SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
 
 
     Intellectual Property                                                        
            Fraud Protection 
        
        

        

        

        

        

        

        

                                                             

                                                             

                                                             

                                                             

                                                             

                                                             

                                                             
                                                            Authors | 

                                                            Chris Jensen is a Vice President at New Momentum  
                                                            (San Clemente, CA), a company that provides brand/IP 
                                                            Protection software to the electronics industry. 

                                                            Raminderpal Singh is a Senior Technical Staff Member, 
    “GSA commissioned New Momentum to offer this paper.”    of IBM’s 300mm Semicondcutor Fab, Systems and 
                                                            Technology Group’s Transformation Core. 

        
 
Do you know what counterfeits are costing  your 
company? 
     

                  Outsourcing and globalization have numerous benefits, but they have a significant 

                  downside—the proliferation of counterfeits and sales through unauthorized 

                  channels.  Semiconductor manufacturers are losing billions every year to 

                  counterfeits and the gray market. In 2006 U.S. Customs recorded over 15 billion IC 

                  imports‐‐about 500 every second.  Results of a study conducted by AGMA 

                  (Association for Abatement of Gray Market and Counterfeits) and KPMG, showed 

                  that one out of every ten IT products contains counterfeit semiconductors.  That 

                  means 1.5 billion of those imported ICs are likely counterfeit…about 50 

                  counterfeits every second flooding into the US.  Do you know how many of those 

                  1.5 billion (and the number is growing all the time) are yours?  Most 

                  semiconductor manufacturers don’t realize the extent of their revenue loss to 

                  counterfeits. 

     

                  And, revenues are not all you are losing. Company and product reputations are 

                  being eroded and legitimate channel partners lost. The goal of this paper is to 

                  demonstrate the impact counterfeits have on semiconductor companies as well as 

                  provide you with solutions to stop these unauthorized sales. And most 

                  importantly, this paper will show you why semiconductor companies need to take 

                  action now before your revenues and reputation are eroded even further.  

                  Participation in the GSA’s IP Protection working group is an important step. 

               


| In 2006 U.S. Customs recorded over 15 billion IC imports­­about 500 every second. |
Why is now the time to take action?                                                       The Semiconductor Industry 
                                                                                          Associate (SIA) recently 
                                                                                          formed an Anti‐Counterfeiting 
Once thought to be too complex and sophisticated for counterfeiters,                      Task Force that conducted a 
                                                                                          study with these results:  
semiconductors, electronics and IT (information technology) products are 
                                                                                           
now hot ticket items in counterfeit manufacturing. Lost sales, however,                   Company A: Over 100 part 
                                                                                          numbers have been 
only account for a fraction of what companies sacrifice when their 
                                                                                          counterfeited in the last 5 
intellectual property (IP) is stolen and their products illegally produced.               years 

                                                                                          Company B: 19 cases 
                                                                                          reported with 97,000 units 
Counterfeiters steal IP backed by million‐dollar investments in research 
                                                                                          Company C: Since June 2006 
and development, marketing, and manufacturing. Moreover, illegitimate or 
                                                                                          there have been 4 US Customs 
substandard chips present the company with additional costs to repair or                  seizures of counterfeits of our 
                                                                                          products by US Customs; units 
replace defective products carrying their brand name. 
                                                                                          seized ranged from 6,000 to 
                                                                                          60,000 

                                                                                          Company D: We estimate that 
                                            
                                                                                          2‐3% of the purchases of our 
     Potential Counterfeit Activity by Revenue Loss                                       brand are counterfeit 

    Study | 1 Global Semiconductor Company from Jan 23 – Feb 18, 2008                     Company E: A broker website 
                                                                                          indicated 40,000 of our 
                                                                                          devices available, but our 
     $160,000,000 
                                                                                          company had only made 200 
     $140,000,000 
     $120,000,000                                                                         units of that device with the 
                           $145,652,189 
     $100,000,000                                                                         specified date code.  If all 
      $80,000,000                                                                         40,000 were available, it 
      $60,000,000 
                                                                                          would result in a $34 million 
      $40,000,000                                             $19,133,339 
      $20,000,000                                                                         loss. 
                                               $2,639,277 
               $‐                                                                         Can your company afford 
                     Report on all products 50% or greater discount. This discount 
                                                                                          these kinds of losses?  By the 
                                         indicates counterfeit
                                                                                          way, this is the activity these 
                        Counterfeit       Gray Market        Authorized Distributor       companies found without 
                                                                                       
 
                                                                                          using the advanced 
                                                                                          technologies that would give 
                                                                                          them even greater visibility 
                                                                                          into counterfeit activity. 
 

