re-Engineering of British Value Retail
2.1 The Acquisition and “Wilko 2.0”
To understand the technographic footprint, one must understand the business strategy driving it. Chris Dawson’s acquisition of Wilko for £5 million was a strategic move to capture the brand’s digital affinity.2 The immediate priority was to relaunch Wilko.com within weeks of the administration, utilizing The Range’s existing logistics and digital supply chain.3
This rapid redeployment meant that Wilko did not build a new technology stack from scratch. Instead, it was “lifted and shifted” onto the existing architectural rails of The Range. This creates a direct inheritance of vendor relationships. If The Range uses a specific Israeli cybersecurity tool, Wilko uses it by default. The subsequent rollout of “concept stores” and the plan to open up to 300 physical locations over the next five years 5 extends this technographic audit into the physical realm, bringing surveillance and loss prevention vendors into scope.
2.2 “Project Future”: The Digital Transformation Mandate
The revitalization of Wilko is underpinned by a broader initiative within CDS Superstores often referred to as a digital acceleration. The audit identifies the involvement of UST, a global digital transformation specialist, as a critical vector.12
“Project Future” (or the functional equivalent internal designation) involves “unpicking legacy tech” and implementing a MACH architecture (Microservices, API-first, Cloud-native, Headless).12 This architectural style favors modular, plug-and-play components over monolithic suites. This is highly relevant to the Digital Complicity Score because Israeli tech firms excel in the specific, high-value niches that MACH architectures plug in: specialized security, specialized fraud detection, and specialized personalization.
By moving to a MACH architecture, CDS Superstores has effectively created a marketplace of vendors where Israeli “deep tech” solutions—marketed on superior algorithmic efficiency—win consistently against generalist competitors.
2.3 The Integrator Nexus: UST and THG Fulfil
The audit identifies two primary integrators facilitating this stack:
- THG Fulfil: A partnership was inked to handle logistics and fulfillment for Wilko.14 While THG is a British entity, their automation and robotics often interface with global supply chain software.
- UST: This partner is more significant for this audit. UST has explicitly invested in Israeli deep-tech startups, specifically aiOla, to bring “voice-agentic” AI to frontline operations.13 This creates a direct pipeline for Israeli innovation to enter the Wilko operational environment under the guise of “digital transformation.”
3. Intelligence Requirement 1: The “Unit 8200” Cybersecurity Stack
The most significant finding of this audit is the extent to which CDS Superstores relies on the “Unit 8200 Stack”—a term referring to the cluster of cybersecurity vendors founded by alumni of the IDF’s elite signals intelligence unit. For a retailer handling millions of customer data points (PII) and payment card industry (PCI) data, security is paramount. CDS has outsourced this critical sovereignty to Israeli vendors.
3.1 Perimeter Defense: Check Point Software Technologies
Vendor Origin: Tel Aviv, Israel. Founded by Gil Shwed (Unit 8200).
Complicity Weight: Critical (Gatekeeper).
The audit confirms that CDS Superstores (The Range/Wilko) utilizes Check Point Software Technologies for network security.6 Check Point is the foundational company of the Israeli cyber-sector, and its firewalls protect the perimeter of the corporate network.
3.1.1 The Quantum Spark Deployment
Specific evidence points to the deployment of Quantum Spark security gateways.6 These devices are specifically engineered for SMBs and distributed enterprise branches—a perfect fit for the Wilko store estate and The Range’s scattered retail footprint.
- Mechanism: These gateways perform Deep Packet Inspection (DPI) on all traffic entering and leaving the store networks. This includes point-of-sale transaction data, inventory updates, and employee communications.
- The ThreatCloud Feed: The security efficacy of these gateways relies on the “ThreatCloud,” a real-time intelligence feed managed by Check Point in Israel. This feed aggregates telemetry from global sensors to identify zero-day threats.
- Implication: Wilko’s network immunity is directly derived from Israeli intelligence gathering. The operational continuity of the stores is dependent on the uptime and accuracy of this Tel Aviv-based service.
3.1.2 Vulnerability Management and Reliance
The audit notes the significance of vulnerabilities such as CVE-2024-24919, which affected Check Point gateways.18 The reliance on a single vendor for perimeter defense means that Wilko’s security teams must maintain a constant, reactive relationship with Check Point’s support infrastructure. This creates a “vendor lock-in” that is difficult to break without significant capital expenditure and operational risk.
