Technology

Uncover business intelligence you can use to improve the end-to-end experience of your guests while driving sales and engagement.

We’ve created a technology plan for you with a customizable road map drawn to:

  • Enhance and personalize the guest experience
  • Deliver world-class solutions that support healthy living
  • Increase speed of service and convenience
  • State-of-the-art data analytics and reporting tools

Each plan also includes the latest innovations in data security‭, ‬giving you peace of mind that our solutions are always at work‭ ‬to safeguard your information‭. ‬

Enhance and Personalize the Guest Experience

From mobile devices to online ordering and payment‭, ‬through social media and new payment methods‭, ‬we stand at the forefront of industry efforts to understand and respond to the demands of the next-generation consumer experience‭. ‬Our guest-centric solutions‭ ‬for‭ ‬‭you‭ ‬include‭:‬

Adding social media to the marketing mix can increase awareness, motivate engagement and attract more traffic.

Fast Payment Options

Providing fresher‭, ‬healthier fare with payment options that are fast‭, ‬secure and untethered is fast-becoming the norm in workplace foodservice‭.‬

Mobile and Desktop Ordering

Mobile and Desktop Ordering To order from a mobile device or desktop browser‭, ‬guests simply click through the menu items to place an order‭, ‬select a pickup‭ ‬time and check out‭. ‬Mobile ordering also allows for bundling and combos‭, ‬just like ordering through the kiosks‭, ‬providing the same opportunity to upsell and increase check averages‭.‬

Multiple Payment Options

With the proliferation of smartphone payment apps‭, ‬wearables and mobile wallets‭, ‬we stand ready to accept cashless payments via‭ ‬Apple Pay‭, ‬Google Pay and other mobile payment providers‭.‬

Tablet POS Solutions

Our tablet-based POS technologies feature point-to-point encryption‭ (‬P2PE‭) ‬to ensure fast and secure payment processing‭. ‬While these lightweight portable devices can be used on the floor when lines begin to form‭, ‬they also extend the reach of the marketplace through food carts‭, ‬catering and pop-up dining events‭.‬

Enterprise Point of Sale Solutions

Our point-of-sale‭ (‬POS‭) ‬portfolio encompasses a range of business solutions‭, ‬from a single-lane‭, ‬basic application to multisite‭,‬‭ ‬multilane‭, ‬centrally managed systems‭.

Unattended Ordering

Kiosks can be used to facilitate orders for the whole marketplace or specific stations‭, ‬accepting payment with a credit/debit card‭, ‬your company badge/ID or smartphone‭. ‬The cashiers can be replaced with a concierge/ambassador or other guest service personnel‭, ‬or eliminated altogether‭.‬ The user interface is intuitive‭, ‬guiding the guest through the order process using imagery and simple instructions‭. ‬The order can be fully customized‭ (‬side salad instead of chips‭, ‬hold the pickles‭, ‬extra topping‭, ‬etc‭.). ‬Combos‭, ‬bundling and suggestive selling options help to ensure the order is complete and increase overall check averages‭.‬

Guests expect order accuracy, speed of service and convenience, and we have proven technologies to meet those expectations. We offer several options for ordering and checkout, all of which contribute to these goals:

Self-Service Kiosks

Our self-service technologies extend guest access to marketplace services and increase throughput while minimizing labor and operating costs‭. ‬We offer three service models that can increase guest satisfaction and streamline operations‭:‬

  • Preorder and pay‭ ‬‮–‬‭ ‬Guests use dynamic‭, ‬intuitive screens to order their meals via walk-up kiosks‭, ‬an online site or any mobile device‭. ‬Orders are‭ ‬then prepared and placed at a designated pickup location‭. ‬
  • Self-checkout‭ ‬‮–‬‭ ‬In low-volume or unmanned locations‭, ‬such as in grab-and-go or micromarket environments‭, ‬guests use kiosks to select‭, ‬scan and pay for their items‭.‬
  • After-hours service‭ ‬‮–‬‭ ‬Cashiers man terminals during busy times of the day‭, ‬but during nonpeak or extended service hours‭, ‬terminals convert to self-service mode‭.