                                                                                          A number of factors have 
                                                                                          coalesced to create a business 
     Potential Counterfeit Activity by Quantity                                           environment in which 
    Study | 1 Global Semiconductor Company from Jan 23 – Feb 18, 2008                     manufacturing counterfeit IP is 
                                                                                          not only lucrative, but also 
                                                                                          much more attainable than 
      140,000              118,128 
      120,000                                                                             ever before. Counterfeiters are 
      100,000 
       80,000                                                                             becoming increasingly tech 
       60,000 
                                                                                          savvy, and their ability to 
       40,000                                                  20,367 
       20,000                                  1,134                                      obtain more advanced 
            0 
                                                                                          manufacturing machinery and 
                   Report on all products 50% or greater discount. This discount 
                                      indicates counterfeit.                              techniques has been one of the 
                                                                                          most crucial factors in fueling 
                 Counterfeit     Gray Market       Authorized Distributor
                                                                                          the production of illegal high‐
                                                                                          tech goods.  

 
During the past decade, billions of dollars in                                                     
foreign direct investment (FDI) have flowed 
into a number of developing countries, such as 
                                                                                Top Products Seized 
China, leading to the proliferation of                                    Source | U.S. Customs and Border Protection 
sophisticated manufacturing processes and 
                                                                                              Media         All Other 
capabilities to produce high‐tech products. 
                                                                                                                       Commodities 
Counterfeit components have long been a                             Handbags, Wallets
                                                                         Backpacks               9%
problem in the electronics industry, but as of 
                                                                                         9%
late, companies are finding themselves                                                                          29%
increasingly challenged with having to deal  
                                                                      Footwear      14%
with counterfeit semiconductor components. 
 
A second contributing factor is the popularity                                             17%               22%
of e‐commerce. Many counterfeiters are using                             Semiconductors/
the Internet to reach potential buyers, and                              Components 
                                                                                                            Wearing Apparel
without regulatory bodies able to police and 
govern all product‐listing sites or                                                                
advertisements sent out over email, the Web  
has become a bastion for illegal sales of  
counterfeit products.
 

Why is the problem becoming more serious for 
semiconductor companies? 
Remarking one of the biggest problems 
In the SIA study, remarking was the most common method of counterfeiting.  Remarking involves 
scraping a label off a chip package and printing on a new label.  This can involve a different and higher‐
priced brand, or a faster chip speed, or a military grade lot number on a commercial chip. Most of the 
problem is coming from Shenzhen China, located on the border with Hong Kong. You can find anything 
in Shenzhen—original, fake, new, and old components.  It’s common to find shops making fake 
“Samsung, Motorola,” etc. labels.  The Chinese vendors say that making the labels is easy—they simply 
select the specific component maker’s label from the program library, then modify the data.  The label 
quality is excellent. 
 
Other counterfeiting tricks include incorrect die, inferior packaging materials, reproduction of chip 
designs, packages without die, different labels on packages, false RoHS (Restriction on Hazardous 
Substances) notifications. 
 
Inaccurate notifications of whether a chip has lead can impact a semiconductor manufacturer in two 
different, yet significant ways.  First, if the chip contains lead but has a false RoHS notification, the 
semiconductor manufacturer may have products restricted from sale in some countries, face a lawsuit 
and experience significant amounts of bad publicity.  Of greater concern, however, is when a part does 
not contain lead and the counterfeiter asserts that it does.  Parts without lead have reliability problems 
when used in applications in outer space such as satellites or NASA flights. 
 
How can you solve this problem? 
There are several key areas you can focus on to reduce your company’s  
revenue erosion from counterfeits: legal, operational, technology (web search,  
encryption, lock & key). 

 
 

 

 
What can you do through the legal system? 
Though many big players in the IT industry are making headlines as they break up crime rings, small‐to‐
midsize enterprises face a tough fight in their struggle to protect their IP; a number of internal and 
external issues challenge companies’ ability to find, identify, and persecute transgressors. 

How about encouraging US Customs to make semiconductor counterfeiting a priority? While it may be 
easier to spot counterfeit luxury goods, fake semiconductors can result much more dangerous (even 
deadly in the case of medical devices) situations.  