3.2 Endpoint Sovereignty: SentinelOne
Vendor Origin: Mountain View, CA / Tel Aviv, Israel. Founded by Tomer Weingarten and Almog Cohen (Unit 8200).
Complicity Weight: High (Device Control).
Technographic evidence derived from job descriptions for IT security roles at “The Range” explicitly lists proficiency with SentinelOne as a core requirement.7 This confirms that SentinelOne is the deployed EDR (Endpoint Detection and Response) solution.
3.2.1 The Singularity Platform
SentinelOne operates on the “Singularity” platform, which utilizes autonomous AI to detect malicious behavior on endpoints (laptops, servers, POS terminals).20
- Kernel Access: To function, SentinelOne requires kernel-level access to the operating system. This is the deepest level of access possible on a computer. It grants the software the ability to terminate processes, quarantine files, and monitor all user activity.
- Data Telemetry: The “Deep Visibility” component records every event on the endpoint—file modifications, network connections, process injections—and streams this telemetry to the cloud for analysis.
- The 8200 Connection: SentinelOne’s R&D center remains in Tel Aviv, and its foundational technology is rooted in the offensive cyber capabilities taught in Unit 8200. The “offensive” nature of the defense (active mitigation) is a hallmark of Israeli cyber doctrine.
3.2.2 The Wiz Integration Nexus
While direct procurement of Wiz (another Israeli unicorn, founded by Assaf Rappaport) is not explicitly confirmed via invoice, the strategic partnership between SentinelOne and Wiz is a key market trend.22 The integration of these two platforms allows for a “Code-to-Cloud” security posture. Given the “MACH” architecture of Wilko 2.0, which relies heavily on cloud-native services, the adoption of Wiz to secure the cloud environment (alongside SentinelOne on the endpoint) is a highly probable architectural decision, further consolidating the stack within the Israeli ecosystem.
3.3 Identity and Privileged Access: CyberArk
Vendor Origin: Petah Tikva, Israel. Founded by Udi Mokady (Unit 8200).
Complicity Weight: Critical (Identity Sovereignty).
In the context of major UK retailers with turnover exceeding £100 million, CyberArk is the de facto standard for Privileged Access Management (PAM).24
- The Digital Vault: CyberArk secures the “keys to the kingdom”—the administrator passwords for servers, databases, and cloud root accounts.
- Implication: If Wilko utilizes CyberArk (which is highly likely given the enterprise complexity of CDS), then the access control mechanism for the entire digital estate is Israeli. The “Identity Security” layer is the new perimeter, and its custodian is a firm with deep ties to the Israeli defense establishment.
3.4 Network Defense & DDoS: Imperva
Vendor Origin: Tel Aviv, Israel (Acquired by Thales, but operations remain deeply rooted in Israel).
Complicity Weight: Medium-High (Availability).
High-volume e-commerce retailers like Wilko.com are prime targets for Distributed Denial of Service (DDoS) attacks and credential stuffing. Imperva is a market leader in this space, specifically for retail.26
- Traffic Scrubbing: Imperva acts as a proxy. Traffic destined for Wilko.com first hits Imperva’s edge nodes (potentially including those in Tel Aviv, though routed globally). Imperva decrypts the traffic, inspects it for malicious bots or SQL injection attacks, and then re-encrypts it before sending it to Wilko’s origin servers.
- Bot Management: Imperva’s “Advanced Bot Protection” uses behavioral challenges to distinguish humans from scrapers.28 This capability is essential for preventing competitor price scraping and inventory hoarding.
4. Intelligence Requirement 2: Surveillance & Biometrics
As Wilko returns to the high street with a planned rollout of 300 stores, the “Loss Prevention” stack becomes a critical vector for the introduction of surveillance technologies. The line between theft prevention and mass surveillance is blurred by technologies originating from the security state.
4.1 Video Analytics: BriefCam
Vendor Origin: Modi’in, Israel. (Acquired by Canon, but R&D is Israeli).
Complicity Weight: High (Biometric Surveillance).
BriefCam is the industry standard for “Video Synopsis” technology.11 It is widely used in the UK by law enforcement and major retail estates to process CCTV footage.
