Automation of competitor price collection from retail (offline) stores

520%

Increase in monitoring volume

3 times

faster pricing

Find out how cenix.pro can help you monitoring of prices and goods from online and offline stores

How important is accurate competitor monitoring? Is it worth hiring third-party companies to conduct offline monitoring or using in-house staff? Why is real-time data more effective for pricing? How do neural networks and cloud technologies automate important business processes within a company?

About the customer:

Russian chain of "At Home" stores, 150+ stores, 50+ cities of presence.

Goals:

1. Automate the process of competitor monitoring.
2. Control the entire team of auditors online.
3. Accelerate the monitoring process, to react quickly to changes in competitors' prices and dynamic pricing.
4. Reduce monitoring errors.
5. Organize the structure of the competitive environment.
6. Introduce targeted pricing for each store in the customer's network.
7. Organize a cloud storage for analyzing and comparing competitors' prices.

What was it?

1. Monitoring was done manually using Excel files or google spreadsheets.
2. The manager sent the auditors lists of items to be monitored with a comment about the competitor.
3. A team of auditors who were outsourced to an intermediary company. The auditors manually searched for the right product in the file and printed the price, then took a photo to confirm the price.
4. Within 1-2 days after receiving the task, the results were sent in the form of Excel reports by e-mail to the manager of the trade network.
5. Processing the reports and making decisions to change their price offers took managers another 1 day.

What problems this process led to:

1. The manager spent a lot of time sending out lists and comments on the job.
2. A large number of errors in the comparison of products due to the manual search for the right product.
3. A large number of errors in pricing due to manual data entry and unscrupulousness of some hired auditors.
4. Insufficient frequency and volume of monitoring due to the labor-intensive process of price collection, the high cost of hiring and expanding the staff of auditors.
5. Lack of proper and fast analysis of the results of monitoring.

All this led to the fact that the client received not actual data on the prices of competitors, while the client received the final report and processed it, for these 2 days the prices of competitors have already changed for some products.

Auditor errors also greatly affected the quality of the data.

There was no complete picture of the market because only one store of each competitor was monitored. The process of processing the reports took extra time. The result is weak pricing and non-competitive pricing policy, which led to a decrease in sales and loss of profits of the company.

Parameters before implementation:

- Frequency: 1 time per week

- Speed: 2 hours SKU Base List

- Monitoring volume: 15000 - 20000 per month

- Monitoring coverage: 24 competitors

Implementation of the Cenix.pro cloud service:

A personal cloud storage with the functions of monitoring management and analytics of the received data was launched. The client's assortment was loaded into it and automatic integration with the accounting system of the client's company was set up. The manager in the personal office assigns tasks to auditors, which are automatically allocated to:

- Competitors.
- Addresses of competitors' stores.
- Regions and auditors.
- List or categories of products.
- Dates and days of assignments.

In real time, the client controls all the auditors' work by seeing who, where and when has performed or is performing the monitoring. The location verification feature allows you to be 100% sure that the monitoring will be performed at the right address of the competitor.

Price monitoring with the Cenix mobile app:

The process of monitoring prices in a competitor's retail store is done using a mobile app. The auditor goes to the assigned store, scans the barcode of the product and takes a picture of its price tag.

The product is matched by barcode with 100% accuracy, then the neural network recognizes the price from the price tag photo. All this happens instantly and in real time - the photo, price, stock or analogue sign is saved to the product card.

It is important that the auditor sees the result of each recognition and can always correct it in case of errors, which can happen to any neural network due to external factors such as - poor quality of the price tag printing, blurred photo, when the information is not visible even to humans.

Price-checker monitoring function allowed to monitor some of the competitors standing in one place. Obtain data directly from the competitor's database at a speed of ~ 300 sku in 20 minutes.

The accuracy of price tag recognition by the neural network was 97.5%. Taking into account the manual correction function, the accuracy of monitoring was brought up to 99%.