How about the operational approach? 
One important step in reducing counterfeiting is to focus on illegal sales on the gray market.  While some 
gray market brokers are legitimate, the gray market is an excellent outlet four counterfeits.  AGMA says, 
suggests examining companies trying to enter distribution channels and monitoring contract 
manufacturers and distributors already in the supply chain. The organization recommends thoroughly 
interviewing companies and investigating their background before allowing them to become resellers or 
distributors. Once they enter the supply chain, AGMA advises organizations to establish strict contracts, 
perform extensive auditing, and maintain close relationships with its outsourcing partnerships. 

 
Though the listings may be hidden in the deep recesses of the              | Results of a study conducted 
Internet, a couple effective search words can bring up product 
                                                                           by AGMA (Association for 
listing after product listing of both legitimate and counterfeit goods. 
                                                                           Abatement of Gray Market and 

                                                                           Counterfeits) and KPMG,  
                                                                           showed that one out of every 
Technology­web search 
                                                                           ten IT products contains 
Many companies that have resorted to manually scouring the 
                                                                           counterfeit semiconductors. | 
Web for unauthorized product listings and counterfeit goods 
have found this process time consuming, tedious and ineffective. 
The up‐and‐coming technology is based on the collection and organization of unstructured data. 
Unstructured data is information collected from a number of electronic sources that hasn’t been arranged 
or organized into an understandable form. In the context of seeking out product listings, this data can 
come from a number of sources including market Web sources, XML data sources, B2B sites, forums, 
auctions, and emails advertising gray market sales. 
 
 
 
 
 
Software solutions like this bring a number of benefits to manufacturers. Not only does it eliminate 
the significant number of man hours and resources manual searching required, these systems can 
tap into information sources previously out of reach by traditional search methods and thereby 
increasing the amount of “area” a company can keep a watch on the marketplace. 
 
They also highlight other market activity exceptions, such as new sellers entering the market and 
an unexpected amount of selling or buying in a particular geographical region.  
 
When looking for an IP-protection solution, make sure all reports and data collected are accessible 
through a Web portal and that the supplier is a Software as a Service (SaaS) supplier. This makes 
data immediately without any extensive installation processes and, more importantly, without the 
involvement of other departments that may slow the deployment down.  
 

Case Study  
 
One Tier 1 fabless semiconductor manufacturer has already deployed this kind of system and saw 
an immediate return on investment. In the first 30 days, the manufacturer found 500 cases of 
unauthorized sales or counterfeit products previously undetected by its traditional monitoring 
systems. Over a year’s time, if 6,000 unapproved transactions were prevented, the manufacturer 
could save itself millions of dollars in lost revenue.  
 
Collecting data and reports, however, doesn’t necessarily result in a decrease in counterfeiting; the 
information needs to be put into action. Often times when companies manage to receive timely 
data on counterfeits or illegal gray market sales, they simply don’t know what to do with it. The 
above manufacturer handled one if its instances of unauthorized sales through an unconventional 
route: it tried to turn unauthorized distributors into legitimate ones. 
 
The benefit of this strategy is two‐fold. First, if the distributor agrees to join the manufacturer’s 
authorized channels, the manufacturer can then more easily monitor buying and selling activities 
and more effectively ensure the products distributed are authentic. Secondly, in the event the 
distributor declines the offer, its managers know the company has been identified as a 
counterfeiter or an unauthorized sales channel and will likely stop selling the  
manufacturer’s product. 
 
 

The call to action  
Another significant obstacle to successfully addressing counterfeiting problems has been 
underestimating the problem due to the lack of dialogue and understanding of the enormity of the 
problem in the semiconductor industry. Typically, companies grappling with counterfeiting shy away 
from publicizing the problem, and this relative silence have led many in the industry to underestimate 
the enormity of counterfeiting and the amount of assets at stake. It’s time to take a stand against 
counterfeiting, and push forward toward effective solutions to this problem. 

 

Here’s how you can participate: 
Attend GSA's webinar focusing on IP Fraud Protection.

October 8, 2008 at 10 am Pacific time                     

No semiconductor company, no matter how large or small, is immune to IP fraud problems. Speakers
will discuss how counterfeits are impacting the semiconductor industry, how to determine what it 
may be costing your company and how you can combat the problem.   


