Call Sales: 0845 470 4001Call Support: 0800 130 3365 | Support Portal Login

What “AI/IoT-Ready” Really Means on the Shop Floor – a New Perspective for Retailers

AI in Retail

The retail playbook has been fundamentally rewritten. Customer journeys are omnichannel by default, IoT sensors are now omnipresent in both warehouses and shop floors, and AI is moving from pilot to P&L at an unprecedented pace. And the results are already proving transformative:

  • Time-to-open: New stores and pop-ups are networked, secured, and POS-ready in days, not weeks.
  • CX becomes predictive: Personalised offers and staffing respond to real-time signals, not yesterday's batch.
  • Shrink is minimised: Vision-based loss prevention, plus better on-shelf availability.
  • Cost-to-serve falls: Energy, logistics, and labour are optimised by rich streams of real-time date.
  • Audits are boring (in a good way!): PCI and security postures are continuously and consistently maintained across estates and partners. 

But in the race to access all these potential benefits, the winners aren't the ones with the flashiest demos – they're the ones with a rock-solid digital foundation that lets AI and IoT platforms scale safely, securely, and intelligently, store by store.

So, from Exponential-e's vantage point across cloud, connectivity, cyber, and communications, and our ongoing conversations with top retailers across the UK, here's what "AI/IoT-ready" actually means for the sector, and how we can begin laying those all-important foundations…

A network built for real-time, store-level intelligence

IoT and AI thrive on low latency and high availability, particularly when Point of Sale (PoS), inventory, and computer-vision workloads are increasingly interconnected. That means the underling WAN stops being a cost line and becomes a growth platform. Frictionless shopping experiences, incorporating queue-free checkout, real-time offers, and dynamic pricing, depend on fast, reliable data flows at the edge.

Software-defined networking, built on a private VPLS core, makes this practical at scale, offering centralised control, application-aware routing, seamless use of diverse access (i.e. ethernet, 4G/5G), and integrated security. Beyond the immediate operational advantages of avoiding hairpinning over the public internet and low, predictable latency, such networks offer the scalability and agility needed for pop-ups, seasonal peaks, and new store openings, where day-one uptime and policy consistency are required.

This should be complemented with enterprise IoT/M2M SIMs that deliver multi-carrier access and centralised control for store sensors, handhelds, lockers, smart signage, and similar devices.

Cloud and edge compute as a single, unified platform

 AI-assisted retail is a hybrid sport: heavy training and data engineering in the Cloud, instant inference and control at the edge. To this end, retailers pursuing "always-on", augmented stores are converging 5G, IoT, and AI with edge compute to deliver truly personalised experiences in the moment, not hours later. This next-gen local processing, with edge computing implemented in every store, delivers a seamless PoS for customers, while simultaneously optimising staff's efficiency and reducing backhaul costs.

In the longer term, centralised data platforms and AI services can crunch multi-store telemetry for demand forecasting, replenishment, and customer analytics, offering a rich stream of actionable insights that enable reduced energy usage, automated restocking tasks, and smoother labour scheduling - immediate, powerful operational wins.

These capabilities can be developed into a standardised model and then be deployed, managed, and scaled consistently across new sites as retailers expand their operations. It's no surprise that multiple European retailers are already doing exactly this to not only protect their immediate margin and availability, but also accelerate their future growth plans.

Embracing the 'secure by design' model

Retail IT estates increasingly span POS, e-commerce, click-and-collect, and IoT devices. However, more devices and more data mean an increased attack surface, particularly when it comes to customers' payment data. As a result, robust security must be embedded in the design of all systems, platform, and processes, not bolted on later. Forward-thinking retailers are already rolling out this 'secure by design' approach, building customer trust through multi-layered, PCI-DSS-ready security ecosystems that allow for continuous monitoring and intelligently automated policy enforcement.

Secure Access Service Edge (SASE) has a key role to play here, converging network and security in the Cloud and offering numerous pathways to establishing identity-centric access, micro-segmentation of IoT devices, and uniform policies across stores and partners. Even with thousands of distributed end points, all this can be accessed through a single pane of glass - a "single source of truth" for all networks, devices, and workloads. 

Taking the next step of your AI/IoT journey

AI and IoT in retail aren't separate projects; they must be treated as fundamental parts of a single, software-defined platform that reaches every shelf, sensor, and checkout. Build the network and edge right, wrap it with zero-trust security, and connect it to a governed data and AI backbone, then scale and optimise what works.

