Author: Lara Trail

Authentix to Sponsor International Petroleum Week 2021 with Focus on Move to Low Carbon Future

     |     

ADDISON, Texas, February 10, 2021 – Authentix®, the authority in authentication and information services, announced it will be sponsoring International Petroleum (IP) Week February 23-25, 2021, hosted by the Energy Institute. The event, held virtually this year, remains the preeminent international event for building collaboration between the oil and gas industry, government, and society.

Virtual IP Week 2021 will focus on the urgency and demand for the industry to move to a lower carbon future over the next decade, with executives and leaders across the globe collaborating to help define the industry’s role and actions towards this critical endeavor.

Jeff Conroy, PhD, Chief Technology Officer for Authentix, will be presenting February 24th on the topic of “Innovative Solutions for Quality Assurance and Source Integrity of Renewable Biofuels”. With expectations to reduce reliance on crude oil derived hydrocarbons and move to cleaner, renewable, lower carbon alternatives, oil companies are looking at ‘second generation’ or ‘advanced biofuels’ to fill that need.

Already in Europe there is a mandate for the use of these biofuels derived from waste (as outlined in RED and REDII) and allowing for double counting of these in meeting the targets required. This adoption of a wider range of biofuels obtained from a larger variety of sources has increased the complexity in the supply chain, which in turn increases the need for greater oversight and control by both oil companies and governments. In Conroy’s presentation, IP Week delegates will learn how the new QualiTrax™ rapid fuel quality testing solution, a cutting-edge digital field-based fuel quality system using machine learning, artificial intelligence, and real-time access to data can help verify the proper sources and supply integrity for new biofuels.

As part of its sponsorship, Authentix will also have a digital exhibit booth for delegates to explore and chat with an executive to learn more about the QualiTrax fuel quality solution and other fuel integrity programs.

To register for IP Week or for more information, visit the event website at www.ipweek.co.uk.

About Authentix
As the authority in authentication solutions, Authentix thrives in supply chain complexity. Authentix provides advanced authentication solutions for governments, central banks and commercial companies, ensuring local economies grow, banknote security remains intact and commercial products have robust market opportunities. The Authentix partnership approach and proven sector expertise inspires proactive innovation, helping customers mitigate risks to promote revenue growth and gain competitive advantage. Headquartered in Addison, Texas USA, Authentix, Inc. has offices in North America, Europe, Middle East, and Africa serving clients worldwide. Authentix® is a registered trademark of Authentix, Inc. For more information, visit www.authentix.com.

About The Energy Institute
The Energy Institute is the not-for-profit chartered professional membership body bringing together expertise to tackle urgent global challenges. Responding to the climate emergency while meeting the energy needs of the world’s growing population calls for energy to be better understood, managed and valued. This ambition is at the heart of our social purpose. We are a global, independent network of professionals spanning the world of energy, convening and facilitating debate, championing evidence and sharing fresh ideas, giving voice to issues of concern and where necessary challenging the industry we work with. For more information, visit https://www.energyinst.org.

Authentix Announces Acquisition of Traceless® Authentication Group

     |     

ADDISON, Texas, September 30, 2020 — Authentix, the authority in authentication and information services, announced today that it has acquired the Traceless Authentication Group from Bibliotheca, Inc. a library systems solutions company serving over 30,000 libraries worldwide. MHT Partners, L.P. acted as financial advisor to Authentix in this transaction.

Rochester, New York – based Traceless is an industry leader in anticounterfeiting and diversion control to global clientele including customers in the pharmaceuticals, spirits, and apparel industries. This acquisition includes the company’s complete portfolio of patented covert marking solutions as well as its own enterprise cloud-based digital track and trace software solution. Product lines acquired include Traceless Ultra™, Traceless Pro™, and Traceless Anti-Diversion™ covert marking systems that can be integrated seamlessly into existing product production using virtually any available commercial printing method including continuous inkjet and is certified for use in Domino® inkjet printers. Additionally, the company brings to the deal its own portfolio of custom readers and vision inspection systems. Traceless Brand Protection Cloud™, a patented track and trace cloud-based solution includes encrypted QR code generation along with available digitized labels for smartphone interaction and authentication by consumers, without the need to download a phone app.

