Using Data Collected in Brand Protection Programs


Protecting consumers and safeguarding your company’s brand identity and reputation is becoming increasingly challenging in today’s environment with the continued growth of counterfeit and diverted products entering the market. At the same time, consumers are taking a more proactive role in choosing to buy brands they know and trust, while expecting increased transparency in brand promise.

As supply chains become increasingly complex, brand owners are facing intense pressure to respond to traceability and transparency challenges by utilizing digital systems for collecting valuable data and analyzing and acting upon the visible trends to help consumers authenticate products at points of sale, or alternatively connect and engage with the brand owner directly via the web or app. A digital solution helps with monitoring product movement in the supply chain, as well as direct consumer feedback, to confirm legitimate or potential suspect product in the marketplace.

67% of consumers say brand trust has a great deal of influence over their buying decisions.

In todays connected marketplace, most companies already collect and use various forms of data analytics to drive ongoing business decisions and strategic initiatives. In fact, business action and decision making has become reliant on the use of data analytics to manage many day-to-day operations. Despite this growing reliance on data, most organizations have yet to apply the practice successfully when it comes to brand security. This can partly be attributed to the lack of reliable data available since the early adoption of digital track and trace capabilities for risk-based products is only beginning. The key to effectively using data in brand protection programs is to understand what data is available now, what data is needed that is not available, how to efficiently collect and analyze the data and lastly, what action can be taken based on this analysis to effectively reduce counterfeiting and diversion while simultaneously engaging directly with the consumer.

Data Identification

An enormous amount of meaningful data can be gleaned in digital tracking for brand protection programs including information about a product’s provenance, its journey through the supply chain, the location/date/time of associated transactions including consumer scan events, validation of authentication or suspected illicit activity, and even direct consumer marketing and engagement.

However, how to apply the data once collected can be different for each company. At Authentix, we collect supply chain and consumer interaction data from multiple sources and aggregate it into our secure cloud-based platform on behalf of our brand owner clients. From there we are able to configure rules and analyze data trends to provide our clients with complete visibility into the suspect events or grouped metadata revealing weak links or threats in supply chain operations that often point to product compromise.

Data Collection

The following are key areas for collecting data using digital track and trace technology.

  • Data Carrier Technology – includes multiple formats of barcodes, NFC and RFID technologies for supply chain tracking, purchase and post purchase consumer engagement, inventory movement, and theft prevention. These technologies vary greatly in terms of volume capacity, costs, application requirements and security levels, so it is important to evaluate the best types of code formats and integration to existing manufacturing and packaging processes that best meet the minimum needs that would produce a valuable return.
  • Track & Trace – can be accomplished during sourcing, manufacturing, distribution, and pre- and post-sale stages. During the printing, manufacturing or packaging process for example, the scope of implementation choices widen and we can provide multiple routes to enable tracking of product origin information, manufacturing location(s), production lines designation and more. Additionally, as the product nears closer to the point of sale, we’ll begin seeing authentication activity and the collection of meaningful data such as distributor and consumer interaction and engagement, and sustainability and circularity.
  • Authentication – in most digital track and trace systems, analysis of authenticity is often achieved via a smartphone. This can be by company inspectors using a proprietary mobile application all the way to the consumer who can interact with the product without having to download a mobile app. Using the Authentix DigiTrax™ track and trace solution as an example of direct consumer engagement, the smartphone user simply scans a proprietary and encrypted QR code which directs them to a custom URL experience that can include, among other things, the unique information associated with the individual product scanned. These consumer product scan events including geo location, date, time, product and product provenance information are submitted to the secure cloud-based DigiTrax platform where the information can be used to understand purchasing trends, market directly to the user, or allow the user to authenticate the product using proprietary codes or PINs. If designed for the purpose, the results of the authentication can be sent back to the user in real time. This technology also enables inspectors in the field and other key stakeholders to identify the authenticity of a product instantly using a more sophisticated mobile application. In addition, consumers may also use the DigiTrax platform to verify authenticity of other products or for the purpose of continuing engagement with brand owner purely for marketing purposes.
  • Online Surveillance and Enforcement – are methods, systems, and services used to identify, investigate and takedown unauthorized e-commerce websites that deal in illicit trade of counterfeit, diverted, or stolen products. This is accomplished through automated online tools and services such as marketplace monitoring, WeChat micro tasking, and machine learning which can identify risk levels, hot zones and image matching to police and eliminate unauthorized sales of product and illegal use of trademarks on the internet.
Putting Data to Use

Reliable and timely data feedback enables brand owners to quickly answer complex supply chain events, pinpoint trouble spots, and take corrective and even preventative action to reduce the instances and threats of unauthorized product entering the marketplace. Data can be used to assess multiple business-centric operations to increase sales and market share, acquire and build trust with new customers, and reinforce brand assurance, to name a few. In addition, as consumers become more reliant on smartphones for collecting and communicating information, brand owners can capture consumer data to tailor experiences and increase engagement and loyalty.