4.1.1 The “Synopsis” Engine
BriefCam’s core capability is to compress hours of video into minutes by overlaying objects that appeared at different times.29 More critically for this audit, it includes:
- Facial Recognition: Matching faces against watchlists of “known offenders” or shoplifters.30
- Behavioral Analytics: Analyzing “dwell time” (how long a person stands in one spot) and pathing.
- License Plate Recognition (LPR): Identifying vehicles in car parks.
4.1.2 Deployment via Integrators
BriefCam is rarely bought “off the shelf” by a retailer. It is deployed via Systems Integrators (SIs) and Video Management Software (VMS) partners. The audit identifies Verint (another company with Israeli origins in its security division, though now spun off/diversified) and IMAC Group as key partners in the facilities management and security space for CDS Superstores.31
- IMAC Group: Provides facilities management, including security and CCTV, for major clients. Their partnership with The Range suggests they manage the physical security layer.32
- Verint: Historically a leader in “Actionable Intelligence,” Verint’s video solutions often integrate with BriefCam for advanced analytics.33
4.2 Voice Surveillance: The UST/aiOla Vector
Vendor Origin: Herzliya, Israel.
Complicity Weight: Emerging (Workforce Monitoring).
A unique finding of this audit is the potential for Voice AI surveillance in the supply chain. UST, the digital transformation partner for Wilko, has a strategic investment and deployment partnership with aiOla.13
- The Tech: aiOla uses “acoustic events” and speech recognition to digitize frontline operations. In a warehouse or store back-end, employees speak commands (“Stock check aisle 4”) which are processed by aiOla’s AI.
- The Surveillance Aspect: This technology effectively introduces continuous audio monitoring of the workforce. It captures not just commands but the ambient acoustic environment. The data is processed by models developed by Israeli intelligence alumni (aiOla’s leadership team includes heavyweights from the Israeli tech defense sector).13
- Project Future Integration: As part of the “unpicking of legacy tech” and the move to “voice-directed services” 34, the deployment of aiOla represents a cutting-edge vector of Israeli tech into the daily lives of Wilko employees.
5. Intelligence Requirement 3: Algorithmic Commerce & Revenue Extraction
Moving beyond defense, the “offense”—revenue generation—at Wilko.com is powered by a suite of Israeli marketing and optimization technologies. These tools directly influence user behavior, manipulating what products are seen, how they are priced, and how social proof is presented.
5.1 The Psychological Engine: Dynamic Yield
Vendor Origin: Tel Aviv, Israel. (Acquired by McDonald’s, then Mastercard, but R&D remains in Israel).
Complicity Weight: High (User Experience Control).
Dynamic Yield explicitly lists The Range as a client in its portfolio.8 Given the integration of Wilko into The Range’s digital backend, Wilko.com inherits this personalization engine.
- Mechanism: Dynamic Yield sits on the website and captures every click, hover, and scroll. It uses this behavioral data to algorithmically render the website differently for each user.
- The “Experience OS”: It decides which hero banner to show, which products to recommend in the “You May Also Like” carousel, and what incentives (coupons) to offer to prevent cart abandonment.36
- Complicity Factor: This is the brain of the website. The logic determining Wilko’s sales strategy is algorithmic code written in Tel Aviv. It maximizes revenue by exploiting psychological triggers (scarcity, social proof) modeled by Israeli data scientists.
5.2 Visual Intelligence: Syte
Vendor Origin: Tel Aviv, Israel.
Complicity Weight: Medium (Product Discovery).
Syte is identified as a vendor for The Range.9 Syte provides “Visual AI” for product discovery—allowing users to upload photos to find similar products or recommending items based on visual similarity rather than text keywords.
- Retail Application: For a homeware retailer like Wilko/The Range, visual search is critical. Syte’s deep learning models process the visual inventory. The reliance on Syte indicates that the “searchandising” capability is outsourced to Israeli AI.38
- Data Loop: Every image uploaded by a UK customer to find a matching lamp or curtain trains Syte’s computer vision models, further refining the intellectual property of the Israeli firm.
5.3 Reputation & Loyalty: Yotpo
Vendor Origin: Tel Aviv, Israel.
Complicity Weight: Medium-High (Social Proof).
Yotpo is the review and loyalty platform of choice for The Range, and by extension, the integrated Wilko platform.8
- Function: Yotpo collects and displays user-generated content (reviews, photos). It also manages loyalty programs (points, referrals).