To register for the free webinar or for more information, visit:
 


http://www.gsaglobal.org/publications/ipfraud



Or contact: 

GSA: Lisa Tafoya, ltafoya@gsaglobal.org 

New Momentum: Chris Jensen, cjensen@newmo.com 

     

 

Más contenido relacionado

Destacado

TIPS for Managing Tech and Workflow Changes in Libraries
TIPS for Managing Tech and Workflow Changes in LibrariesTIPS for Managing Tech and Workflow Changes in Libraries
TIPS for Managing Tech and Workflow Changes in LibrariesColleen Harris
 
CiL11 MultiGens & Tech Change
CiL11 MultiGens & Tech ChangeCiL11 MultiGens & Tech Change
CiL11 MultiGens & Tech ChangeColleen Harris
 
Hy solution사례(1)금융상품분석샘플
Hy solution사례(1)금융상품분석샘플Hy solution사례(1)금융상품분석샘플
Hy solution사례(1)금융상품분석샘플valuasset
 
Reputation matters - what's yours?
Reputation matters - what's yours?Reputation matters - what's yours?
Reputation matters - what's yours?Sara Shailer
 
Greener Greater Building Plan Overview
Greener Greater Building Plan Overview Greener Greater Building Plan Overview
Greener Greater Building Plan Overview REBNY
 
搜索引擎原理略览
搜索引擎原理略览搜索引擎原理略览
搜索引擎原理略览pluschen
 
高崎経済大学の受験..
高崎経済大学の受験..高崎経済大学の受験..
高崎経済大学の受験..kobayashimasakazu
 
W6 Physio First Presentation
W6 Physio First PresentationW6 Physio First Presentation
W6 Physio First PresentationOsmond Group Ltd
 
Multiplicación de matrices
Multiplicación de matricesMultiplicación de matrices
Multiplicación de matricesJorge
 

Destacado (13)

TIPS for Managing Tech and Workflow Changes in Libraries
TIPS for Managing Tech and Workflow Changes in LibrariesTIPS for Managing Tech and Workflow Changes in Libraries
TIPS for Managing Tech and Workflow Changes in Libraries
 
Bug tracking - alert project - fossa2011
Bug tracking - alert project - fossa2011Bug tracking - alert project - fossa2011
Bug tracking - alert project - fossa2011
 
CiL11 MultiGens & Tech Change
CiL11 MultiGens & Tech ChangeCiL11 MultiGens & Tech Change
CiL11 MultiGens & Tech Change
 
Hy solution사례(1)금융상품분석샘플
Hy solution사례(1)금융상품분석샘플Hy solution사례(1)금융상품분석샘플
Hy solution사례(1)금융상품분석샘플
 
Reputation matters - what's yours?
Reputation matters - what's yours?Reputation matters - what's yours?
Reputation matters - what's yours?
 
Greener Greater Building Plan Overview
Greener Greater Building Plan Overview Greener Greater Building Plan Overview
Greener Greater Building Plan Overview
 
F os sa2012-j.diggs-facilitating student participation in free software
F os sa2012-j.diggs-facilitating student participation in free softwareF os sa2012-j.diggs-facilitating student participation in free software
F os sa2012-j.diggs-facilitating student participation in free software
 
Open past books and digitization - bernard lang - fossa2011
Open past   books and digitization - bernard lang - fossa2011Open past   books and digitization - bernard lang - fossa2011
Open past books and digitization - bernard lang - fossa2011
 
搜索引擎原理略览
搜索引擎原理略览搜索引擎原理略览
搜索引擎原理略览
 
Annual Report AJI 2009 : Press in the Midst of Crisis and Threat
Annual Report AJI 2009 :  Press in the Midst of Crisis and ThreatAnnual Report AJI 2009 :  Press in the Midst of Crisis and Threat
Annual Report AJI 2009 : Press in the Midst of Crisis and Threat
 
高崎経済大学の受験..
高崎経済大学の受験..高崎経済大学の受験..
高崎経済大学の受験..
 