Using Data to Drive Success

Authentix customers are using valuable brand protection data and analytics in multiple ways with great success. In one customer success story, an international wine exporter faced counterfeiting and diversion issues in China, resulting in loss of consumer trust and risk to its strong market share and long term brand loyalty it had spent years building. Authentix helped the client implement a multi-layered digital authentication solution with covert and overt on-product features that flags, collects and analyzes all inspector and consumer scanning activity including the capability of retail product authentication by the consumer. The result? Over 150 counterfeit retail locations were identified and remediated. Also, through direct consumer engagement, loyal brand purchasers became more confident in product authenticity and the client was able to maintain premium pricing for their superior and quality products.

In another example, an international brand customer incurred online marketplace counterfeiting in Asia, putting consumer health, safety and loyalty at risk as well as decreasing revenues. Authentix helped the client implement a multi-phased online brand protection monitoring solution and services to identify and investigate the online sale of spurious product and locate complicit bottling and closure manufacturers involved in the illicit trading. Website takedowns were initiated, resulting a 90% reduction in fake products in Indonesia, 1,500 online listing takedowns in Malaysia, and 13 raids and enforcement actions conducted in China.

Start Big or Small. Just Start.

It’s important to point out that you do not have to implement a full scale approach to digital authentication initially and it’s easy to begin collecting and leveraging data – even if it’s just one product or product line for a particular geography. Alternatively, digital automation for brand protection programs can be implemented in a sweeping fashion as an end-to-end solution from the start with a full technology suite. Most clients choose to implement in logical steps based on risk assessment, ease of implementation, and to the most critical geographic areas. The key is to get a secure digital mark on your product and start the data collection process. Ultimately, it is how much data, the association of the data elements for analysis, and the conclusions and action you take that determines how much your brand protection program can be enhanced by bringing in digital track and trace automation. The key is to start, analyze, adjust, expand and continue until the data flow and insights provided are resulting in the development and refinement of actions and policies to take command of the risks faced each day.

Learn more about Authentix brand protection solutions, HERE.

Authentix Expands into Online Brand Protection Services


From Identification, Surveillance, Investigations, and Website Takedowns: Authentix now Provides Full Service Online Brand Surveillance and Enforcement

To expand its capabilities in digital brand protection for brand owners, Authentix has recently acquired Strategic IP Information Pte Ltd (SIPI), a leading online brand and content rights protection service.

For over ten years, SIPI has offered state-of-the-art services for brands to track unauthorized channels for counterfeit products through its proprietary online tools and array of customized services including physical enforcement, investigations, sample purchases, and taking down pirated listings. Using a team of dedicated analysts and sophisticated platform technology, we can promptly detect infringement and counterfeiting activity for rapid action and consolidated, insightful reporting for the 200 brand customers now serviced.

In the last two decades, counterfeiting has quickly grown from city sidewalks to the internet marketplaces. While e-commerce has opened new doors for traditional and start-up brands, it has also provided illicit traders lucrative access to a global customer base.  Online counterfeit goods now total an estimated $590 billion globally and according to a recent study by the European Union Intellectual Property Office, 1 in 10 online buyers has been deceived into buying a counterfeit product.

Tokyo Olympics – Example of Recent Target

As online marketplaces continue to be exploited by illicit traders there is a growing amount of peddling with convincing bootleg and falsified versions of branded products. This illegal activity increases during major global events such as the recent Summer Olympics in Tokyo for example. While there was ample licensed merchandise sold through the official online store of the Olympics, there was also falsified and unlicensed merchandise selling through illegitimate, third-party websites.

As Authentix/SIPI closely followed the action in the Olympic games, they also investigated licensed branded merchandise sold online, where it was discovered that marketplaces, social media and multiple 3rd party websites were offering unlicensed and infringing products. Using t-shirt sales as an example, the product offered on certain websites we investigated all displayed the Olympic branding TOKYO 2021. However, despite being held belatedly this year because of the COVID pandemic, the Tokyo Olympics retained TOKYO 2020, precisely because merchandise with the 2020 branding had been manufactured prior to the delay. Therefore, any merchandise bearing 2021 in the labels was quickly identified through automated means and was presumed to be suspect. To date merchandise bearing Tokyo 2021 is readily available on major marketplaces such as Aliexpress, Wish, Dhgate, ebay and Amazon. Discrepancies in branding and use of marks such as the TOKYO 2020 logo were also found to be compromised during our investigation.