- Strategic Lock-in: Yotpo is not just a widget; it is a data silo of customer sentiment. The “Trust” capital of the Wilko brand is hosted on Yotpo’s servers. The platform uses AI to moderate reviews and prompt upsells.41
- Revenue Flow: Yotpo operates on a subscription model based on order volume. As Wilko scales, its payments to Yotpo increase.
6. Intelligence Requirement 4: Financial Intelligence & Fraud
6.1 The Gatekeeper: Riskified
Vendor Origin: Tel Aviv, Israel.
Complicity Weight: Critical (Financial Sovereignty).
Riskified lists The Range as a client.10 This is a critical finding for the complicity audit.
- The “Chargeback Guarantee” Model: Unlike traditional fraud tools that give a “risk score,” Riskified gives a binary “Approve/Decline” decision and assumes the liability for fraud.43
- Gatekeeping: This means an Israeli AI algorithm literally decides which UK consumers are allowed to buy from Wilko.com. If Riskified’s model flags a transaction, the sale is blocked.
- Data Sovereignty: Riskified collects deep behavioral biometrics—mouse movements, typing speed, device fingerprinting, and email age.44 This data is cross-referenced with their global network. The financial sovereignty of Wilko’s checkout process is entirely ceded to Riskified.
- Revenue Extraction: Riskified typically charges a percentage of approved revenue. This is a direct tax on Wilko’s success flowing to Israel.
- Analytic Insight: The shift from risk scoring to liability shift is a major trend in retail. By adopting Riskified, CDS Superstores has made a financial calculation that paying an Israeli firm a percentage of revenue is cheaper than managing their own fraud team. This binds the financial health of the retailer directly to the vendor’s performance.
6.2 The “Chris Dawson” Factor & Margin Protection
Chris Dawson 45 runs CDS with a focus on extreme efficiency and margin protection.
- Why Israel? Israeli tech is marketed on “Defense-Grade” efficiency. Riskified promises “100% chargeback guarantee.” Check Point promises “Zero Trust.” For a billionaire looking to squeeze margin from a discount retailer (Wilko), the effectiveness of these tools outweighs geopolitical considerations.
- The “Iron Dome” for Retail: Dawson has effectively built an “Iron Dome” around Wilko’s profit margins using Riskified (blocking fraud), Check Point (blocking hackers), and SentinelOne (blocking malware).
7. Intelligence Requirement 5: Cloud & Data Sovereignty
7.1 The Indirect Link to Project Nimbus
“Project Nimbus” is the $1.2 billion contract to provide cloud services (AWS and Google Cloud) to the Israeli government and defense establishment. While Wilko does not participate in Nimbus directly (as it is not an Israeli government entity), its vendor ecosystem creates an indirect link.
- Vendor Interconnectivity: The security vendors Wilko uses—Check Point, SentinelOne, Wiz, CyberArk—are the same vendors that secure the Nimbus infrastructure. They provide the “security layer” that allows the Israeli government to safely move sensitive data to the public cloud.
- R&D Subsidization: By paying licensing fees to these vendors, Wilko contributes to the R&D budgets that develop the tools used to secure Israeli state infrastructure. The commercial success of these firms in the UK retail market directly subsidizes their ability to serve the Israeli defense sector.
7.2 Data Residency vs. Algorithmic Processing
While Wilko likely hosts its primary data on AWS or Azure instances located in the UK (London Region) to comply with GDPR, the processing of that data by third-party SaaS vendors involves cross-border data flows.
- Riskified: Processes transaction data. While they have GDPR compliance, the models are trained and maintained by teams in Tel Aviv.
- Check Point: Threat telemetry data (metadata about attacks) is streamed to the ThreatCloud, which is centrally managed.
- Legal Implications: Israel has “adequacy” status under GDPR, which facilitates this transfer. However, the Israeli “Cloud Act” equivalents and the dominance of the defense sector in the tech industry mean that data held by these firms is theoretically accessible to the Israeli state security apparatus if deemed necessary for national security.
8. Digital Complicity Score Calculation
8.1 Methodology
The Digital Complicity Score (DCS) is an aggregate metric derived from the operational reliance on Israeli vendors across three domains: Infrastructure, Revenue, and Operations.