“Authentix has been a dominant leader in the brand protection market for over 20 years serving some of the world’s largest brand owners, and this strategic acquisition expands our security technology offerings available to our growing list of global clients along with the addition of Traceless customers added in this transaction” stated Kevin McKenna, CEO of Authentix, adding “Traceless brings an extensive capability in the worldwide digital tracking of products and consumer-level product marketing, both of which integrate well with our growth strategy.”

About Authentix

As the authority in authentication solutions, Authentix helps customers thrive in supply chain complexity. Authentix provides advanced authentication solutions for governments, central banks and commercial products, ensuring local economies grow, banknote security remains intact, and commercial products have robust market opportunities. The Authentix partnership approach and proven sector expertise inspires proactive innovation, helping customers mitigate risks to promote revenue growth and gain competitive advantage.  Headquartered in Addison, Texas USA, Authentix, Inc. has offices in the US, UK, Saudi Arabia, and Africa serving clients worldwide. For more information, visit https://www.authentix.com. Authentix® is a registered trademark of Authentix, Inc.

About Bibliotheca

Bibliotheca® is dedicated to the development of solutions that help libraries connect with users in unique ways and provide engaging experiences, allowing them to continually evolve their library services for the changing needs of their communities. With over 30,000 libraries as part of its family, there are more than 10,000 self-service units, 6,000 security systems, and 900 Automated Material Handling systems in place. Bibliotheca’s Open+ solution allows libraries to extend their available hours while also maintaining occupancy at safe levels. In addition, its cloudLibrary eReader provides access to over 1.5 million eBook and eAudiobook titles in over 100 languages for more than 5 million library patrons worldwide. For more information, visit https://www.bibliotheca.com. Bibliotheca® is a registered trademark of Bibliotheca, Inc.

The Future of Brand Protection

     |     

Part 6 of the ABC’s of Brand Protection series by Authentix focusing on the global scope of the counterfeiting epidemic and how to take action against it to protect your brand, your customers and your revenue.

The ubiquity of publicly available digital, manufacturing, and printing technology has enabled criminal enterprises to produce convincing but dangerously inferior counterfeit products.  Not only do these nefarious organizations damage the brand value of your legitimate products, they can create consumer mistrust, physically injure or even cause death. Those behind many counterfeit operations make millions in profit without regard to the investment you have made or the adverse effects on consumers.

To protect your company and your investment in high value products, brand owners must create a culture of risk assessment and leverage a security solution partner to monitor supply chains to detect, measure, act, and constantly refine the brand protection policy. This means not only developing the program and assigning responsibility to certain stakeholders in your organization but also selecting and working with a trusted security solution partner for risk assessment and deploying innovative technologies and overall program management.  An experienced solution provider will not push a single technology platform, but instead offer a suite of technologies that include a digital cloud platform for data collection and insights to help build trend analysis, track ongoing targeting, and leverage resources for a more effective outcome.  Creating this umbrella of protection that feeds digital insights that initiate action and remediation must be a part of the future for effective brand protection.

Artificial Intelligence and Machine Learning

While still in the early days of adoption, artificial intelligence (AI) is already being applied in some areas of brand protection. Using machine learning, for instance, computers can analyze and learn from large, complex datasets, recognizing patterns that reveal potential fraud or diversion. Packaging can be analyzed along with data compiled from sensors. Anomalies the human eye cannot see can be detected and exceptions can be flagged.

Data and Digital Platforms

It has been said that data is the oil in the engine of many business enterprises today. Despite this, only a few organizations effectively apply this to brand security. Over the next few years, this will change as many experienced security solution providers like Authentix, change the way data is collected and managed for the purpose of product and supply chain security.