There are many technological advancements such as product clustering, geo location mapping and machine learning based algorithms that can be used to find products compromised in the various marketplaces, discover major networks of illicit traders, and find many other forms of IP infringement. Once infringements such as the examples used above for the Tokyo Olympics are identified, viable and rapid action including shutdowns can be taken against the perpetrators, holding them accountable for their actions and helping to further prevent unauthorized products from being placed on the market.

To learn how Authentix Online Brand Protection Services can quickly work for your company’s on-line monitoring and enforcement needs, visit our website.

Meeting The Biofuel Compliance Challenge


By: Jeff Conroy, Chief Technology Officer, Authentix

Authentix is pleased to be included in the June/July edition of Tank Storage Magazine, a leading industry publication delivering the latest news and developments to the bulk liquid storage and terminal sector.

In our feature article, Jeff Conroy, PhD, Chief Technology Officer for Authentix, discusses the challenges and possible solutions for the quality assurance and source integrity of renewable biofuels which are increasingly relied upon to meet mandates greenhouse gas (GHG) reductions.

However, the production of biofuels from non-sustainable sources or energy intensive processes can lead to reduced environmental benefits or even an overall increase in emissions, so the pedigree of otherwise chemically identical biofuels becomes very important.


The Future of Brand Protection


Part 6 of the ABC’s of Brand Protection series by Authentix focusing on the global scope of the counterfeiting epidemic and how to take action against it to protect your brand, your customers and your revenue.

The ubiquity of publicly available digital, manufacturing, and printing technology has enabled criminal enterprises to produce convincing but dangerously inferior counterfeit products.  Not only do these nefarious organizations damage the brand value of your legitimate products, they can create consumer mistrust, physically injure or even cause death. Those behind many counterfeit operations make millions in profit without regard to the investment you have made or the adverse effects on consumers.

To protect your company and your investment in high value products, brand owners must create a culture of risk assessment and leverage a security solution partner to monitor supply chains to detect, measure, act, and constantly refine the brand protection policy. This means not only developing the program and assigning responsibility to certain stakeholders in your organization but also selecting and working with a trusted security solution partner for risk assessment and deploying innovative technologies and overall program management.  An experienced solution provider will not push a single technology platform, but instead offer a suite of technologies that include a digital cloud platform for data collection and insights to help build trend analysis, track ongoing targeting, and leverage resources for a more effective outcome.  Creating this umbrella of protection that feeds digital insights that initiate action and remediation must be a part of the future for effective brand protection.

Artificial Intelligence and Machine Learning

While still in the early days of adoption, artificial intelligence (AI) is already being applied in some areas of brand protection. Using machine learning, for instance, computers can analyze and learn from large, complex datasets, recognizing patterns that reveal potential fraud or diversion. Packaging can be analyzed along with data compiled from sensors. Anomalies the human eye cannot see can be detected and exceptions can be flagged.

Data and Digital Platforms

It has been said that data is the oil in the engine of many business enterprises today. Despite this, only a few organizations effectively apply this to brand security. Over the next few years, this will change as many experienced security solution providers like Authentix, change the way data is collected and managed for the purpose of product and supply chain security.

Many companies have invested in supply chain and inventory management systems to collect data and optimize inventory management and manufacturing. However, the integration of brand security into this process is often overlooked.  Thus, many brand owners use bespoke physical security mechanisms such as holograms, license keys, and UV inks to manually detect problems in the post manufactured distribution channels. Moreover, as data collection technology improves and is more available to consumers via the ever-present smartphone, more brands may be able to actually integrate the reciprocal interaction with consumers via smartphones and products to begin the awesome scope of data collection towards the point of sale.  These days, more smartphones are capable of image and code collection at high resolution with native and downloaded applications for digital interaction with products and manufacturers.

Engaging with consumers via product interaction is not new. Certainly, many consumers have been scanning QR codes for years to gain more detailed product information, see other products in the lineup, and to take advantage of rewards and discounts. However, with many manufacturers, using this consumer interaction to authenticate legitimate from counterfeit or diverted products is tricky to say the least.  Therefore, using multiple layers of digital collection capabilities and correlating the data over time is the best approach. This may include a digital collection increment by inside inspectors who are querying for a graphic security feature using a proprietary mobile application.  This will immediately attest to UID level authentication and traceability or provenance. Alternatively, consumers may inquire directly via a QR or NFC basis. This would require no special mobile application but provide important geography, distribution, duplicate code, and transactional data that can help regarding distribution and transactional point of sale feedback, thereby securing the supply chain.


