SlideShare a Scribd company logo
1 of 17
Anti-Counterfeiting Technology Summary
GPAS Brand Protection
2
Is there a Silver Bullet Solution?
Criteria
1. Difficult (Impossible) to copy/replicate.
2. Can be applied at product/packaging level in high volume production.
3. Easily authenticatable by Consumers.
Many solutions meet two of the requirements but there is no single technology based
“Silver Bullet” that meets all of the above requirements.
3
Anti-counterfeit Solution Analysis
1. Difficult/Impossible to
copy/replicate
Overt, covert, tamper proof &
forensic based solutions that mark
packaging/products in a unique
manner that requires counterfeiters
to create same or similar markings
which overtly may look the same.
RISK
Risk is that they look similar enough to the
consumer and therefore are judged “official
or real”.
4
Anti-counterfeit Solution Analysis
2. Can be applied at
product/packaging level in
high volume production
“Specialized solutions” that claim
they cannot be replicated or copied
RISK
The technology that produces markings on
the product/packaging cannot be applied
during high volume print production, or
interferes with those processes rendering
them useless.
5
Anti-counterfeit Solution Analysis
3. Can be easily authenticated/
verified by consumers
The value of technology solutions
need to be accessed based on HOW
they can be verified and WHO can
verify them.
RISK
• If the solution is based on overt verification by
consumers, i.e. holograms then the strength of the
protection must be questionable.
• If the solution requires specialized equipment to verify
it then the solution is only of value to field service
agents/secret shoppers.
• If the solution is intended to be verifiable by
consumers using their smartphones, it needs to
address the significant technology challenge of
deployment across all mass market smartphone
devices.
• If the solution requires consumers to download a
specialized App on their smartphone for verification,
the significant drop in participation rate (which drives
data analytics and value) must be considered.
6
Best Practice
The best practice adopted by the most mature leading brands is to
adopt a multi-layered approach to anti-counterfeiting and illicit
activity management based on prevention, monitoring & detection
and finally enforcement.
PREVENTION
MONITORING &
DETECTION
ILLICIT ACTIVITY
BUSINESS
INTELLIGENCE
ENFORCEMENT
7
Multi-layered Approach PREVENTION
MONITORING &
DETECTION
ILLICIT ACTIVITY
BUSINESS
INTELLIGENCE
ENFORCEMENT
APPLICATION APPROACH DESCRIPTION
1 Product Anti-Counterfeit
Technology Adoption
PREVENTION Overt & Covert Technologies applied to products/packaging
2 Product Verification &
Authentication
PREVENTION & DETECTION Unique tagging of Products that support Consumer Authentication - “Make Your Customers your
Brand Agents”
3 Supply Chain Security
Management
MONITORING & DETECTION Traceability of product throughout supply chain, with Real time BI illicit activity monitoring
4 Market Inspection MONITORING & DETECTION Agents testing products in supply chain, customs and retail
5 Illicit Activity Analytics ILLICIT ACTIVITY BUSINESS
INTELLIGENCE
Capture Supply Chain and Consumer Engagement data and put them to work to unlock insights
into types & location & extent of illicit activities in your supply chain and marketplace
6 Online Brand Monitoring MONITORING, DETECTION &
ENFORCEMENT
Online search for Fake & Counterfeit selling of Product, IP infringement and Enforcement
7 Brand Protection Enforcement ENFORCEMENT Agents focused on shutting down illicit players and recovering products working in conjunction
with customs, trading standards & law agencies, using illicit activity BI in 1-6
8
Customers = Brand Agents
PREVENTION
Easy for all stakeholders to participate and understand the product in their hands
which in turn creates preventive data analytics in GPAS
2012
2017
QR Code Market
Adoption & Growth
Increased Stakeholder & Consumer Engagement
Connected/Smart Packaging
Sustainable Packaging
Today QR Codes are now Ubiquitous
GPAS is a Technology Enabler
9
Open format Unique ID Serialization
PREVENTION
Utilization of unique ID coding with an open format where no app is required to be
downloaded
78% of people abandon the process
(higher with younger 18 – 24
demographic).
* GPAS doesn’t require an App to be
