Closed cash handling system by Gunnebo

October 2015 Access Control & Identity Management, Surveillance, Integrated Solutions, Security Services & Risk Management

Retailers could be exposing themselves to unnecessary risk when they overlook the security and efficiency benefits of cash handling machines. In today’s retail environment, theft by staff or staff error; the cost of staff managing the cash handling processes; the number of counterfeit notes in circulation and the increasing risk of attack are daily considerations.

Wouldn’t the safest way of dealing with cash in a retail environment simply be not to touch it? And by this we aren’t referring to a cashless society because as statistics have indicated, there is more cash in circulation than ever before. But, rather the SafePay closed cash handling system by Gunnebo.

This ergonomic and user friendly solution addresses the issues of cash differences; the authentication of banknotes; time consuming cash up procedures and also dissuades criminals. An open and interactive retail environment is achieved and staff are able to focus on customer service and selling.

The SafePay closed cash handling system in a retail environment.
The SafePay closed cash handling system in a retail environment.

The SafePay closed cash handling system is a checkout payment solution which combines note and coin recycling units. Items are scanned and customers feed notes or drop coins into the respective units to pay and are then issued with the correct change. At no time during this process does the cashier handle money unless the retailer prefers a cashier operated system, which is also available.

When the cash is transferred to the back office, it is done so in sealed, ink-protected cassettes and has already been counted and checked. When docked in the transfer unit which is installed in the back office, these cassettes empty into an ink-protected security case. The cash is then secured for pick-up by a cash-in-transit company. The cash is never exposed during this process, not even during a refilling or maintenance service. Online control and reporting through SafePay Cash Control software ensures accurate and live reporting and can be customised to any point of sale software.

“By installing a SafePay system, your store efficiency will improve, you will experience a decrease in shrinkage and robbery attempts and you will have access to cash cycle data for improved management reporting,” summarises Hannes Venter, managing director of Gunnebo South Africa.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The security debt hidden in residential estates
Security Services & Risk Management Integrated Solutions Residential Estate (Industry)
Many residential estates undermine their own security not through a lack of technology, but through hidden weaknesses in gate design, fragmented systems, recurring software dependence, weak operational ownership, and insufficient estate management input.

Read more...
Africa’s opportunity to shape the future of human-centred AI
AI & Data Analytics Security Services & Risk Management
Across the Global South, countries are not yet locked into decades of legacy AI systems, energy-intensive infrastructure, or governance frameworks designed for a different technological era. That creates something rare in technology development: a cleaner slate.

Read more...
AURA appoints Taryn Winer as global head of people
News & Events Security Services & Risk Management
Following its €13,5 million Series B funding round last year and accelerating international expansion, particularly across the United States, AURA has appointed Taryn Winer as global head of people.

Read more...
Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Security’s three defining forces for 2026
Milestone Systems AI & Data Analytics Surveillance IoT & Automation
As we move into 2026, several technology trends that were once mostly confined to research labs and conference keynotes are now becoming part of the daily reality of the security industry.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.