Right Data, Right Time

Having the right data at the right time will speed reaction times, enable faster diagnosis of issues, and deliver a more complete understanding of what specific corrective actions are needed and when. For instance, the DigiTrax™ digital platform is a cohesive data repository and dashboard interface that enables the collection, storage, and analysis of secure transactions to help companies make informed decisions on brand protection issues. DigiTrax™ is a secure, comprehensive, cloud-based, end-to-end platform designed to deliver a complete picture of your authentication and consumer interactive transactions and correlated results. It also is configurable to be customized to each client’s needs for detection, measurement, and targeting for unauthorized product placement and helps to form policy on corrective actions and investigations.

If the past is a prologue to the future, a tsunami of counterfeit goods continues to make its way into the global marketplace – from products such as luxury items, medicines, food, spirits, auto parts, and many more. The damage from illicit and fake products can cause nearly incalculable damages, including loss of human life, lack of consumer trust and the overall devaluation of your large brand investment.

So whether you choose to invest in the latest emerging single technology as a “one off” approach or you choose to select a fully integrated solution provider with a full technology suite – it is important to remember that ultimately, it is how you take action on the information retrieved from the security solution that ultimately determines how effective your product protection effort is. Risk will continue to grow as the arsenal of tools that criminals gain access to continues to expand. Stay ahead of the game and consult with a security solution provider who has the experience handling rapid deployment to help you migrate your organization to a digital platform as an ultimate component for brand enforcement strategy.

For more brand protection basics – why it is necessary, how it works, who is vulnerable, how to implement an effective program, what to look for in a technology partner, and which emerging technologies will make a difference in the future – download the eBook, The ABC’s of Brand Protection.

READ PART 1     |      READ PART 2    |    READ PART 3    |    READ PART 4     |     READ PART 5

9 Qualities to Look For in a Brand Protection Partner


Part 5 of the ABC’s of Brand Protection series by Authentix focusing on the global scope of the counterfeiting epidemic and how to take action against it to protect your brand, your customers and your revenue.

The current counterfeit landscape is a “not if, but when” environment. At some point, brand owners will experience an unauthorized product in their supply chain.  Given this inevitability, your product security strategy should be thorough, with a strong emphasis on implementation planning to enable detection of problems and action to mitigate and manage accordingly. One of the most effective deterrents to risk is teaming with a partner with the requisite skills, experience and talent to assist you in all facets of brand protection.

Qualified brand protection partners understand what you’re up against and can work with you to develop, implement, and manage a proactive strategy to help insulate your company against illicit trading of diverted or fake products. What should you look for in a partner? The following are key considerations when you are vetting an authentication solution provider:

  1. Your business is their business

Choose a company that understands your business and offers consultative services—not just a technology.  It’s critical that they have experience relating to your industry and are quick to understand the challenges you face.  Experienced solution partners ask the right questions to help you articulate your exact concerns, assess risk, and work with you to set realistic goals for your program.

  1. Thorough risk assessment plan

Determining the appropriate level of security required for a given product requires a thorough risk assessment strategy. The strategy provides insight into the risks in the market, the nature of product distribution, complexity of the supply chain and the goals for the brand. The appropriate security level depends on the exposure to counterfeiting and the value of the product to the brand owner. Determining the appropriate scope of protection, budget, and level of security necessary to mitigate the perceived risk is not a “one size fits all” approach and may differ from product lines and geographies.

  1. Customized solutions

Qualifying a security solution provider also means finding one with the ability to customize tools and implementation plans to fit the unique challenges of your industry and company. For instance, your partner should have expertise in the types of product packaging, printing, manufacturing, and existing supply chain attributes to know what existing substrates, inks, adhesives, varnishes, and enclosures used already would be the best vehicle to roll out a covert security feature quickly.  Ask them if they offer:

  • State-of-the-art covert and overt inks or marking systems
  • Multilayered security features
  • Monitoring and enforcement plans
  • Ability to financial support the inventory and other requirements
  • Implementation services, trial printing programs, evaluation of existing processes
  • Data capabilities – dashboards, cloud platforms
  1. Multilayered approach

Decades of experience have proven that there is not a simple “silver bullet” technology that can be applied in all situations for a perfect brand protection strategy. A multilayered approach in which overt, covert and forensic features are applied in various ways is often the most effective long-term solution against counterfeiting. How much experience does the security solution provider have in this area?

  1. Supply chain integration

More than likely, your current supply chain is complicated and lacks visibility at various points. An effective security solution provider should be able to integrate within that chain without causing disruption to the existing processes. In addition, the partner should be agnostic without any prejudice towards a given technology and be willing to use a suite of options to consider. The best partner will be able to objectively analyze the situation, identify and help you determine risk, and recommend multiple scenarios for your consideration.  Each situation is different – beware of single technology solutions offering only one type of choice to solve.