downloaded to read the code
What happens when you ask stakeholders to download an app to read a specific security feature?
10
Authentication Insights
A series of Activity Monitoring Dashboards with the ability to drill-down and investigate
DETECTION
An understanding of where
counterfeit activity is occurring
geographically with the ability to drill
down
An understanding of how much illicit
activity is occurring with the ability to
drill down and understand specific
products being compromised and
where
An understanding of who is potentially
involved in illicit activity by the
number and frequency of product
scans
11
Real-time Activity Dashboard
A view of global scan activity of all products, all scans in real-time
MONITORING
Heat-map geolocation
reporting with ability to
drill down to specific
interactions
Chart detailing # of
Valid, Invalid, and Fake
code activity with ability
to drill down
Table detailing every
GPAS code scanned with
ability to filter, and
search based on all
relevant criteria
Default time period
equals current week;
User can customize
report date period
Users can export all
activity for the reported
time period
12
Business Intelligence – Illicit Activity Alert
Real-time geolocation awareness of illicit activity by specific products
INVALID SCAN RESULT
BUSINESS INTELLIGENCE
& ENFORCEMENT
Monitor activity based on a specific business rule criteria. In this case disabling smart phone result
messaging on all applicable codes presenting an invalid response to consumers when scanned
VALID SCAN RESULT
13
Business Intelligence – Diversion Alert
Real-time alerts based on unlimited business intelligence rules applicable to real life
use cases
The ability to write unlimited business
rules that trigger anomalies or trends
highlighting where and when illicit
activity is potentially happening.
In this case, product intended for
distribution in The United States is
showing up in other counties which
indicates a potential diversion
problem.
GPAS offers the ability to then drill
down to the specific product level and
understand who is responsible.
BUSINESS INTELLIGENCE
& ENFORCEMENT
Unique ID Coding & Printing
Inventory Control
Supply Chain – Monitoring
& Visibility
Crowd Sourcing & Inspectors –
Authentication & Engagement
Track & Trace
Unit-Case-Pallet-Container
Aggregation
GPAS
Dashboards, Reports,
& Analytics
GPAS End-to-End Coverage PREVENTION
MONITORING &
DETECTION
ILLICIT ACTIVITY
BUSINESS
INTELLIGENCE
ENFORCEMENT
GPAS Competitive Advantage - Differentiators
GPAS is a global and scalable service which has a unique, credible and demonstrable capabilities that you would
expect from a true enterprise-class service.
15
Comprehensive
Scalable Services
Mature Domain
Experience
• “One Stop Shop”
• Breadth of Services
• Ease of Implementation
& Integration
• Opex Cost Model
GPAS offers a range of services
within one flexible and scalable
cloud-based framework.
Serialization; Overt/Covert
protection; Traceability; Real-
time Business Alerts and
Intelligence; Data Analytics;
Blockchain
• Unlocking Business Value
through Traceability
• Collaborative Strategic
Approach
Enterprise Service
Level Agreement
Robust Roadmap &
Development
• Guaranteed Service
Availability
• 24/7 Hot Desk Support
• Full Disaster Recovery
• IOT
• Industry 4.0
• Digital Transformation
• AI Powered Analytics
GPAS consultants have credible,
demonstratable domain
experience and expertise the
traceability and supply chain
domain helping companies
derive real business value from
their investments.
GPAS provides guaranteed
response times and global
service availability. All aspects of
Service Security are fully
addressed referencing all
applicable standards (ISO 27001,
ISO/IEC 27018, HIPAA,
FedRAMP, SOC 1&2) and Best
Practices.
GPAS is both rich and innovative
from an RD&I Perspective.
Recognized – 2011 Wall Street
Innovation Award; 2013
Computerworld Honours
Laureate; 2016 Ireland Research
Award. GPAS is constantly
evolving in support of emerging
technologies (IOT, Blockchain,
AI, etc.)
16
Our Company
Micro Focus is one of the world’s
largest enterprise software
providers. We deliver trusted and
proven mission-critical software
that keeps the digital world
running. Our pragmatic,
disciplined, customer-centric
approach allows customers to
succeed in today’s rapidly
evolving marketplace.
www.gpasservices.com

