Understanding Today’s Product Authentication Methods: Are You Truly Protected?
Product authentication must be an essential element in product and brand management programs for companies across all industries. Our guide to Next Generation Product Authentication can help c-level, risk, product and brand executives understand today’s newest methods and technologies.
Product counterfeiting has emerged as a significant economic issue, with the market value of pirated products equaling or exceeding the gross domestic product of some European countries. A 2016 report1 from OECD in cooperation with the EU Intellectual Property Office (EUIPO) found that in 2013 counterfeit products sold were worth $431bn, totaling 2.5 percent of global trade. That’s nearly equal to the gross domestic product of Switzerland and more than that of countries including Austria, Portugal and Ireland in 2013.2
As a result, brands today must have the potential impact of product piracy as a high priority in their risk management programs for economic as well as reputational reasons.
Our guide to Next Generation Product Authentication will help you understand and evaluate options for taking action to protect your company’s products and brands. In the recent past, product authentication approaches have required a tradeoff between security, ease of use and cost. Today that doesn’t have to be the case.
Download a copy of our guide for information on:
- Risks in the end-to-end distribution chain
- Covert and overt product authentication methods
- Common technologies such as QR codes, RFID tags and the newest random 3D holographic structures
- Importance of geolocation technologies in detecting counterfeiting attempts
- Key questions for evaluating product authentication options
1OECD & EUIPO, “Global trade in fake goods worth nearly half a trillion dollars a year,” 2016.
2OECD Data, “Gross Domestic Product,” https://data.oecd.org/gdp/gross-domestic-product-gdp.htm