  1. Print trials and authentication support

An experienced security solution partner should be able to certify and ensure security mandates for your vendors. All manufacturing and handling of security materials should be completed in a secure facility under full chain-of-custody and auditing.  A security audit is often the best way to determine this. The brand owner should understand that appropriate physical security and auditing procedures are maintained for the benefit of all parties. It is important to only work with a partner with quality accreditation appropriate for the subject matter and technologies involved.

  1. Talent and reach

Your security solution partner should have technical and commercial teams to provide the appropriate level of expertise required to authoritatively advise on the features of their technology and implementation. In the case of a global brand, your partner should have a global footprint and reach. This includes delivery, logistics, servicing, technical support, customs handling, and regulatory knowledge to properly handle regional and country-based compliance issues.

  1. Proven implementation strategy

Some companies might be great at strategy and planning but drop the ball when it comes to implementing those plans. It’s important that a partner provides extensive documentation of their experience implementing programs, including a resume consisting of several multi-year customer relationships. In addition, any qualified provider should agree to become an integrated part of your team and extend that support to your third-party vendors.

  1. Committed partner

The right security solution partner for you should see you through the good times and the challenging ones, too. You deserve an ongoing relationship with a select team of people committed to help stay steps ahead of potential risks and actionable plans when those risks become realized.

For more brand protection basics – why it is necessary, how it works, who is vulnerable, how to implement an effective program, what to look for in a security solution partner, and which emerging technologies will make a difference in the future – download the eBook, The ABC’s of Brand Protection.

Download the eBook

READ PART 1     |      READ PART 2    |    READ PART 3    |    READ PART 4

Implementing an Effective Brand Protection Program


From Risk Identification to Full Implementation

Part 4 of The ABC’s of Brand Protection series by Authentix focusing on the global scope of the counterfeiting epidemic and how to act against it to protect your brand, your customers and your revenue.

In articles 1, 2 and 3 of this series, we’ve discussed the vast scope of the global counterfeiting problem, the tactics used by counterfeiters, and security features used on many products today to detect and mitigate these compromises. You are aware that this is a massive problem but how do you determine if your products are at risk? Understanding and assessing these risks is the first vital step to start mapping out your company’s action plan, resulting in an effective brand protection program.

Five Steps to Determine if Your Products are at Risk
  1. Identify the risk areas

First, develop a risk inventory for your product line. The level of risk might differ depending upon supply chain complexity, geography, price point, margins, and anticipated demand. Consider these questions to identify vulnerabilities:

  • Is my product line high volume with a low variable cost to produce?
  • Are these products sold at higher price points and gross margins?
  • Does my product line have an existing or potentially large market share?
  • Does my product line and/or packaging currently have covert or overt security features that are economic deterrents to prevent counterfeiting?
  • Do we sell through a complex supply chain and lose visibility to the point of sale?
  • Are any of these products sold online or manufactured in countries without stringent counterfeit enforcement laws?
  1. Assess risk

Determine the likelihood, impact, and overall threat of each risk factor. How susceptible is each product in your portfolio for attempted compromise? Use this information to create a portfolio of the higher risk products which includes:

  • Aggregated risks – score each product with weighted indicators to prioritize by risk potential
  • Map of the supply chain environment – what are the highest points of exposure and where do we have access?
  • Potential short- and long-term damage – Consider:
    • How could adverse events of illicit supply affect consumer trust in your brand?
    • What about liability from health issues caused by compromised product?
    • How much market share and revenue dilution could be happening?
  1. Develop a risk management strategy

Examine the results of your risk assessment to create an integrated strategy for each high-risk product that includes potential solutions to address all the foreseen threats:

  • Adopt a defined set of policies and procedures where your stakeholders are aligned
  • Look at available solutions to address specific product risks by threat area; for example – consumer safety vs. losses from diversion activity
  • Address what actionable steps can be taken at the physical points in the supply chain where threats are the greatest
  • Play out each risk scenario and escalation possibilities for contingent action upon the event including communication strategies
  • Prepare a budget to implement solutions based on your assessment
  1. Create an action plan

Responses to the most pressing threats can now be put into action by organizing management, information, and technology solution partner(s). Your action plan should include the following three categories:

  • Detection and Deterrence – solutions that provide detection of a non-authorized product in the supply chain, proactive awareness campaigns, investigatory procedures upon detection, vendor agreements that include security policies for handling or manufacturing higher risk products, and unannounced audits of downstream distribution partners.
  • Enforcement – the pre-determined action you plan to take upon the detection of an adverse event. This might depend on the event’s geography, supply chain level, and the resources you have allocated for enforcement.
  • Prosecution – plan the specific steps that will be taken to support investigative and forensic efforts upon the discovery and confirmation of responsible parties. In some countries, enforcing your supply agreements against offending distribution partners might be a better course of action than criminal prosecution.
  1. Monitor risk and continually re-evaluate your strategy

The last step in your strategy is a closed loop. Constant review of your data analytics offers an opportunity to better understand changing risks, increased or decreased vulnerabilities, and allows you to refine your actionable policy proactively. Today, data visualization coupled with a strong physical security element is even more critical in the fight against illicit product placement activity.  Analyze and act on these insights revealed in the reporting information– from new counterfeit hot spots to changing risk as time evolves.