Monitoring results and reports:

Once the auditor has finished monitoring, he exits the competitor's store and simply clicks the Finish Job button in the app. All collected data - prices, photos, stock signs, etc. are sent over the Internet to the cloud storage and are instantly generated into ready-made reports and analytics - it takes no more than 2-3 minutes from the moment the task is completed.

The client's category managers and analysts are notified when the monitoring is ready, open cloud reports with freshly collected competitor prices, and promptly make a decision on changing their shelf prices. This process allows the client to conduct truly dynamic pricing based on up-to-date data obtained immediately after monitoring.

Indicators after implementation:

- Frequency: 5 times more often

- Speed: 3 times faster

- Monitoring volume: +520%

- Speed of decision-making: twice as fast

After obtaining these results, the client began to expand their audit staff by assigning monitoring tasks to their store managers and eventually completely eliminated the services of third-party outsourcing companies that had previously provided them with auditors. This created a competitive environment chart for each of the client's stores and allowed the company to introduce targeted pricing based on the closest competitors around each of the client's outlets. The environment management and targeting reports are also maintained inside the personal Cenix cabinet.

Make your data analysis unstoppable

Callback

By submitting I approve cenix.pro the Personal Data processing policy

Policy on personal data processing

This privacy policy (hereinafter referred to as the Policy) is based on the provisions of the Federal Law of 27.07.2006 No. 127-FZ "On Personal Data". This Policy is an appendix to the license agreement for the granting of non-exclusive license (property) rights for the use of software complex for Computer software package with consulting services, and is an integral part part and parcel thereof. By accepting the terms and conditions of this license agreement, the Licensee (user) automatically accepts the terms of this Policy and agrees to the use of its logo, trade name name and other means of individualization, as long as Licensee is a legal entity. This Policy applies to all information which Cenix LTD (hereinafter - the LTD) can get about the user when using the software. The use of the Software means the user's unconditional the user's consent to this Policy and the terms of conditions of processing of his personal information; in case of The user must refrain from using the application in case he/she disagrees with those terms.
1. Personal information of the users which is cenix.pro" application receives and processes
1.1 Within the scope of this Policy, personal information user's personal information are understood as:
1.1.1 Personal information that the user Provides personal information about himself/herself when Registration (account creation) or in the in the process of using the application, including personal user data. Information provided by the user at his discretion.
1.1.2. Data that is automatically transmitted and used by "Cenix" Ltd. in the process of their
1.1.2.
1.1.2 The data that is automatically transmitted and used by "Cenix" Ltd, patronymic of the Licensee's employees via encrypted communication channel https.
1.2 This Policy applies only to the software developed by LLC "Cenix". Cenix" LLC does not control and is not responsible responsibility for the information of third parties, to which the user can access through the links available in the application. On such sites, the user the user may be collecting or requesting other personal The user's personal information and other actions may be collected or requested on such sites.
1.3.
1.3 "Cenix" LLC in general does not check the reliability of personal information provided by users, and does not Control their competence.
2. The purposes of collecting and processing of personal information users.
2.1 The Software collects and stores only those personal data that
2.1 The Product collects and stores only the personal information, which is needed to provide the services included in the Product. 2.2 Personal information of the Users of the Application LLC. Cenix" LLC can use it for the following purposes:
2.2.1. Identification of the party under the agreements;
2.2.2 Communication with the user, including sending
2.2.2 Communication with the user, including notices, requests and information service use, service rendering, as well as processing of requests and applications from the user;
2.2.3. Improvement of the application quality and usability
2.2.3. Improvement of the quality of the application, development of new services;
2.2.4. Statistical and other research on
2.2.4. Statistical research on the basis of anonymized data.
3. Terms of processing of personal information user.
3.1 In respect of personal information of the User is kept confidential, except in cases of voluntary User provides information about himself for general access to the general public.
3.2. LLC "Cenix" has the right to transfer personal information
3.2 "Cenix" LLC has the right to transfer the user's personal information to third parties in the following cases:
3.2.1. the User has expressed his consent to such
3.2.1. The User expressed their consent to such actions. In this case, by unconditionally agreeing with terms of this Policy, the user confirms and warrants that personal The user acknowledges and warrants that personal data transmitted by LLC "Cenix", received The user with the consent of interested persons.