W6 Physio First Presentation
W6 Physio First PresentationW6 Physio First Presentation
W6 Physio First Presentation
 
Multiplicación de matrices
Multiplicación de matricesMultiplicación de matrices
Multiplicación de matrices
 

Similar a Intellectual Property Fraud Protection

Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesNEW Momentum
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesNEW Momentum
 
Blackhat - Do you trust your Threat Intelligence
Blackhat - Do you trust your Threat IntelligenceBlackhat - Do you trust your Threat Intelligence
Blackhat - Do you trust your Threat IntelligenceChristopher Doman
 
Cryptsonic pitch deck
Cryptsonic   pitch deckCryptsonic   pitch deck
Cryptsonic pitch deckSeiji Eto
 
IBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperIBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperSue Hallen
 
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...Dataconomy Media
 
12-‹#›1Describe the characteristics, valuation, and amo.docx
12-‹#›1Describe the characteristics, valuation, and amo.docx12-‹#›1Describe the characteristics, valuation, and amo.docx
12-‹#›1Describe the characteristics, valuation, and amo.docxdrennanmicah
 
Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3Al Ewers
 
[Phybbit] Series A Deck
[Phybbit] Series A Deck[Phybbit] Series A Deck
[Phybbit] Series A DeckSatoko Ohtsuki
 
AI : Animal Like Abilities in Applied AI, What can go wrong?
AI : Animal Like Abilities in Applied AI, What can go wrong?AI : Animal Like Abilities in Applied AI, What can go wrong?
AI : Animal Like Abilities in Applied AI, What can go wrong?Jari Koister
 
Hughitt.di mase
Hughitt.di maseHughitt.di mase
Hughitt.di maseNASAPMC
 
Hughitt.di mase
Hughitt.di maseHughitt.di mase
Hughitt.di maseNASAPMC
 
AiLibrary Garage.com application review - by Gordon Kraft
AiLibrary Garage.com   application review - by Gordon Kraft AiLibrary Garage.com   application review - by Gordon Kraft
AiLibrary Garage.com application review - by Gordon Kraft Gordon Kraft
 
Artificial Intelligence and Intellectual Property - Brandsmiths.pdf
Artificial Intelligence and Intellectual Property - Brandsmiths.pdfArtificial Intelligence and Intellectual Property - Brandsmiths.pdf
Artificial Intelligence and Intellectual Property - Brandsmiths.pdfonline Marketing
 
Artificial Intelligence in Germany
Artificial Intelligence in GermanyArtificial Intelligence in Germany
Artificial Intelligence in GermanyBernard Marr
 
Forum session11 presentation_wood
Forum session11 presentation_woodForum session11 presentation_wood
Forum session11 presentation_wood19811228
 
Avoiding Counterfeit Risk
Avoiding Counterfeit RiskAvoiding Counterfeit Risk
Avoiding Counterfeit RiskKristal Snider
 
Coming to Tech's Mecca 2020
Coming to Tech's Mecca 2020Coming to Tech's Mecca 2020
Coming to Tech's Mecca 2020Matteo Fabiano
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 

Similar a Intellectual Property Fraud Protection (20)

Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 
Blackhat - Do you trust your Threat Intelligence
Blackhat - Do you trust your Threat IntelligenceBlackhat - Do you trust your Threat Intelligence
Blackhat - Do you trust your Threat Intelligence
 
Cryptsonic pitch deck
Cryptsonic   pitch deckCryptsonic   pitch deck
Cryptsonic pitch deck
 
IBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperIBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White Paper
 
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
 
12-‹#›1Describe the characteristics, valuation, and amo.docx
12-‹#›1Describe the characteristics, valuation, and amo.docx12-‹#›1Describe the characteristics, valuation, and amo.docx
12-‹#›1Describe the characteristics, valuation, and amo.docx
 
Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3
 
[Phybbit] Series A Deck
[Phybbit] Series A Deck[Phybbit] Series A Deck
[Phybbit] Series A Deck
 
AI : Animal Like Abilities in Applied AI, What can go wrong?
AI : Animal Like Abilities in Applied AI, What can go wrong?AI : Animal Like Abilities in Applied AI, What can go wrong?
AI : Animal Like Abilities in Applied AI, What can go wrong?
 