The fact is no one solution or security measure will be the panacea to address all instances of product compromise across the global marketplace. However, as a brand owner you can assess these risks and select the right security solution partner(s) to help minimize the damage and keep you in charge rather than being in a reactionary stance. Also, it is important to select solution partners with lengthy experience in multiple industries who can offer a full suite of technology and service solutions that can both be rapidly implemented and scale to your business needs.

For more brand protection basics – why it is necessary, how it works, who is vulnerable, how to implement an effective program, what to look for in a technology partner, and which emerging technologies will make a difference in the future – download the eBook, The ABC’s of Brand Protection.

Download the eBook

READ PART 1     |      READ PART 2    |    READ PART 3

Stealthy Security: Anti-Counterfeiting Tactics


Part 3 of the ABC’s of Brand Protection series by Authentix focusing on the global scope of the counterfeiting epidemic and how to take action against it to protect your brand, your customers and your revenue.

We must face the facts. Counterfeiters make it their mission to knock off high-value products and they can be very good at it. With the right tools and illegal intent, a counterfeiter can create a product and packaging close enough to the original to easily fool consumers. And as technology becomes more accessible, it only gets easier for them to duplicate the basic one-dimensional protection measures a brand might implement. To fight back, you’ll need an arsenal of security features that can be woven seamlessly into the product and packaging design making it far less vulnerable to bad actors.

Each security feature serves a unique purpose. Overt or visible features allow the end consumer to verify authenticity of their purchased product. There are also covert or invisible markings enable trained inspectors to quickly authenticate genuine products in the supply chain, identify the source of diversion or determine other illicit activities.  When combined with careful design and production quality controls, these features raise the bar of complexity for counterfeiters and make the product a less attractive target.

Let’s break down six basic categories of anti-counterfeiting features. You might have implemented one as a security tactic, but still battling diversion in the marketplace. Rather than one and done, think of these tactics as a multidimensional security wall that helps identify authentic products from fakes.

  • Overt Security Features – These visible features can easily be detected and are often beautifully incorporated into the design of the product or packaging.
  • Covert or Semi-Covert Security Features – Covert and semi-covert features are invisible to the naked eye or disguised but can be found and measured with specialized handheld devices using proprietary optics and detection algorithms for rapid, secure field authentication.
  • Forensic Security Features – Forensic analysis involves laboratory testing of products via an embedded (non-native) component or molecule added to a substrate or solution to determine authenticity.
  • Serialization or Track and Trace Features – The application of individual unique codes at the point of manufacture (giving each product an identifiable attribute) and defined scanning locations where retrieval and association of the unit can be linked to the scanning transaction.
  • Digital solutions – The application of a unique code, number or symbol that results in a digital ID recorded in a database. Product attributes such as manufacturing date and time, expiration dates, lot numbers, pictures, and a host of other origin information can be added to the database record and associated with the product.
  • RFID – Radio Frequency Identification (RFID) is a small antenna and receiver system where a unique product-level ID is hidden or embedded in a small chip or printed label. The ability of these “electronic labels” to communicate with a centralized database system performs like other track and trace systems.

One Tactic Is Not Enough

An effective multilayered approach using overt, covert, and forensic security features is the most effective long-term solution to detect and deter counterfeiting. When incorporated into labels, closure seals, storage cartons, and packaging, each type of feature serves a unique purpose — from color-shifting ink that allow end-users to quickly identify a branded product as genuine to covert markings that enable an inspector to identify many factors involved with the source of authenticity.

For a deeper dive into the details of each type of security feature and other brand protection basics – why it is necessary, how it works, who is vulnerable, how to implement an effective program, what to look for in a technology partner, and which emerging technologies will make a difference in the future – download the eBook, The ABC’s of Brand Protection.

Download the eBook

READ PART 1     |      READ PART 2

The Case for Implementing National Fuel Integrity Programs


Reducing Illicit Fuel Fraud and Recovering Revenue for National Governments around the World

By Andrée Bourgeois, Senior Marketing Manager, Authentix

The impact on national governments from adulterated, diluted, and illegally trafficked fuel within a country’s borders results in lost tax revenue, poor quality product, environmental issues, and ultimately reduced community services and benefits for citizens. After 25 years of working with dozens of government ministries and leaders to implement fuel integrity programs across the globe, Authentix has helped many countries expand revenue collections by reducing or eliminating the proliferation of tax avoidance and illegal profiting through illicit fuel sales. Many countries that implement an Authentix fuel integrity program quickly see reductions of this illegal activity by more than 30 percent annually with corresponding increases in taxation revenue.