Many companies have invested in supply chain and inventory management systems to collect data and optimize inventory management and manufacturing. However, the integration of brand security into this process is often overlooked.  Thus, many brand owners use bespoke physical security mechanisms such as holograms, license keys, and UV inks to manually detect problems in the post manufactured distribution channels. Moreover, as data collection technology improves and is more available to consumers via the ever-present smartphone, more brands may be able to actually integrate the reciprocal interaction with consumers via smartphones and products to begin the awesome scope of data collection towards the point of sale.  These days, more smartphones are capable of image and code collection at high resolution with native and downloaded applications for digital interaction with products and manufacturers.

Engaging with consumers via product interaction is not new. Certainly, many consumers have been scanning QR codes for years to gain more detailed product information, see other products in the lineup, and to take advantage of rewards and discounts. However, with many manufacturers, using this consumer interaction to authenticate legitimate from counterfeit or diverted products is tricky to say the least.  Therefore, using multiple layers of digital collection capabilities and correlating the data over time is the best approach. This may include a digital collection increment by inside inspectors who are querying for a graphic security feature using a proprietary mobile application.  This will immediately attest to UID level authentication and traceability or provenance. Alternatively, consumers may inquire directly via a QR or NFC basis. This would require no special mobile application but provide important geography, distribution, duplicate code, and transactional data that can help regarding distribution and transactional point of sale feedback, thereby securing the supply chain.

 

Right Data, Right Time

Having the right data at the right time will speed reaction times, enable faster diagnosis of issues, and deliver a more complete understanding of what specific corrective actions are needed and when. For instance, the DigiTrax™ digital platform is a cohesive data repository and dashboard interface that enables the collection, storage, and analysis of secure transactions to help companies make informed decisions on brand protection issues. DigiTrax™ is a secure, comprehensive, cloud-based, end-to-end platform designed to deliver a complete picture of your authentication and consumer interactive transactions and correlated results. It also is configurable to be customized to each client’s needs for detection, measurement, and targeting for unauthorized product placement and helps to form policy on corrective actions and investigations.

If the past is a prologue to the future, a tsunami of counterfeit goods continues to make its way into the global marketplace – from products such as luxury items, medicines, food, spirits, auto parts, and many more. The damage from illicit and fake products can cause nearly incalculable damages, including loss of human life, lack of consumer trust and the overall devaluation of your large brand investment.

So whether you choose to invest in the latest emerging single technology as a “one off” approach or you choose to select a fully integrated solution provider with a full technology suite – it is important to remember that ultimately, it is how you take action on the information retrieved from the security solution that ultimately determines how effective your product protection effort is. Risk will continue to grow as the arsenal of tools that criminals gain access to continues to expand. Stay ahead of the game and consult with a security solution provider who has the experience handling rapid deployment to help you migrate your organization to a digital platform as an ultimate component for brand enforcement strategy.

For more brand protection basics – why it is necessary, how it works, who is vulnerable, how to implement an effective program, what to look for in a technology partner, and which emerging technologies will make a difference in the future – download the eBook, The ABC’s of Brand Protection.

READ PART 1     |      READ PART 2    |    READ PART 3    |    READ PART 4     |     READ PART 5

9 Qualities to Look For in a Brand Protection Partner

     |     

Part 5 of the ABC’s of Brand Protection series by Authentix focusing on the global scope of the counterfeiting epidemic and how to take action against it to protect your brand, your customers and your revenue.

The current counterfeit landscape is a “not if, but when” environment. At some point, brand owners will experience an unauthorized product in their supply chain.  Given this inevitability, your product security strategy should be thorough, with a strong emphasis on implementation planning to enable detection of problems and action to mitigate and manage accordingly. One of the most effective deterrents to risk is teaming with a partner with the requisite skills, experience and talent to assist you in all facets of brand protection.

