By Susanne Hasselmann, Director, Axess Technologies Ltd.Technology can play an important part in a brand protection program, but technology introduced for its own sake is unlikely to be effective, and there are no silver bullets that are guaranteed to stop every criminal effort. An effective and comprehensive security strategy uses technology to support and enhance other elements of the strategy such as legal protection, enforcement policies and operational processes and procedures. The actual components of the strategy and the importance accorded to each one will depend on the organisations operations, culture, resources, organizational structure and product profile.There are many instances where security technology can play a vital role as part of an overall security strategy:
- In a crisis, authentication features can assist the public to identify whether a product is genuine (or at least suspect) and tracking systems can facilitate recalls from the market. In addition, the ability to pinpoint where the problem originates is invaluable.
- Both anti-tamper devices and anti-theft systems prevent unauthorized removal of product from packaging or retail stores.
- Authentication and tracking technologies can support enforcement efforts and make them more efficient and effective by enabling quick authentication in the field, by tracking 3rd party compliance or by providing evidence in court.
- Security technology provides an effective deterrence to would-be criminals. Security features increase the barrier to entry (cost and time) and often divert the fraudster to another and easier target that is less well protected. In addition they increase the criminals risk of detection which is probably the most powerful deterrence!
- How does the product move through the supply chain? Where are the risk points?
- What data/historical evidence is available in respect of criminal or unauthorized activities?
- How does technology need to support existing company activities?
- How and where is the product currently authenticated?
- How and where will the product be authenticated in the future?
- What are the product/packaging components and how are these manufactured?