Our experience and years of data has proven that implementing fuel integrity programs has substantial benefits to many national governments and its citizens alike, providing very high returns on investments made. Many governments have published data showing the positive impact of securing and monitoring their fuel supply including Ghana, Serbia, Zambia, South Africa, and most recently, Kenya published an article further confirming the effectiveness of its fuel integrity program. As stated in the publication, Kenya’s Energy and Petroleum Regulatory Authority (EPRA), which is mandated under Section 92 of the 2019 Petroleum Act, is charged with monitoring petroleum products offered for sale in the local market and has continued to enhance its fuel integrity program with tremendous outcomes. As a result, Kenya continues to reduce fuel adulteration and is well on the way to achieving near 100 percent reduction of fuel fraud.


To mitigate adulteration challenges, many governments such as Kenya have taken action to implement national fuel integrity programs curbing fuel fraud, recovering missing tax collections, and restoring confidence in the national fuel supply. These programs are continuing to grow in number and scope as technology advancements result in more sophisticated enforcement techniques as well as building a history of data retention, correlation, and actionable insights over time. As programs remain implemented, product and supply chain data are collected over multiple points in the supply chain — providing organizations complete visibility of trends, reconciliation issues, and machine learning capabilities to help prevent, correct, enforce, and ensure ultimate compliance.

Most fuel integrity programs in place today involve chemically marking fuel at refineries and/or terminal distribution points to ensure that all fuel in the downstream supply chain can be authenticated all the way to retail points of sale. The fuel is typically marked by dosing with an inert, organic chemical marker at levels so low (parts per billion), the presence of the marker cannot be detected without proprietary and highly sophisticated devices. As fuel is sampled and tested in supply vehicles, retail stations, and even consumer vehicles, it is possible to determine if the fuel has been diluted with substandard or non-taxed products such as waste oil, off-road tax-free fuel, or via other illicit means. The detection technique enables accurate quantification using portable analyzers in the field or more enhanced, forensically defendable methods in a laboratory.

Authentix is the market leader throughout the world delivering these solutions and has become a trusted and effective partner for national governments to validate fuel quality and supply authenticity, and provide the tools to enforce and prosecute those whom are trafficking illicit fuel products. Authentix continues to build its large library of unique covert markers, resulting in the highest level of authentication security and effectiveness available today. Authentix has spent decades building its suite of custom markers which take many different forms and vary in application and use based upon the country’s unique set of requirements.

The return on investment of successfully deployed fuel integrity programs by Authentix is substantial, helping governments recover millions in lost tax revenue each year, while positively impacting the society through expanded services and infrastructure and resulting in a cleaner environment for all.

Learn more about Authentix National Fuel Integrity Programs.

Andrée Bourgeois is Senior Marketing Manager for Authentix. As the authority in authentication solutions, Authentix thrives in supply chain complexity. We provide advanced authentication solutions for governments, central banks and commercial companies, ensuring local economies grow, banknote security remains intact, and commercial products have robust market opportunities. Our partnership approach and proven sector expertise inspires proactive innovation, helping customers mitigate risks to promote revenue growth and gain competitive advantage.

The Dark Arts of Counterfeiting


Part 2 of the ABC’s of Brand Protection series by Authentix focusing on the global scope of the counterfeiting epidemic and how to take action against it to protect your brand, your customers and your revenue.

By Franco Diaz, Brand Protection Director, Authentix

Brands are working harder than ever to provide transparency into their business practices. The customer trust and loyalty that this creates is invaluable and the holy grail of marketing departments. A sure-fire way to destroy that trust is to be subjected to counterfeit controversy – product falsification, consumer harm, or news of legal action against a brand can prove toxic to any popular brand.

Organized criminal enterprises have developed sophisticated networks of willing players throughout the global supply chain in practically every industry to cause such destruction. Some of their tactics include:

  • Counterfeiting
  • Diversion
  • Tampering/Reuse
  • Adulteration

Today, companies expand their operating and delivery efficiencies at lower costs with high-quality manufacturing available around the world. However, that innovation comes at a cost by enabling undetectable counterfeit goods to make their way into the supply chain. Buzzworthy brands with growing demand, celebrity clout and premium price points are most-targeted. The resulting inferior quality and/or faulty parts lead to consumer dissatisfaction, recalls, and major safety concerns.