Reveal Actionable Business Intelligence

Our proprietary business intelligence tools synthesize data from a range of sources and convert it into actionable information displayed in smart‭, ‬simple custom dashboards‭. ‬Using our tailored approach to data collection and presentation lets clients and operators clearly see what lies behind the numbers‭, ‬allowing for better resource management and higher profitability with increased guest satisfaction‭. ‬

Features and benefits

  • Data consolidation‭ ‬of multiple internal and external data sources into a single dashboard
  • Full customization‭ ‬with unlimited charts and infographics
  • Drill down‭ ‬to analyze trends

Advanced Data Analytics and Reporting

We compile and interpret data surrounding the spending habits and feedback of your guests to craft informed menus, designed to resonate with your guest base.

Our analytics arm‭, ‬E15‭, ‬offers a range of data analytics and reporting capabilities that will enable‭ ‬‭you ‬to uncover hidden patterns‭, ‬unknown correlations and other useful information that can be used to make better-informed business‭ ‬decisions‭.‬

Pricing

Our‭ ‬“Smart Pricing”‭ ‬capabilities ensure products are priced to maximize consumption and satisfaction‭.‬

Focusing on more than just historical data‭, ‬our statistical approach will look at KPIs and support the priorities and outcomes that matter most to your business‭. ‬We strive to identify and implement a price point that maximizes revenue while minimizing demand loss‭.

Data-Driven Menu Design

Using our guest feedback data‭, ‬we create menus that reflect regional preferences in each marketplace‭, ‬increasing guest satisfaction and participation‭.‬

Leading the Way in Data Security

We prioritize data protection for every client to avoid network intrusions that can inflict serious damage on a company’s brand and create a major breach of trust with its guests‭. ‬Our compliance with the strictest data security standards allows you‭ ‬to focus on your core business without worrying about compromised data security or other similar concerns‭.‬

Cybersecurity Investment Metrics

Information Security Program

A strong business reputation depends on a robust information risk management strategy‭. ‬We address data privacy and information security as fundamental components of doing business‭, ‬and are committed to protecting information assets‭, ‬personal data and client information‭. ‬Cybersecurity training is regularly provided to our associates who access information systems and sensitive data‭.‬

A formal information security program and Key IT Control Framework is in place‭. ‬Our information security tools‭, ‬policies and procedures follow the Information Security Forum‭ (‬ISF‭) ‬‮–‬‭ ‬an independent‭, ‬nonprofit association of leading organizations from around‭ ‬the world‭, ‬which investigates‭, ‬clarifies and resolves key issues in cyber‭, ‬information security and risk management‭.

The ISF Standard of Good Practice‭ (‬SoGP‭) ‬is mapped to the International Organization for Standardization‭ (‬ISO‭), ‬National Institute of Standards and Technology‭ (‬NIST‭), ‬Payment Card Industry‭ (‬PCI‭) ‬and Control Objectives for Information and Related Technologies‭ (‬CoBIT‭).‬

Our accounting and General IT Controls‭ (‬GITC‭) ‬are continuously evaluated by several assurance functions including independent auditors‭, ‬KPMG‭ (‬a multinational professional services network‭, ‬and one of the Big Four accounting organizations‭), ‬and our own team‭ ‬of internal auditors‭. ‬Compass Group businesses are governed by two manuals‭: ‬a global group accounting policies and procedures manual and a group internal controls manual‭. ‬All applicable managers must complete a control self-assessment that requires timely‭ ‬remediation for deficiencies and they must sign certificates of assurance twice a year to indicate adequate internal controls are operating properly‭. ‬These rigorous internal policies and procedures‭, ‬coupled with the annual independent audit by KPMG‭, ‬provide the highest level of integrity of our internal control environment‭.‬