More Related Content

Similar to GPAS Service - Technology Overview.pptx

How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)Scott Sutherland
 
Lucid green brand deck v2
Lucid green brand deck v2Lucid green brand deck v2
Lucid green brand deck v2d.labs
 
Benefits of Integrating Traceability - Macola - Nick Mears - Columbus Ohio
Benefits of Integrating Traceability - Macola - Nick Mears - Columbus OhioBenefits of Integrating Traceability - Macola - Nick Mears - Columbus Ohio
Benefits of Integrating Traceability - Macola - Nick Mears - Columbus OhioNick Mears
 
Four steps to an audit proof measurement system by PQ Systems
Four steps to an audit proof measurement system by PQ SystemsFour steps to an audit proof measurement system by PQ Systems
Four steps to an audit proof measurement system by PQ SystemsBlackberry&Cross
 
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...EC-Council
 
Blockchain-based Traceability Application In Agricultural
Blockchain-based Traceability Application In Agricultural Blockchain-based Traceability Application In Agricultural
Blockchain-based Traceability Application In Agricultural WowTrace
 
Trends in the quality assurance area
Trends in the quality assurance areaTrends in the quality assurance area
Trends in the quality assurance areaQA Club Kiev
 
Trends in the quality assurance area
Trends in the quality assurance areaTrends in the quality assurance area
Trends in the quality assurance areaSvitlana Dubyk
 
Supply Chain Integrity White Paper
Supply Chain Integrity White PaperSupply Chain Integrity White Paper
Supply Chain Integrity White PaperMovilitas
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsSirius
 
UpGuard - Complete Guide to Vendor Questionnaires
UpGuard - Complete Guide to Vendor QuestionnairesUpGuard - Complete Guide to Vendor Questionnaires
UpGuard - Complete Guide to Vendor QuestionnairesMike Baukes
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Whole Product Roadmap Case Study
Whole Product Roadmap Case StudyWhole Product Roadmap Case Study
Whole Product Roadmap Case StudyBruce Pharr
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trendsSatya Harish
 

Similar to GPAS Service - Technology Overview.pptx (20)

Food Traceability Report
Food Traceability ReportFood Traceability Report
Food Traceability Report
 
Pack Expo 2008
Pack Expo 2008Pack Expo 2008
Pack Expo 2008
 
How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)
 
UPITag_write_upP1_toP3
UPITag_write_upP1_toP3UPITag_write_upP1_toP3
UPITag_write_upP1_toP3
 
Steps to identify authentication solutions to curb counterfeiting
Steps to identify authentication solutions to curb counterfeitingSteps to identify authentication solutions to curb counterfeiting
Steps to identify authentication solutions to curb counterfeiting
 
Lucid green brand deck v2
Lucid green brand deck v2Lucid green brand deck v2
Lucid green brand deck v2
 
Benefits of Integrating Traceability - Macola - Nick Mears - Columbus Ohio
Benefits of Integrating Traceability - Macola - Nick Mears - Columbus OhioBenefits of Integrating Traceability - Macola - Nick Mears - Columbus Ohio
Benefits of Integrating Traceability - Macola - Nick Mears - Columbus Ohio
 
Four steps to an audit proof measurement system by PQ Systems
Four steps to an audit proof measurement system by PQ SystemsFour steps to an audit proof measurement system by PQ Systems
Four steps to an audit proof measurement system by PQ Systems
 
BSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdfBSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdf
 
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
 
Blockchain-based Traceability Application In Agricultural
Blockchain-based Traceability Application In Agricultural Blockchain-based Traceability Application In Agricultural
Blockchain-based Traceability Application In Agricultural
 
Trends in the quality assurance area
Trends in the quality assurance areaTrends in the quality assurance area
Trends in the quality assurance area
 
Trends in the quality assurance area
Trends in the quality assurance areaTrends in the quality assurance area
Trends in the quality assurance area
 
main project doument
main project doumentmain project doument
main project doument
 