Qualified brand protection partners understand what you’re up against and can work with you to develop, implement, and manage a proactive strategy to help insulate your company against illicit trading of diverted or fake products. What should you look for in a partner? The following are key considerations when you are vetting an authentication solution provider:

  1. Your business is their business

Choose a company that understands your business and offers consultative services—not just a technology.  It’s critical that they have experience relating to your industry and are quick to understand the challenges you face.  Experienced solution partners ask the right questions to help you articulate your exact concerns, assess risk, and work with you to set realistic goals for your program.

  1. Thorough risk assessment plan

Determining the appropriate level of security required for a given product requires a thorough risk assessment strategy. The strategy provides insight into the risks in the market, the nature of product distribution, complexity of the supply chain and the goals for the brand. The appropriate security level depends on the exposure to counterfeiting and the value of the product to the brand owner. Determining the appropriate scope of protection, budget, and level of security necessary to mitigate the perceived risk is not a “one size fits all” approach and may differ from product lines and geographies.

  1. Customized solutions

Qualifying a security solution provider also means finding one with the ability to customize tools and implementation plans to fit the unique challenges of your industry and company. For instance, your partner should have expertise in the types of product packaging, printing, manufacturing, and existing supply chain attributes to know what existing substrates, inks, adhesives, varnishes, and enclosures used already would be the best vehicle to roll out a covert security feature quickly.  Ask them if they offer:

  • State-of-the-art covert and overt inks or marking systems
  • Multilayered security features
  • Monitoring and enforcement plans
  • Ability to financial support the inventory and other requirements
  • Implementation services, trial printing programs, evaluation of existing processes
  • Data capabilities – dashboards, cloud platforms
  1. Multilayered approach

Decades of experience have proven that there is not a simple “silver bullet” technology that can be applied in all situations for a perfect brand protection strategy. A multilayered approach in which overt, covert and forensic features are applied in various ways is often the most effective long-term solution against counterfeiting. How much experience does the security solution provider have in this area?

  1. Supply chain integration

More than likely, your current supply chain is complicated and lacks visibility at various points. An effective security solution provider should be able to integrate within that chain without causing disruption to the existing processes. In addition, the partner should be agnostic without any prejudice towards a given technology and be willing to use a suite of options to consider. The best partner will be able to objectively analyze the situation, identify and help you determine risk, and recommend multiple scenarios for your consideration.  Each situation is different – beware of single technology solutions offering only one type of choice to solve.

  1. Print trials and authentication support

An experienced security solution partner should be able to certify and ensure security mandates for your vendors. All manufacturing and handling of security materials should be completed in a secure facility under full chain-of-custody and auditing.  A security audit is often the best way to determine this. The brand owner should understand that appropriate physical security and auditing procedures are maintained for the benefit of all parties. It is important to only work with a partner with quality accreditation appropriate for the subject matter and technologies involved.

  1. Talent and reach

Your security solution partner should have technical and commercial teams to provide the appropriate level of expertise required to authoritatively advise on the features of their technology and implementation. In the case of a global brand, your partner should have a global footprint and reach. This includes delivery, logistics, servicing, technical support, customs handling, and regulatory knowledge to properly handle regional and country-based compliance issues.

  1. Proven implementation strategy

Some companies might be great at strategy and planning but drop the ball when it comes to implementing those plans. It’s important that a partner provides extensive documentation of their experience implementing programs, including a resume consisting of several multi-year customer relationships. In addition, any qualified provider should agree to become an integrated part of your team and extend that support to your third-party vendors.

  1. Committed partner

The right security solution partner for you should see you through the good times and the challenging ones, too. You deserve an ongoing relationship with a select team of people committed to help stay steps ahead of potential risks and actionable plans when those risks become realized.

For more brand protection basics – why it is necessary, how it works, who is vulnerable, how to implement an effective program, what to look for in a security solution partner, and which emerging technologies will make a difference in the future – download the eBook, The ABC’s of Brand Protection.