Compass Group performs annual penetration testing of both its corporate and in-unit networks and systems‭. ‬Other security technology deployed includes data loss prevention‭ (‬DLP‭) ‬software‭, ‬malware and antivirus protection‭, ‬automated security patching with regular updates‭, ‬industry-standard encryption and authentication methodology‭, ‬and vulnerability management software‭. ‬All company servers‭, ‬laptops and desktops have advanced malware protection‭ (‬AMP‭) ‬with device encryption‭, ‬and each company email account has a‭ ‬mandatory multifactor authentication‭ (‬MFA‭) ‬to mitigate malicious attachments or links that attempt to phish credentials‭.‬

Further‭, ‬Compass Group employs a security information and event management‭ (‬SIEM‭) ‬solution to monitor‭, ‬manage and protect all devices‭, ‬servers‭, ‬networks and security systems used to store‭, ‬transmit or process information‭ ‬‮–‬‭ ‬including routers‭, ‬firewalls‭, ‬point-of-sale‭ (‬POS‭) ‬terminals and kiosks‭. ‬

Our SIEM reviews any data that could affect security and looks for suspicious activities and patterns that may signal security issues‭. ‬Alerts are escalated to our Cybersecurity team‭, ‬which works 24/7‭ ‬to monitor potential attacks‭, ‬minimizing risk and safeguarding business‭. ‬We also ensure clients are protected by our unified threat management‭ (‬UTM‭) ‬solutions‭. ‬This includes next-generation firewall and intrusion detection/prevention systems‭ (‬IDS/IPS‭). ‬

Our UTM solutions are centrally linked to our SIEM and continuously monitor even trusted applications for malicious behavior‭, ‬providing visibility and control to protect against sophisticated‭, ‬targeted and persistent threats‭.‬

Compass Group is among the earliest adopters of information security programs in our industry‭, ‬establishing protocols‭, ‬business‭ ‬continuity plans and disaster recovery capabilities by 2001‭. ‬At the start of 2006‭, ‬we were invited to become a participating member of the PCI Standards Council‭. ‬We were also the first in our industry to offer mobile point-of-sale‭ (‬POS‭) ‬solutions with point-to-point encryption‭ (‬P2PE‭) ‬and end-to-end encryption‭ (‬E2EE‭), ‬ensuring guest data is protected from the point of swipe through‭ ‬transmission to the payment processor‭, ‬and all payment solutions provided by Compass Group have P2PE/E2EE as a minimum standard‭.‬

Because of the nature of our clients’‭ ‬businesses and their respective industries‭, ‬we also observe and adhere to any relevant regulations and legislation‭. ‬Client verticals include financial‭, ‬manufacturing‭, ‬medical‭, ‬legal‭, ‬government and military‭. ‬Such markets require a high degree of security‭,‬‭ ‬auditing and control compliance‭. ‬All payment applications used to process credit or debit card transactions are referenced on the List of Validated Payment Applications‭, ‬which is published by the PCI Standards Council as certified payment applications‭.‬

To ensure even greater business continuity‭, ‬Compass Group is currently migrating all services and applications to its strategic‭ ‬cloud partners‭. ‬The disaster recovery capability will better serve our guests and provide significant Recovery Time Objectives‭ (‬RTO‭) ‬and Recovery Point Objective‭ (‬RPO‭) ‬improvements‭. ‬As part of this transition‭, ‬we are amending documents‭, ‬plans and procedures to align with new recovery processes‭. ‬

A test of recovery for critical systems and applications takes place annually‭. ‬In addition‭, ‬should normal‭, ‬automatic business processes be interrupted‭, ‬field sites are capable of using processes to complete day-to-day activities until the systems can be recovered‭; ‬data in the field can be stored and queued while waiting for the systems to be brought back up and the data transfer completed‭.‬

Incident Response

Compass Group has developed an internal policy and process that provides for a coordinated‭, ‬effective and cohesive approach to privacy and information security incidents‭ ‬‮–‬‭ ‬ranging from unauthorized system intrusions to the mishandling of data in such a way‭ ‬that the privacy‭, ‬integrity or availability of confidential information is at risk‭.‬