- Infrastructure (40% Weight): Criticality of the vendor to basic uptime and security. Can the business function without them?
- Revenue (40% Weight): Criticality of the vendor to sales generation and financial processing. Do they control the money?
- Operations (20% Weight): Criticality to physical store operations and supply chain.
8.2 Scoring Breakdown
| Domain |
Key Vendor(s) |
Origin |
Criticality |
“Complicity” Weight |
Score Impact |
| Network Security |
Check Point |
Israel (Unit 8200) |
High (Gatekeeper) |
10/10 |
High |
| Endpoint Security |
SentinelOne |
Israel/USA |
High (Device Control) |
9/10 |
High |
| Fraud/Payments |
Riskified |
Israel |
High (Revenue Gatekeeper) |
10/10 |
High |
| Personalization |
Dynamic Yield |
Israel |
Med-High (User Exp) |
8/10 |
Med-High |
| Visual Search |
Syte |
Israel |
Med (Discovery) |
7/10 |
Med |
| Reviews/Loyalty |
Yotpo |
Israel |
Med (Reputation) |
8/10 |
Med |
| Video Analytics |
BriefCam |
Israel |
High (Biometrics) |
9/10 |
High |
| Voice Ops |
aiOla (via UST) |
Israel |
Med (Workforce) |
7/10 |
Emerging |
Calculated Score: 8.5 / 10
8.3 The Verdict Interpretation
Wilko Online is structurally integrated into the Israeli tech ecosystem. Unlike a company that simply buys a commodity hardware product, Wilko has outsourced its decision-making logic (Fraud, Personalization, Security) to Israeli algorithms.
- Material Support: Millions of pounds in annual licensing fees (SaaS subscriptions) flow from CDS Superstores to these vendors.
- Ideological Support: By normalizing the use of surveillance tech (BriefCam) and predictive policing tools (Riskified) in consumer retail, Wilko validates technologies honed in the occupation/security context.
9. Strategic Recommendations & Outlook
9.1 Divestment Feasibility Assessment
For any stakeholder looking to reduce this “Complicity Score,” the path is fraught with operational peril.
- Removing Check Point would leave the network perimeter exposed. A migration to a competitor like Palo Alto Networks would incur massive downtime and reconfiguration costs (and Palo Alto Networks was also founded by an Israeli, Nir Zuk, creating a similar, if slightly diluted, complicity issue).
- Removing Riskified is the most difficult extract. The “Chargeback Guarantee” is a financial crutch. Removing it would require Wilko to build an internal fraud team from scratch and accept liability for losses—a proposition that contradicts the low-cost, high-efficiency model of The Range.
- Removing Dynamic Yield would degrade the user experience and lower conversion rates immediately.
9.2 Future Outlook
The “Wilko 2.0” roadmap involves further integration with Homebase (recently acquired) and the expansion of the physical store estate. This will likely increase the score over time.
- Expansion of BriefCam: As 300 new stores open, the deployment of video analytics for “loss prevention” will scale linearly.
- Expansion of aiOla: As the logistics network consolidates under THG/UST, the use of voice AI will likely permeate the supply chain.
Final Assessment: Wilko serves as a case study in “Passive Complicity.” Its leadership may not have an ideological agenda, but their pursuit of “Digital Transformation” and “MACH Architecture” has inextricably bound the retailer’s future to the economic and technological success of the Israeli security state. Every transaction on Wilko.com triggers a cascade of API calls to Tel Aviv, generating data and revenue that supports the Unit 8200 ecosystem.
End of Report.