It’s not just back alley transactions and big city flea markets that you need to worry about anymore. The rise of digital marketplaces such as Amazon, eBay, and Etsy (plus countless others that emerge each year) enable and accelerate sales of knockoff goods not only to willing buyers, but unsuspecting ones as well. In fact, according to a 2018 study by the U.S. Government Accountability Office, about 40 percent of a sample of goods bought on popular eCommerce websites were fake. Data collected by the U.S. Customs and Border Patrol between 2000 and 2018 shows that seizures of counterfeit and pirated goods at U.S. borders, much of destined for e-commerce channels, has increased ten-fold.

It is forecast that by 2022, the negative impact of counterfeiting and piracy will drain US $4.2 trillion from the global economy and put 5.4 million legitimate jobs at risk. This impact cuts a wide swath across many industries and businesses including:

  • Pharmaceuticals and OTC Medicines: At least one million people die each year after consuming counterfeit medicines.

  • Tobacco: If the global illicit trade in tobacco was eliminated, governments would gain at least US $31 billion in additional taxation revenue. Curbing this illicit trade could save over 160,000 lives annually by 2030 and beyond.

  • Spirits and Premium Drinks: Counterfeit or illegal alcohol, recognized as “unrecorded” alcohol, is not monitored for quality or taxation. The WHO estimates that 25 percent of the alcohol consumed worldwide is unrecorded.

  • AgroChem: The WHO estimated that counterfeit and adulterated pesticides poison over three million people7 annually and result in over 200,000 deaths mainly in developing countries due to unregulated trade enforcement.

  • Health & Beauty: According to the FBI, counterfeit cosmetics have contained adulterants such as paint thinner, which irritates the eyes, nose, and throat in addition to being flammable and poisonous.


In this climate, many companies are thinking more broadly about how to implement coordinated anti-counterfeiting and anti-diversion strategies across their brands and throughout different regions of the world. Just as tamper-evident seals on bottles of pills and liquid formulations became more common after a tampering scare in the 1980s, attitudes toward anti-counterfeiting technologies are beginning to evolve.

For more brand protection basics – why it is necessary, how it works, who is vulnerable, how to implement an effective program, what to look for in a technology partner, and which emerging technologies will help protect your brands in the future – read the The ABC’s of Brand Protection.

Download the eBook

The ABCs of a Successful Brand Protection Program


Part 1 of the ABC’s of Brand Protection series by Authentix focusing on the global scope of the counterfeiting epidemic and how to take action against it to protect your brand, your customers and your revenue.

By Franco Diaz, Brand Protection Director, Authentix

The negative impact of counterfeiting and piracy is projected to drain U.S. $4.2 trillion from the global economy and put 5.4 million legitimate jobs at risk by 2022.1 Are your products protected? They need to be.

If anyone of us were to think about the purchases we made over the years, we’ve probably purchased a counterfeit good. It’s estimated that more than 80 percent2  of all global consumers have unwittingly purchased falsified products. This concept is proliferated by the ever-growing global supply chain and all its complexities that foster an environment lacking required ingredients, quality control, or government oversight. To get ahead of the counterfeiters, brand owners need a brand protection program to shield what matters most to your business – customers, brand, and revenue.

The gaps in the system are magnified even more during a pandemic. In the same week COVID-19 was declared a pandemic, a fake and dangerous rendition of a popular potential therapeutic drug with a street value of more than $14 million was seized by Interpol4 . It’s time to sound the alarm. No one industry is immune to such calculated nefarious acts. Brand owners from health and beauty, food and beverage, pharmaceutical, to apparel experience financial losses and more importantly, added risks to consumer health and safety.

The good news is that today’s anti-counterfeiting solutions to detect and deter fraud are growing more sophisticated, affordable, and accessible. The benefits of a strong brand protection program are three-fold:

  1. Protection of the brand owner’s livelihood – namely its reputation and investments into market-leading proprietary products.
  2. Consumer protection – no brand owner wants their name associated with health hazards or calamities resulting from brand compromise.
  3. Corporate citizenship – proactive companies that deploy product protection programs and are serious about a no-compromise climate are more responsible corporate citizens. This leadership and transparency can contribute exponentially to customer loyalty as it humanizes the brand.

CONSIDER THIS: The global economic value of counterfeiting and piracy could reach U.S. $2.3 trillion by 2022.3

Do you have a strategy in place, with policies and dedicated infrastructure to combat product fraud? Maybe you partner with a trusted third-party technology and solution provider. Maybe you don’t yet have a brand protection program in place. No matter your approach to the counterfeiting issues, knowledge is power.

Counterfeiting is real and impacts everyone in the supply chain. This article addresses a single layer of the importance of brand protection programs. We have more facts, figures and trends in our latest eBook, The ABC’s of Brand Protection. This eBook offers a crash course in how brand protection works, who is vulnerable, how to implement an effective program, what to look for in a technology partner, and which emerging technologies will make a difference.