Download the eBook

READ PART 1     |      READ PART 2    |    READ PART 3    |    READ PART 4

Implementing an Effective Brand Protection Program

     |     

From Risk Identification to Full Implementation

Part 4 of The ABC’s of Brand Protection series by Authentix focusing on the global scope of the counterfeiting epidemic and how to act against it to protect your brand, your customers and your revenue.

In articles 1, 2 and 3 of this series, we’ve discussed the vast scope of the global counterfeiting problem, the tactics used by counterfeiters, and security features used on many products today to detect and mitigate these compromises. You are aware that this is a massive problem but how do you determine if your products are at risk? Understanding and assessing these risks is the first vital step to start mapping out your company’s action plan, resulting in an effective brand protection program.

Five Steps to Determine if Your Products are at Risk
  1. Identify the risk areas

First, develop a risk inventory for your product line. The level of risk might differ depending upon supply chain complexity, geography, price point, margins, and anticipated demand. Consider these questions to identify vulnerabilities:

  • Is my product line high volume with a low variable cost to produce?
  • Are these products sold at higher price points and gross margins?
  • Does my product line have an existing or potentially large market share?
  • Does my product line and/or packaging currently have covert or overt security features that are economic deterrents to prevent counterfeiting?
  • Do we sell through a complex supply chain and lose visibility to the point of sale?
  • Are any of these products sold online or manufactured in countries without stringent counterfeit enforcement laws?
  1. Assess risk

Determine the likelihood, impact, and overall threat of each risk factor. How susceptible is each product in your portfolio for attempted compromise? Use this information to create a portfolio of the higher risk products which includes:

  • Aggregated risks – score each product with weighted indicators to prioritize by risk potential
  • Map of the supply chain environment – what are the highest points of exposure and where do we have access?
  • Potential short- and long-term damage – Consider:
    • How could adverse events of illicit supply affect consumer trust in your brand?
    • What about liability from health issues caused by compromised product?
    • How much market share and revenue dilution could be happening?
  1. Develop a risk management strategy

Examine the results of your risk assessment to create an integrated strategy for each high-risk product that includes potential solutions to address all the foreseen threats:

  • Adopt a defined set of policies and procedures where your stakeholders are aligned
  • Look at available solutions to address specific product risks by threat area; for example – consumer safety vs. losses from diversion activity
  • Address what actionable steps can be taken at the physical points in the supply chain where threats are the greatest
  • Play out each risk scenario and escalation possibilities for contingent action upon the event including communication strategies
  • Prepare a budget to implement solutions based on your assessment
  1. Create an action plan

Responses to the most pressing threats can now be put into action by organizing management, information, and technology solution partner(s). Your action plan should include the following three categories:

  • Detection and Deterrence – solutions that provide detection of a non-authorized product in the supply chain, proactive awareness campaigns, investigatory procedures upon detection, vendor agreements that include security policies for handling or manufacturing higher risk products, and unannounced audits of downstream distribution partners.
  • Enforcement – the pre-determined action you plan to take upon the detection of an adverse event. This might depend on the event’s geography, supply chain level, and the resources you have allocated for enforcement.
  • Prosecution – plan the specific steps that will be taken to support investigative and forensic efforts upon the discovery and confirmation of responsible parties. In some countries, enforcing your supply agreements against offending distribution partners might be a better course of action than criminal prosecution.
  1. Monitor risk and continually re-evaluate your strategy

The last step in your strategy is a closed loop. Constant review of your data analytics offers an opportunity to better understand changing risks, increased or decreased vulnerabilities, and allows you to refine your actionable policy proactively. Today, data visualization coupled with a strong physical security element is even more critical in the fight against illicit product placement activity.  Analyze and act on these insights revealed in the reporting information– from new counterfeit hot spots to changing risk as time evolves.