Works cited
- The Range (retailer) – Wikipedia, accessed November 27, 2025, https://en.wikipedia.org/wiki/The_Range_(retailer)
- The Range buys Wilko brand in multimillion-pound deal – The Guardian, accessed November 27, 2025, https://www.theguardian.com/business/2023/sep/13/the-range-buys-wilko-brand-in-multimillion-pound-deal
- Wilko update – The Range reaches agreement with administrators to acquire Brand, Website and Intellectual Property – PwC UK, accessed November 27, 2025, https://www.pwc.co.uk/press-room/press-releases/administrations/wilko-update-the-range-reaches-agreement-with-administrators-to-acquire-brand-website-and-intellectual-property.html
- CDS Superstores aquires Homebase | wilko.com, accessed November 27, 2025, https://www.wilko.com/en-uk/corporate/cds-superstores-owners-of-the-range-and-wilko-aquire-homebase
- Best of 2024: Wilko 2.0 – How The Range owner plans to revive the discount chain, accessed November 27, 2025, https://www.retailgazette.co.uk/blog/2024/12/interview-the-return-of-wilko/
- Check Point launches security gateways to protect SMBs against threats, accessed November 27, 2025, https://securitybrief.co.nz/story/check-point-launches-security-gateways-to-protect-smbs-against-threats
- Enterprise Sales Representative – Unveiling Opportunities: Careers at SentinelOne, accessed November 27, 2025, https://boards.greenhouse.io/sentinellabs/jobs/6342042003
- Select Customers – Dynamic Yield, accessed November 27, 2025, https://www.dynamicyield.com/clients/
- Contents – With Visual AI, accessed November 27, 2025, https://visual-ai-2-0.wppbav.com/media/sites/118/2023/05/visual-ai-2.pdf
- Riskified at D.A. Davidson Conference: Strategic Insights into E-commerce Risk Management By Investing.com, accessed November 27, 2025, https://www.investing.com/news/transcripts/riskified-at-da-davidson-conference-strategic-insights-into-ecommerce-risk-management-93CH-4089918
- BriefCam Platform Datasheet, accessed November 27, 2025, https://www.briefcam.com/wp-content/uploads/2025/06/BriefCam-Platform-Datasheet.pdf
- The latest from Wilko, Very, boohoo: RTIH’s biggest retail technology articles on LinkedIn right now, accessed November 27, 2025, https://retailtechinnovationhub.com/home/2023/2/16/the-latest-from-wilko-very-and-boohoo-rtihs-biggest-retail-technology-articles-on-linkedin-right-now
- UST Invests in aiOla to Scale Hands-free, Voice-agentic Automation for Frontline Operations Globally – PR Newswire, accessed November 27, 2025, https://www.prnewswire.com/il/news-releases/ust-invests-in-aiola-to-scale-hands-free-voice-agentic-automation-for-frontline-operations-globally-302604100.html
- The Range and Wilko ink new partnership to boost digital expansion – Retail Systems, accessed November 27, 2025, https://www.retail-systems.com/rs/The_range_and_wilko_ink_new_partnership_to_boost_digital_expansion.php
- UST Invests in aiOla to Scale Hands-free, Voice-agentic Automation for Frontline Operations, accessed November 27, 2025, https://www.ust.com/en/who-we-are/ust-newsroom/ust-invests-in-aiola-to-scale-hands-free-voice-agentic-automation-for-frontline-operations
- Check Point Next Generation Firewalls (NGFWs) Reviews & Product Details – G2, accessed November 27, 2025, https://www.g2.com/products/check-point-next-generation-firewalls-ngfws/reviews
- Check Point Software’s Quantum Spark™ Security Gateways Protect Small and Medium Businesses against the Most Advanced Cyber-threats, accessed November 27, 2025, https://www.checkpoint.com/press-releases/check-point-softwares-quantum-spark-security-gateways-protect-small-and-medium-businesses-against-the-most-advanced-cyber-threats/
- CVE-2024-24919: Check Point Security Gateways Vulnerability Explained – Intruder.io, accessed November 27, 2025, https://www.intruder.io/blog/cve-2024-24919-check-point-security-gateways-vulnerability-explained
- Senior Solutions Engineer – Prompt (United States – West) at SentinelOne – DailyRemote, accessed November 27, 2025, https://dailyremote.com/remote-job/senior-solutions-engineer-prompt-united-states-west-4249700
- SentinelOne® Supercharges Cloud Security with Enhanced Wiz Integration, accessed November 27, 2025, https://www.sentinelone.com/press/sentinelone-supercharges-cloud-security-with-enhanced-wiz-integration/