The Cybersecurity Department coordinates the investigation and ensures the appropriate departments are involved in researching and resolving any breach‭, ‬which includes clients‭, ‬management‭, ‬HR‭, ‬Treasury‭, ‬Field Systems‭, ‬Legal‭, ‬Communications‭, ‬etc‭. ‬

To assist us with incident investigation‭, ‬a 24-hour Rapid Response Retainer has been established with a leading security investigation company‭, ‬who can perform extensive forensic investigations and analysis related to incidents‭, ‬when needed‭.‬

Supporting Technologies

Compass Digital

Home to the digital experts at Compass Group North America‭, ‬Compass Digital ‬drives extraordinary experiences at the intersection of hospitality and technology‭. 

Digital Hospitality

Compass Digital’s work is organized into three distinct areas to build an end-to-end ecosystem that drives exceptional hospitality experiences for all guests and operators‭:‬

Digital‭

Deliver and scale within the business‭. ‬Compass Digital drives digital transformation through scaling solutions with a proven impact‭.

Labs

Conceive and build proprietary products‭. Compass Digital develops and scales emerging solutions through internal co-creation and an agile‭ ‬approach to innovating a suite of digital products‭. ‬

Ventures‭

Compass Digital incubates and scales innovative emerging solutions through external partnerships that shape the future of food hospitality‭. ‬

Digital Products

The Compass Digital suite of digital products touches every aspect of the Compass Group ecosystem‭, ‬from innovative emerging solutions to products focused on the front‭- ‬and back-of-house and beyond‭.‬

Digital Distance Ordering – Mobile, Online Ordering, Kiosk

This inclusive solution empowers guests to order from anywhere and‭ ‬on their schedule‭, ‬minimizing contact end-to-end‭, ‬with designated pickup areas reducing marketplace traffic‭. ‬Guests get the same extraordinary chef-driven culinary experience they expect when ordering in person through safe digital channels‭. ‬

Delivery Enhancements – Robotics, Food lockers, Delivery options through Mobile

Multiple delivery options mean catering to diverse individual needs‭. ‬With designated pickup areas outside of dining spaces‭, ‬food‭-‬safe climate-controlled food lockers and robot or human-powered delivery available across large campuses‭, ‬guests can keep their‭ ‬distance in a way that suits them best‭.‬

Frictionless Mobile & Kiosk Checkout – Frictionless Retail (Mobile & Kiosk)

Check-in‭. ‬Shop‭. ‬Carry out‭. ‬This refreshing new shopping experience powered by AI and computer vision allows for a seamless and contact-free checkout‭, ‬removing lines and waiting‭.‬

B&I Food Service Reimagined

Compass Digital brings new operational models to create contactless and frictionless digital experiences‭. 

Ghost Kitchens

‭ ‬Ghost kitchens leverage mobile platforms to expand past the physical food services space‭. ‬

  • Ghost brands
  • Expanding offerings
  • Efficient production
  • Waste reduction

Scan & Go Market

Scan‭ ‬&‭ ‬Go turns personal mobile devices into a self-checkout POS in the guest’s hand‭.‬

  • Operational expansion
  • Remote markets
  • Increased user base
  • Add-on revenue opportunities‭ ‬

Chef-Driven Menus

Chef-driven menus pair enticing culinary offerings‭, ‬from guests’‭ ‬favorites chefs‭, ‬with the convenience and flexibility of a digital menu‭.‬

  • Day-part activation
  • Drive check average
  • Increased user-base
  • Leverage chef reputation‭ ‬

JWO Technology (Just Walk Out)

JWO technology provides guests a completely frictionless mobile experience at micro-markets‭. ‬

  • No interaction necessary
  • Simple mobile check-in‭ ‬&‭ ‬check-out
  • Flexibility in product
  • Placements and rotations

With a suite of digital products empowering operators, enhancing the guest experience, and identifying new business opportunities, Compass Digital leads with digital transformation and innovation.

Programs and Apps

This content is proprietary and confidential. Terms & Conditions.