The fact is no one solution or security measure will be the panacea to address all instances of product compromise across the global marketplace. However, as a brand owner you can assess these risks and select the right security solution partner(s) to help minimize the damage and keep you in charge rather than being in a reactionary stance. Also, it is important to select solution partners with lengthy experience in multiple industries who can offer a full suite of technology and service solutions that can both be rapidly implemented and scale to your business needs.

For more brand protection basics – why it is necessary, how it works, who is vulnerable, how to implement an effective program, what to look for in a technology partner, and which emerging technologies will make a difference in the future – download the eBook, The ABC’s of Brand Protection.

Download the eBook

READ PART 1     |      READ PART 2    |    READ PART 3

Authentix Welcomes David B. Brown as Chief Financial Officer

     |     

ADDISON, Texas, July 23, 2020 – Authentix, the authority in authentication solutions, welcomes David B. Brown to the executive team in the role of Chief Financial Officer. Mr. Brown will be responsible for integrating business and finance strategy to further expand the global presence of Authentix and drive growth into key markets. In his role, Mr. Brown brings over thirty years of experience as he oversees global finance, treasury, accounting and taxation activities.

With extensive financial leadership experience in both publicly traded and privately owned multi-national companies, his skill set will be valuable to the Authentix executive team during this period where the focus is on rapid growth.

“David brings a strong track record of driving results-oriented strategies and accelerating growth within global businesses and we are proud to welcome him to the Authentix team.” states Kevin McKenna, CEO of Authentix. “With David’s appointment, we have a strong management team in place to continue the execution of our strategy to drive revenue growth and continued market expansion.”

A seasoned finance professional, Mr. Brown got his start in public accounting with PricewaterhouseCoopers then went on to serve in executive roles with LSG Sky Chefs, Brink’s Company, Dresser, Tellabs and Trillium Flow Technologies most recently. He is also an independent director and audit committee chair for Perma-Pipe International Holdings, Inc.

Mr. Brown holds a Bachelor of Business Administration degree in Accounting from The University of Texas, Austin and is a licensed Certified Public Accountant in the State of Texas

About Authentix

As the authority in authentication solutions, Authentix thrives in supply chain complexity. Authentix provides advanced authentication solutions for governments, central banks and commercial companies, ensuring local economies grow, banknote security remains intact and commercial products have robust market opportunities. The Authentix partnership approach and proven sector expertise inspires proactive innovation, helping customers mitigate risks to promote revenue growth and gain competitive advantage. Headquartered in Addison, Texas USA, Authentix, Inc. has offices in North America, Europe, Middle East, and Africa serving clients worldwide. Authentix® is a registered trademark of Authentix, Inc. For more information, visit https://www.authentix.com.

 

###

Tim Driscoll to Present Industry Webinar for Quarantining Illicit Tobacco During COVID-19

     |     

ADDISON, Texas, July 20, 2020 – Authentix®, the authority in authentication and information services, announced that its Senior Vice President and General Manager of Tax Stamp & Currency, Tim Driscoll, Ph.D., will be presenting an industry webinar titled Quarantining Illicit Tobacco – Tobacco Control through the Lens of COVID-19  on July 23, 2020, at 9:00 AM Central Standard Time.

The webinar, sponsored by the International Tax Stamp Association (ITSA), will focus on the crucial role of tax stamp and traceability programs to boost government finances strained by COVID-19.

Driscoll, a Board Member for ITSA, has played a critical role in expanding the Authentix tax stamp division with the launch of Authentix’s tax stamp program for the Ghana Revenue Authority in March of 2018. Today, Authentix supplies and manages multiple excise tax recovery programs for national governments across the globe and produces in excess of 10 billion stamps annually. Driscoll was also instrumental in the acquisition of UK-based Security Print Solutions (SPS), one of the premier Intergraf certified security printers in the business.  This acquisition expanded Authentix’s print capacity and global delivery capability in addition to opening up new markets in high security documents.