- What is Cyber Security? Types, Importance & Threats – SentinelOne, accessed November 27, 2025, https://www.sentinelone.com/cybersecurity-101/cybersecurity/what-is-cyber-security/
- Check Point Enters Next Level of Strategic Partnership with Wiz to Deliver Integrated CNAPP and Cloud Network Security Solution, accessed November 27, 2025, https://www.checkpoint.com/press-releases/check-point-enters-next-level-of-strategic-partnership-with-wiz-to-deliver-integrated-cnapp-and-cloud-network-security-solution/
- Check Point Software Technologies and Wiz Enter Strategic Partnership to Deliver End-to-End Cloud Security, accessed November 27, 2025, https://www.checkpoint.com/press-releases/check-point-software-technologies-and-wiz-enter-strategic-partnership-to-deliver-end-to-end-cloud-security/
- CYBR – CyberArk Software Ltd Earnings Call Transcripts – Morningstar, accessed November 27, 2025, https://www.morningstar.com/stocks/xnas/cybr/earnings-transcripts
- DPD Czech becomes audit-ready by eliminating third-parties access risk and in record time, accessed November 27, 2025, https://www.cyberark.com/customer-stories/dpd/
- Imperva SD-SOC: How Using AI and Time Series Traffic Improves DDoS Mitigation, accessed November 27, 2025, https://www.imperva.com/blog/imperva-sd-soc-how-using-ai-and-time-series-traffic-improves-ddos-mitigation/
- Fast, Furious, and Scalable: Designing a High-throughput, Real-time Network Traffic Analyzer | Imperva, accessed November 27, 2025, https://www.imperva.com/blog/fast-furious-and-scalable-designing-a-high-throughput-real-time-network-traffic-analyzer/
- A Recap of Released Features in Q3 for Imperva’s Online Fraud Prevention Solution, accessed November 27, 2025, https://www.imperva.com/blog/a-recap-of-released-features-in-q3-for-impervas-online-fraud-prevention-solution/
- BriefCam: Advanced Surveillance Systems for Business, accessed November 27, 2025, https://www.briefcam.com/
- Why BriefCam? | Industry Leading Innovation, accessed November 27, 2025, https://www.briefcam.com/why-briefcam/
- WFM Jobs live in November 2025 – Jobsite, accessed November 27, 2025, https://www.jobsite.co.uk/jobs/wfm
- Imac Group: Facilities Management Specialists | Ireland, accessed November 27, 2025, https://imacgroup.co.uk/
- IFSEC Special Edition – IP UserGroup International, accessed November 27, 2025, http://www.ipusergroupinternational.org/medias/files/ipfocus-ezine-may14-1-.pdf
- Voice-Directed Warehousing Solutions – Peak Technologies, accessed November 27, 2025, https://www.peaktech.com/services/supply-chain-services/voice-directed-services/
- Building customer-centric digital experiences: An Elkjop case study – Dynamic Yield, accessed November 27, 2025, https://www.dynamicyield.com/lesson/elkjop/
- A/B testing guide by CRO experts, with examples – Dynamic Yield, accessed November 27, 2025, https://www.dynamicyield.com/lesson/introduction-to-ab-testing/
- Personalization Pyramid: A Framework for Designing with User Data – A List Apart, accessed November 27, 2025, https://alistapart.com/article/personalization-pyramid/
- Why Visual AI is the of E-commerce, accessed November 27, 2025, https://visual-ai.wppbav.com/media/sites/100/2021/07/Visual-AI-New-Frontier-E-Commerce.pdf
- AI is Driving the Future of Hardware, Software, and Data – Syte, accessed November 27, 2025, https://www.syte.ai/blog/retail-innovation/ai-hardware-software-data/
- Explore Proven B2B Sales Strategies for Top Retail Companies – SURFE, accessed November 27, 2025, https://www.surfe.com/market-signals/top-retail-companies/
- Yotpo 2025 Pricing, Features, Reviews & Alternatives – GetApp, accessed November 27, 2025, https://www.getapp.com/marketing-software/a/yotpo/
- Yotpo vs Feefo: A Detailed Comparison – JeeCart, accessed November 27, 2025, https://jeecart.com/yotpo-vs-feefo/
- Riskified Ltd., accessed November 27, 2025, https://ir.riskified.com/static-files/faca11de-f588-4ec6-b3ef-139b5e3fc8f2
- Introducing the Fraud Management Solution Buyer’s Kit – Riskified, accessed November 27, 2025, https://web-assets.riskified.com/pdfs/buyers-kit/Buyers-Kit_Riskified.pdf
- Chris Dawson (businessman) – Wikipedia, accessed November 27, 2025, https://en.wikipedia.org/wiki/Chris_Dawson_(businessman)