If you'd like this distilled into a tailored blueprint for your own estate (i.e. current stores, formats, and use-case priorities), we can map the stack, identify quick wins, and sequence the roadmap to outcomes, with everything overlaid by a single SLA, as a fully integrated service. Get in touch to discuss your own AI and IoT goals and let's make sure you're building on the right digital foundation! 

  1317 Hits

Germany charges hacker with Rosneft cyberattack in latest wake-up call for critical infrastructure

Germany charges hacker with Rosneft cyberattack in latest wake-up call for critical infrastructure

A 30‑year‑old man has been charged with launching a cyberattack on the German subsidiary of Russia's state-owned oil giant Rosneft. The cyberattack, which happened in March 2022 in the aftermath of Russia's invasion of Ukraine, crippled the company's operations and cost millions of euros in damages.

  3149 Hits

Retail is a prime target for cyberattacks… but it’s time to fight back

Retail is a prime target for cyberattacks… but it’s time to fight back

Traditionally, retailers' biggest security concern has been theft, and so CCTV systems evolved to ensure shoplifters could be identified as quickly as possible and stock shrinkage minimised, forming a foundational element of on-site infrastructure. However, as retailers expanded their operations and looked to achieve seamless communication and interoperability between sites and warehouses, the security concern grew to include data theft, and so secure, resilient connectivity became a key priority.

  1129 Hits

UK Government ponders major changes to ransomware response – what you need to know

uk-government-ponders-major-changes-to-ransomware-response-what-you-need-to-know

What's happened? 

Recorded Future has reports that the British Government is proposing sweeping change in its approach to ransomware attacks.

  119863 Hits

Why Legal firms are making SIEM systems a key element of their cyber security strategies

why-legal-firms-are-making-siem-systems-a-key-element-of-their-cyber-security-strategies

The UK's Legal sector must contend with some of the most stringent compliance and data protection obligations in the current digital landscape. For many years, this has hindered the progress of digital transformation initiatives within firms, but in recent years, in order to meet the challenges of COVID-19, many firms have seized the opportunity to modernise cumbersome legacy systems and develop cutting-edge IT infrastructure that enables their staff to work more flexibly.

  2626 Hits

You cannot afford to risk human error compromising your cyber security

you-cannot-afford-to-risk-human-error-compromising-your-cyber-security

In spite of the ongoing evolution of cyber security processes and technology, human error is still responsible for 95% of data breaches1. Phishing attacks alone represent a particularly insidious risk, with 91% of organisations experiencing a successful attack in 2021 alone2.

  2929 Hits

The Finance sector’s relationship with its Cloud providers is evolving

b2ap3_large_The-Finance-sectors-relationship-with-its-Cloud-providers-is-evolving

For some years now, Cloud adoption has been steadily on the rise across the UK's Finance sector, with organisations including banks, insurers, and investment firms phasing out increasingly cumbersome legacy systems in favour of more scalable, agile, and cost-effective infrastructure. Indeed, more than 48% of UK banking services are now built on Cloud infrastructure.

  2979 Hits

What makes a ransomware attack eight times as costly? Compromised backups

what-makes-a-ransomware-attack-eight-times-as-costly-compromised-backups

Any organisation that has tried to recover from a ransomware attack knows that it can be time-consuming and costly. Companies hit by an attack must choose between paying a ransom or recovering encrypted data from a backup.

Unfortunately, ransomware gangs are too aware that they can leverage significantly higher ransoms from their corporate victims if they have also compromise the company's backups. For this reason, we are seeing more and more cyber attacks targeting backups because they know that organisations desperately need them to recover if they want to avoid paying a ransom to cybercriminals.

  104165 Hits

Ransomware attacks skyrocket, with LockBit 3.0 at the forefront

ransomware-attacks-skyrocket-with-lockbit-3-0-at-the-forefront
Newly-released research indicates that ransomware attacks reached a record high in May, with the surge primarily fueled by a massive increase in the number of attacks perpetrated by the LockBit ransomware group and its affiliates.
  102323 Hits

Supply-chain ransomware attack cripples thousands of car dealerships

supply-chain-ransomware-attack-cripples-thousands-of-car-dealerships
Car dealerships have been brought to a standstill across the United States after a software provider was hit by a ransomware attack.
  108018 Hits

Wherever you are in your network transformation journey, is it time to consider SASE?

wherever-you-are-in-your-network-transformation-journey-is-it-time-to-consider-sase
From start-ups to global leaders, across the public and private sectors, organisations' ongoing growth and brand reputation rises or falls based on the quality of their networks. As a result, network transformation is a growing priority, with IT leaders looking to replace cumbersome legacy systems with flexible, scalable, and secure connections that support tomorrow's highly dynamic workflows.
  3070 Hits

Laying the foundation for a successful network transformation

laying-the-foundation-for-a-successful-network-transformation

Despite the numerous interconnected elements now involved in effective digital transformation, the network remains the foundation of everything, ensuring any investment in new technologies delivers the best possible ROI, and that teams at all levels are empowered to deliver their very best, 24 / 7. As such, the digital transformation journey must always begin with a full network transformation.