Supply Chain Integrity White Paper
Supply Chain Integrity White PaperSupply Chain Integrity White Paper
Supply Chain Integrity White Paper
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
UpGuard - Complete Guide to Vendor Questionnaires
UpGuard - Complete Guide to Vendor QuestionnairesUpGuard - Complete Guide to Vendor Questionnaires
UpGuard - Complete Guide to Vendor Questionnaires
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Whole Product Roadmap Case Study
Whole Product Roadmap Case StudyWhole Product Roadmap Case Study
Whole Product Roadmap Case Study
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trends
 

Recently uploaded

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 

Recently uploaded (20)

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 

GPAS Service - Technology Overview.pptx

  • 2. 2 Is there a Silver Bullet Solution? Criteria 1. Difficult (Impossible) to copy/replicate. 2. Can be applied at product/packaging level in high volume production. 3. Easily authenticatable by Consumers. Many solutions meet two of the requirements but there is no single technology based “Silver Bullet” that meets all of the above requirements.
  • 3. 3 Anti-counterfeit Solution Analysis 1. Difficult/Impossible to copy/replicate Overt, covert, tamper proof & forensic based solutions that mark packaging/products in a unique manner that requires counterfeiters to create same or similar markings which overtly may look the same. RISK Risk is that they look similar enough to the consumer and therefore are judged “official or real”.
  • 4. 4 Anti-counterfeit Solution Analysis 2. Can be applied at product/packaging level in high volume production “Specialized solutions” that claim they cannot be replicated or copied RISK The technology that produces markings on the product/packaging cannot be applied during high volume print production, or interferes with those processes rendering them useless.
  • 5. 5 Anti-counterfeit Solution Analysis 3. Can be easily authenticated/ verified by consumers The value of technology solutions need to be accessed based on HOW they can be verified and WHO can verify them. RISK • If the solution is based on overt verification by consumers, i.e. holograms then the strength of the protection must be questionable. • If the solution requires specialized equipment to verify it then the solution is only of value to field service agents/secret shoppers. • If the solution is intended to be verifiable by consumers using their smartphones, it needs to address the significant technology challenge of deployment across all mass market smartphone devices. • If the solution requires consumers to download a specialized App on their smartphone for verification, the significant drop in participation rate (which drives data analytics and value) must be considered.
  • 6. 6 Best Practice The best practice adopted by the most mature leading brands is to adopt a multi-layered approach to anti-counterfeiting and illicit activity management based on prevention, monitoring & detection and finally enforcement. PREVENTION MONITORING & DETECTION ILLICIT ACTIVITY BUSINESS INTELLIGENCE ENFORCEMENT
  • 7. 7 Multi-layered Approach PREVENTION MONITORING & DETECTION ILLICIT ACTIVITY BUSINESS INTELLIGENCE ENFORCEMENT APPLICATION APPROACH DESCRIPTION 1 Product Anti-Counterfeit Technology Adoption PREVENTION Overt & Covert Technologies applied to products/packaging 2 Product Verification & Authentication PREVENTION & DETECTION Unique tagging of Products that support Consumer Authentication - “Make Your Customers your Brand Agents” 3 Supply Chain Security Management MONITORING & DETECTION Traceability of product throughout supply chain, with Real time BI illicit activity monitoring 4 Market Inspection MONITORING & DETECTION Agents testing products in supply chain, customs and retail 5 Illicit Activity Analytics ILLICIT ACTIVITY BUSINESS INTELLIGENCE Capture Supply Chain and Consumer Engagement data and put them to work to unlock insights into types & location & extent of illicit activities in your supply chain and marketplace 6 Online Brand Monitoring MONITORING, DETECTION & ENFORCEMENT Online search for Fake & Counterfeit selling of Product, IP infringement and Enforcement 7 Brand Protection Enforcement ENFORCEMENT Agents focused on shutting down illicit players and recovering products working in conjunction with customs, trading standards & law agencies, using illicit activity BI in 1-6
  • 8. 8 Customers = Brand Agents PREVENTION Easy for all stakeholders to participate and understand the product in their hands which in turn creates preventive data analytics in GPAS 2012 2017 QR Code Market Adoption & Growth Increased Stakeholder & Consumer Engagement Connected/Smart Packaging Sustainable Packaging Today QR Codes are now Ubiquitous GPAS is a Technology Enabler