Hughitt.di mase
Hughitt.di maseHughitt.di mase
Hughitt.di mase
 
Hughitt.di mase
Hughitt.di maseHughitt.di mase
Hughitt.di mase
 
AiLibrary Garage.com application review - by Gordon Kraft
AiLibrary Garage.com   application review - by Gordon Kraft AiLibrary Garage.com   application review - by Gordon Kraft
AiLibrary Garage.com application review - by Gordon Kraft
 
Artificial Intelligence and Intellectual Property - Brandsmiths.pdf
Artificial Intelligence and Intellectual Property - Brandsmiths.pdfArtificial Intelligence and Intellectual Property - Brandsmiths.pdf
Artificial Intelligence and Intellectual Property - Brandsmiths.pdf
 
Genius of Things Houston
Genius of Things HoustonGenius of Things Houston
Genius of Things Houston
 
Artificial Intelligence in Germany
Artificial Intelligence in GermanyArtificial Intelligence in Germany
Artificial Intelligence in Germany
 
Forum session11 presentation_wood
Forum session11 presentation_woodForum session11 presentation_wood
Forum session11 presentation_wood
 
Avoiding Counterfeit Risk
Avoiding Counterfeit RiskAvoiding Counterfeit Risk
Avoiding Counterfeit Risk
 
Coming to Tech's Mecca 2020
Coming to Tech's Mecca 2020Coming to Tech's Mecca 2020
Coming to Tech's Mecca 2020
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 

Más de NEW Momentum

Importance of Combating Gray Market Activity
Importance of Combating Gray Market ActivityImportance of Combating Gray Market Activity
Importance of Combating Gray Market ActivityNEW Momentum
 
Understanding the Gray Market Strategy
Understanding the Gray Market StrategyUnderstanding the Gray Market Strategy
Understanding the Gray Market StrategyNEW Momentum
 
Counterfeiting – a major threat to the brands
Counterfeiting – a major threat to the brandsCounterfeiting – a major threat to the brands
Counterfeiting – a major threat to the brandsNEW Momentum
 
Combat gray market sales today
Combat gray market sales todayCombat gray market sales today
Combat gray market sales todayNEW Momentum
 
The gray market effect on brand reputation
The gray market effect on brand reputationThe gray market effect on brand reputation
The gray market effect on brand reputationNEW Momentum
 
How to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyHow to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyNEW Momentum
 
Brand protection business case
Brand protection business caseBrand protection business case
Brand protection business caseNEW Momentum
 
Ways to End Gray Market Sales & Its Effect
Ways to End Gray Market Sales & Its EffectWays to End Gray Market Sales & Its Effect
Ways to End Gray Market Sales & Its EffectNEW Momentum
 
Strategies to combat grey market sales
Strategies to combat grey market salesStrategies to combat grey market sales
Strategies to combat grey market salesNEW Momentum
 
New Momentum - Overview
New Momentum - OverviewNew Momentum - Overview
New Momentum - OverviewNEW Momentum
 
White paper stopping counterfeit pharmaceuticals 0309
White  paper stopping counterfeit pharmaceuticals 0309White  paper stopping counterfeit pharmaceuticals 0309
White paper stopping counterfeit pharmaceuticals 0309NEW Momentum
 
How to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyHow to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyNEW Momentum
 

Más de NEW Momentum (13)

Importance of Combating Gray Market Activity
Importance of Combating Gray Market ActivityImportance of Combating Gray Market Activity
Importance of Combating Gray Market Activity
 
Understanding the Gray Market Strategy
Understanding the Gray Market StrategyUnderstanding the Gray Market Strategy
Understanding the Gray Market Strategy
 
Counterfeiting – a major threat to the brands
Counterfeiting – a major threat to the brandsCounterfeiting – a major threat to the brands
Counterfeiting – a major threat to the brands
 
Combat gray market sales today
Combat gray market sales todayCombat gray market sales today
Combat gray market sales today
 
The gray market effect on brand reputation
The gray market effect on brand reputationThe gray market effect on brand reputation
The gray market effect on brand reputation
 
How to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyHow to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit Piracy
 
Brand Protection
Brand Protection Brand Protection
Brand Protection
 
Brand protection business case
Brand protection business caseBrand protection business case
Brand protection business case
 
Ways to End Gray Market Sales & Its Effect
Ways to End Gray Market Sales & Its EffectWays to End Gray Market Sales & Its Effect
Ways to End Gray Market Sales & Its Effect
 
Strategies to combat grey market sales
Strategies to combat grey market salesStrategies to combat grey market sales
Strategies to combat grey market sales
 
New Momentum - Overview
New Momentum - OverviewNew Momentum - Overview
New Momentum - Overview
 
White paper stopping counterfeit pharmaceuticals 0309
White  paper stopping counterfeit pharmaceuticals 0309White  paper stopping counterfeit pharmaceuticals 0309
White paper stopping counterfeit pharmaceuticals 0309
 
How to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyHow to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit Piracy
 

Último

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Intellectual Property Fraud Protection