With the effects of COVID-19 felt around the world, government revenues are decreasing while deficits and debt levels continue to increase at alarming rates. Meanwhile illicit trade is reported to have accelerated as counterfeiters and organized crime look to capitalize on the havoc the pandemic has caused.

Tax stamp and traceability programs are a proven solution to protect government revenues and secure supply chains, while also helping to protect public health, brands, and consumer confidence.

Authentix collaborates with government agencies worldwide to identify products avoiding taxation and the primary source of the illicit activity. Our consultative approach and over 25 years of authentication and tax recovery experience enables us to understand and address tax collection challenges amid complex supply chains and uncertain times.

In the webinar, Driscoll shares the elements of a modern tax stamp program and why now may be the right time to introduce or expand current schemes. The webinar is open to the public and registrants can sign up here.

About Authentix

As the authority in authentication solutions, Authentix thrives in supply chain complexity. Authentix provides advanced authentication solutions for governments, central banks and commercial companies, ensuring local economies grow, banknote security remains intact and commercial products have robust market opportunities. The Authentix partnership approach and proven sector expertise inspires proactive innovation, helping customers mitigate risks to promote revenue growth and gain competitive advantage. Headquartered in Addison, Texas USA, Authentix, Inc. has offices in North America, Europe, Middle East, and Africa serving clients worldwide. Authentix® is a registered trademark of Authentix, Inc. For more information, visit www.authentix.com.

About ITSA

The International Tax Stamp Association is a not-for-profit organization working to ensure a better understanding of the benefits of tax stamps and tax stamp technology.  ITSA promotes high professional standards through education, research and advocacy, and develops as well as promotes best practices. ITSA is led by seven board members and consists of 23 high-profile companies and stakeholders who recognize the critical role of tax stamps. For more information, visit www.tax-stamps.org.

Authentix Partners with Government Clients on Corporate Social Responsibility Initiatives in Africa

     |     

ADDISON, Texas, July 15, 2020 – Authentix®, the authority in authentication solutions, shares positive results of continued client partnerships for Corporate Social Responsibility (CSR) initiatives. Through a long standing commitment to expand resources beyond standard business operations, Authentix has taken lead from its government partners to help deliver a lasting, positive impact on the lives of thousands in many communities in Africa.

According to Authentix’s CEO, Kevin McKenna, “As we continue to focus on CSR initiatives, our approach centers around listening, learning, and planning in close collaboration with leaders of important government agencies such as the Ministry of Energy, the Ministry of Finance, Energy Regulation Board, and countless others who seek to improve environmental and socioeconomic conditions for their citizens.” Below highlights some of the collaborative programs completed.

Zambia: Clean Water & Sanitation in Petauke
The Zambian government recognized the lack of access to clean and safe water for many in drought stricken rural regions. Through a partnership with the Zambia Energy Regulation Board (ERB), Authentix supported the rehabilitation of 30 water boreholes and the drilling of six new boreholes and pumping equipment in the Petauke district within the Eastern Province of Zambia. Improved outcomes for local citizens included:

  • Over 30,000 people with access to clean and safe drinking water.
  • Reduced the number of non-communicable diseases in the district.
  • Increased school class attendance as children now have nearby access to water sources.
  • Improved sanitation facilities at two schools serving thousands of students.

In this ongoing partnership with the ERB, Authentix is continuing the spirit of CSR in 2020 by working with a consortium of partners rehabilitating more than 200 additional water boreholes in the Petauke district. This project will help vastly improve access to clean and safe drinking water for over 80,000 people in the area.

Ghana: New Technology Laboratory in Kongo Senior Secondary School
The Ghana National Petroleum Authority (NPA) expressed a need to help the Kongo Senior Secondary School, the only high school in the area with over 2,200 students. Authentix collaborated with the NPA to provide the secondary school with 21 new, fully networked computers with Internet access and also enabled the installation of a reference library.