3.2.2 The transfer is necessary within the use of the user of a particular service or rendering a service to the user.
3.2.3. in other cases provided in the Act on Personal Data. Personal Data".
4. 4. Protection of personal data. Centix" LLC takes necessary and sufficient organizational and technical measures for protection of personal user's personal information from unauthorized or accidental access, destruction, change, blocking, copying, distribution, as well as from other illegal actions with it of the third parties. LTD. Cenix " assures the confidentiality and protection of personal personal data.
5. Change of personal information by the user.
5.1. The User is entitled to change or amend personal information which is passed by LLC "Centix".
5.2. The User may change or amend the personal information which has been transferred to the LLC "Cenix".
5.2. The User is also entitled to delete the personal information provided by him/her in the
5.2 The User is also entitled to delete the personal information provided by him within the account by requesting deletion of his account by e-mail to support@cenix.pro.
6. Confidentiality of the parties to the license agreement.
6.1. The parties agree to consider all information provided to each other within the framework of this license agreement of this License Agreement or in connection with its designated purpose, as well as information about this license agreement and the offers made offers made, as confidential information (within the limits, permitted under the applicable laws of the Russian Federation - a commercial secret. confidential information (to the extent permitted under Russian law - a trade secret), unless it follows from the provisions of the contract and appendices to it otherwise.
6.2 Each party receiving confidential information ("Receiving Party") of the other party ("Disclosing Party") shall not has the right to communicate Confidential Information to anyone without express permission of the Disclosing Party and shall take all reasonable measures to protect the Confidential Information, including, but not limited to, the measures it takes to protect its own confidential information/commercial secrets.
6.3 The Receiving Party agrees to use the disclosed information solely for the purpose of implementing this license agreement.
6.4 The receiving party undertakes to limit the list of persons, access to confidential information exclusively its employees directly involved in the execution license agreement.
6.5 The obligations set forth in this section 6.5 The obligations set out in this section of the license agreement shall not apply to the following information: - information that is or becomes public knowledge through no Information which is or becomes generally known through no fault of the party, which received this information from the other party of the license agreement, which must be confirmed by evidence; - information, which was obtained by the parties from third parties without information which was received by the parties from third parties without any obligation to maintain confidentiality; - information the disclosure of which is required by information the disclosure of which is required by applicable law. Such information may Such information may be provided only to the authorities having the relevant Such information may be provided only to the authorities with relevant powers, in accordance with the procedure stipulated by applicable law. 6.6.
6.6 It is not a disclosure of 6.6 Providing confidential information to third parties in the presence of 6.6 Providing confidential information to third parties in the presence of written consent of the other party to its disclosure is not considered as disclosure.
6.7 For each violation of the obligation of non-disclosure confidential information provided for by this agreement Agreement, the Receiving Party undertakes to compensate all and any damages resulting from such breach.
6.8. The obligations set forth in this agreement, concerning the protection of confidential information, are valid for three (3) years from the date of transfer of confidential information.
6.9. The Licensor has the right to aggregate, systematize and analyze the information received from the Partner, after impersonalization of this information, including confidential information, in order to In order to create information and analytical reports of various kinds and databases. databases. The owner of the exclusive rights to such information-analytical reports and databases as objects of intellectual property is the Licensor.
7. Amendment of the Privacy Policy. Applicable Law.
7.1. "Cenix" LLC. has the right to make changes in the present Privacy Policy. Privacy Policy. When making changes in the current When making changes the date of the last update is specified. The new edition The new edition of the Policy comes into force from the moment of its publication on the informational Unless otherwise stipulated by the new version of the Policy, the new version of the Policy shall be effective from the moment of its publication on the information resource of LLC "Cenix". of the Policy.
7.2. This Policy and the relations between the user and Cenix LLC. Cenix LLC, arising in connection with the application of the Policy Privacy Policy is subject to the law of the Russian Federation. Federation.

Great!

We will contact you within one hour and send you all the information youneed, but in the meantime, check out hellpful videos we recorded especially for you