  2314 Hits

NCSC warns of IT helpdesk impersonation trick being used by ransomware gangs after UK retailers attacked

reflecting-on-the-2025-bsa-conference-modernising-the-mutual_blogheader

The UK's National Cyber Security Centre (NCSC) has warned the IT helpdesks of retailers to be on their guard against bogus support calls they might receive from hackers pretending to be staff locked out of their accounts.

  78839 Hits

Reflecting on the 2025 BSA Conference - Modernising the Mutual

reflecting-on-the-2025-bsa-conference-modernising-the-mutual_blogheader

Having returned from the BSA Conference 2025, it was clear that building societies are navigating a critical juncture - balancing their relationship-led service models while addressing the urgent need to modernise outdated systems and improve operational efficiency. Given the current geopolitical climate, and the increasing pace of innovation, developing a strategy that not only solves immediate challenges, but offers sufficient scope to tackle future issues, can often seem like a moving target.

  1612 Hits

Restoring critical data in three days following a cyberattack

Restoring-critical-data-in-three-days-following-a-cyberattack

The Challenge

In Q3 of 2024, the CEO of a UK-based bank received an email from a ransomware group, informing him that the bank's data had been encrypted and would be released on the dark web unless a ransom demand was paid. Although several insurers and consultants were engaged to resolve the situation, the slow response times made it clear that an alternative approach would be needed.

Finally, in order to minimise the resulting downtime and resume operations as soon as possible, without giving in to the criminals' ransom demand, the organisation engaged Exponential-e to restore and secure their critical servers. With even the shortest period of downtime resulting in serious financial and reputational damage, a team of incident response specialists immediately began the restoration process, aiming to have the bank's systems back online in days rather than weeks.

The Solution

The restoration process began with a thorough audit of the IT ecosystem to establish which servers had been impacted, after which the affected VMs were powered down. A new, fully isolated VDC was created to store these VMs once they were recovered, along with a completely new firewall zone.

With the affected servers restored into this new VDC zone, firewalls were established to allow for the most basic access, after which malware scans were conducted. These scans continued for two days, during which the customer was granted initial access to the servers via a temporary SSL VPN with Azure MFA, allowing them to resume operations in just three days.

At this point, Zerto replication was set up for the new VMs, while Exponential-e simultaneously engaged with the third party that was conducting a forensic investigation. 

Connectivity was soon re-established for the customer's other offices, at which point users were brought back online. Firewall logs were provided for the forensic team, along with initial access to VM images via vCloud Director.

Finally, a test rebuild of the affected VMs was conducted and finalised within two days, and additional firewall policies established.

Exponential-e has repeated variations of this process for multiple other organisations affected by ransomware attacks, allowing them to resume operations as quickly as possible and ensure their critical infrastructure is secured against future attacks. 

The Result

Ongoing communication between all parties involved ,including a dedicated team of incident response specialists at Exponential-e with a defined action plan ensured a seamless restoration process. Day-to-day operations resumed in just seven days, without paying the criminals' ransom demand.

Don't wait for a crisis to expose the cracks, fortify your defences today. Discover how expert response turned seven days of chaos into operational recovery.

  1163 Hits
London Head Office

100 Leman Street, London, E1 8EU

Manchester Office

1 St Peter's Square, Manchester, M2 3DE

Sales: 0845 470 4001
Support Portal Login
Service & Support: 0800 130 3365

 

*Calls to 0845 numbers will cost 7p p/m plus your phone company’s access charge. All inbound and outbound calls may be recorded for training or quality purposes.

*Calls to 0845 numbers will cost 7p p/m plus your phone company’s access charge.
All inbound and outbound calls may be recorded for training or quality purposes.

Click here to find out more about all of Exponential-e's accreditations.
© 2026 Exponential-e Ltd. Reg. No. 04499567, Reg. Address:100 Leman Street, London E1 8EU