In collaboration with government clients on multiple continents, Authentix has helped make a significant social impact by addressing local needs in health, education, and the environment and will continue to focus available resources for these important CSR projects.

About Authentix
As the authority in authentication solutions, Authentix thrives in supply chain complexity. Authentix provides advanced authentication solutions for governments, central banks and commercial companies, ensuring local economies grow, banknote security remains intact and commercial products have robust market opportunities. The Authentix partnership approach and proven sector expertise inspires proactive innovation, helping customers mitigate risks to promote revenue growth and gain competitive advantage. Headquartered in Addison, Texas USA, Authentix, Inc. has offices in North America, Europe, Middle East, and Africa serving clients worldwide. Authentix® is a registered trademark of Authentix, Inc. For more information, visit https://www.authentix.com.

###

Stealthy Security: Anti-Counterfeiting Tactics

     |     

Part 3 of the ABC’s of Brand Protection series by Authentix focusing on the global scope of the counterfeiting epidemic and how to take action against it to protect your brand, your customers and your revenue.

We must face the facts. Counterfeiters make it their mission to knock off high-value products and they can be very good at it. With the right tools and illegal intent, a counterfeiter can create a product and packaging close enough to the original to easily fool consumers. And as technology becomes more accessible, it only gets easier for them to duplicate the basic one-dimensional protection measures a brand might implement. To fight back, you’ll need an arsenal of security features that can be woven seamlessly into the product and packaging design making it far less vulnerable to bad actors.

Each security feature serves a unique purpose. Overt or visible features allow the end consumer to verify authenticity of their purchased product. There are also covert or invisible markings enable trained inspectors to quickly authenticate genuine products in the supply chain, identify the source of diversion or determine other illicit activities.  When combined with careful design and production quality controls, these features raise the bar of complexity for counterfeiters and make the product a less attractive target.

Let’s break down six basic categories of anti-counterfeiting features. You might have implemented one as a security tactic, but still battling diversion in the marketplace. Rather than one and done, think of these tactics as a multidimensional security wall that helps identify authentic products from fakes.

  • Overt Security Features – These visible features can easily be detected and are often beautifully incorporated into the design of the product or packaging.
  • Covert or Semi-Covert Security Features – Covert and semi-covert features are invisible to the naked eye or disguised but can be found and measured with specialized handheld devices using proprietary optics and detection algorithms for rapid, secure field authentication.
  • Forensic Security Features – Forensic analysis involves laboratory testing of products via an embedded (non-native) component or molecule added to a substrate or solution to determine authenticity.
  • Serialization or Track and Trace Features – The application of individual unique codes at the point of manufacture (giving each product an identifiable attribute) and defined scanning locations where retrieval and association of the unit can be linked to the scanning transaction.
  • Digital solutions – The application of a unique code, number or symbol that results in a digital ID recorded in a database. Product attributes such as manufacturing date and time, expiration dates, lot numbers, pictures, and a host of other origin information can be added to the database record and associated with the product.
  • RFID – Radio Frequency Identification (RFID) is a small antenna and receiver system where a unique product-level ID is hidden or embedded in a small chip or printed label. The ability of these “electronic labels” to communicate with a centralized database system performs like other track and trace systems.

One Tactic Is Not Enough

An effective multilayered approach using overt, covert, and forensic security features is the most effective long-term solution to detect and deter counterfeiting. When incorporated into labels, closure seals, storage cartons, and packaging, each type of feature serves a unique purpose — from color-shifting ink that allow end-users to quickly identify a branded product as genuine to covert markings that enable an inspector to identify many factors involved with the source of authenticity.

For a deeper dive into the details of each type of security feature and other brand protection basics – why it is necessary, how it works, who is vulnerable, how to implement an effective program, what to look for in a technology partner, and which emerging technologies will make a difference in the future – download the eBook, The ABC’s of Brand Protection.

Download the eBook

READ PART 1     |      READ PART 2

Back To Top