  • 9. 9 Open format Unique ID Serialization PREVENTION Utilization of unique ID coding with an open format where no app is required to be downloaded 78% of people abandon the process (higher with younger 18 – 24 demographic). * GPAS doesn’t require an App to be downloaded to read the code What happens when you ask stakeholders to download an app to read a specific security feature?
  • 10. 10 Authentication Insights A series of Activity Monitoring Dashboards with the ability to drill-down and investigate DETECTION An understanding of where counterfeit activity is occurring geographically with the ability to drill down An understanding of how much illicit activity is occurring with the ability to drill down and understand specific products being compromised and where An understanding of who is potentially involved in illicit activity by the number and frequency of product scans
  • 11. 11 Real-time Activity Dashboard A view of global scan activity of all products, all scans in real-time MONITORING Heat-map geolocation reporting with ability to drill down to specific interactions Chart detailing # of Valid, Invalid, and Fake code activity with ability to drill down Table detailing every GPAS code scanned with ability to filter, and search based on all relevant criteria Default time period equals current week; User can customize report date period Users can export all activity for the reported time period
  • 12. 12 Business Intelligence – Illicit Activity Alert Real-time geolocation awareness of illicit activity by specific products INVALID SCAN RESULT BUSINESS INTELLIGENCE & ENFORCEMENT Monitor activity based on a specific business rule criteria. In this case disabling smart phone result messaging on all applicable codes presenting an invalid response to consumers when scanned VALID SCAN RESULT
  • 13. 13 Business Intelligence – Diversion Alert Real-time alerts based on unlimited business intelligence rules applicable to real life use cases The ability to write unlimited business rules that trigger anomalies or trends highlighting where and when illicit activity is potentially happening. In this case, product intended for distribution in The United States is showing up in other counties which indicates a potential diversion problem. GPAS offers the ability to then drill down to the specific product level and understand who is responsible. BUSINESS INTELLIGENCE & ENFORCEMENT
  • 14. Unique ID Coding & Printing Inventory Control Supply Chain – Monitoring & Visibility Crowd Sourcing & Inspectors – Authentication & Engagement Track & Trace Unit-Case-Pallet-Container Aggregation GPAS Dashboards, Reports, & Analytics GPAS End-to-End Coverage PREVENTION MONITORING & DETECTION ILLICIT ACTIVITY BUSINESS INTELLIGENCE ENFORCEMENT
  • 15. GPAS Competitive Advantage - Differentiators GPAS is a global and scalable service which has a unique, credible and demonstrable capabilities that you would expect from a true enterprise-class service. 15 Comprehensive Scalable Services Mature Domain Experience • “One Stop Shop” • Breadth of Services • Ease of Implementation & Integration • Opex Cost Model GPAS offers a range of services within one flexible and scalable cloud-based framework. Serialization; Overt/Covert protection; Traceability; Real- time Business Alerts and Intelligence; Data Analytics; Blockchain • Unlocking Business Value through Traceability • Collaborative Strategic Approach Enterprise Service Level Agreement Robust Roadmap & Development • Guaranteed Service Availability • 24/7 Hot Desk Support • Full Disaster Recovery • IOT • Industry 4.0 • Digital Transformation • AI Powered Analytics GPAS consultants have credible, demonstratable domain experience and expertise the traceability and supply chain domain helping companies derive real business value from their investments. GPAS provides guaranteed response times and global service availability. All aspects of Service Security are fully addressed referencing all applicable standards (ISO 27001, ISO/IEC 27018, HIPAA, FedRAMP, SOC 1&2) and Best Practices. GPAS is both rich and innovative from an RD&I Perspective. Recognized – 2011 Wall Street Innovation Award; 2013 Computerworld Honours Laureate; 2016 Ireland Research Award. GPAS is constantly evolving in support of emerging technologies (IOT, Blockchain, AI, etc.)
  • 16. 16 Our Company Micro Focus is one of the world’s largest enterprise software providers. We deliver trusted and proven mission-critical software that keeps the digital world running. Our pragmatic, disciplined, customer-centric approach allows customers to succeed in today’s rapidly evolving marketplace.