General OpSec Security FAQs
Who is OpSec Security?
With decades of demonstrated authentication success, OpSec Security is the global market leader in securing and protecting brands. No other company offers our breadth of services, and that is why OpSec is the first choice for the biggest names in industry – to ensure brand quality, reputation, integrity, and consumer engagement. Our solutions enable a totally integrated, data-centric approach that goes far beyond anti-counterfeiting to include supply chain optimization, customer engagement, online brand protection solutions, and more.
OpSec is relentless in our innovation, developing increasingly advanced ways to meet an ever-growing range of threats. Even as the counterfeiters, pirates, and other bad actors employ more sophisticated ways to damage your brand, we never stop getting better at protecting it.
Which brands currently use OpSec Security?
OpSec protects an amazing range of well-known brands and products across a spectrum of industries – from high-fashion luxury goods to automotive supply chains and all the way up to iron-clad government solutions.
How does OpSec respond to counterfeits in the marketplace?
Counterfeiting happens – and it likely always will. When these bad actors expose themselves, we can eliminate them from the marketplace. Our fashion customers are served by the secure cloud-based OpSec® Insight platform, and that’s where we monitor online marketplaces and proactively seek out counterfeit labels (and customer product infringements) with OBP (Online Brand Protection). As part of this process, we collaborate with our customers to determine appropriate next steps. OpSec’s analysts work with customers to ‘take down’ seller websites where counterfeit products and labels are being sold, and we respond quickly to develop an agreed migration path to the next technology.
Are there companies in my industry I can speak to about your service?
We are happy to share contacts for you to investigate our services further by talking to some of our customers.
How does OpSec support me in legal disputes?
The experts at OpSec commonly support customer court cases and claims by providing data analysis services, physical interrogation of suspect labels, and offering expert witnesses when required. We actively assist enforcement teams, brand owners, and interested parties with support in any of these areas when claims arise. OpSec also offers training to approved enforcement groups to allow them to be effective in their investigations and interrogations of products that use our solutions.
How long does it take to implement an OpSec solution?
We listen to your business problems, analyze your needs, and design a custom solution that is the right one for you. Based on your requirements and any design work that may be needed, a solution can be implemented as quickly as a few weeks. OpSec drives the process, and we make it easy to get you up and running with powerful brand protection solutions, whether you use our Online solutions, one of our many On-Product authentication solutions, or a powerful integration of both.
How do I start using OpSec?
At each step of the way—from our initial assessment throughout the implementation of your solution—OpSec is a truly consultative partner committed to your success. We have vast experience across a lot of industries, and each customer typically has its own business rules for launching a successful program. We provide that road map once the solution is identified to combat the issues at hand. We ensure all stakeholders are part of the program, from scoping to field support after the program is in place. We help educate and institute, and when required, lead the solution implementation with your entire business and supply chain stake holders and business partners.
You’ll also have the support of our in-house design team.
Our design team consists of experts with a wide range of backgrounds, including the fashion and apparel field. They can provide original or off-the-shelf designs for hangtags, labels, packaging, badges, foils & holographic labels. OpSec is unique in being one of the few brand protection providers to offer this level of specialized expertise.
You’ll benefit from global expertise and continuous innovation.
With over 40 years’ experience and a staff of over 800 employees worldwide, OpSec draws on industry expertise that spans all aspects of global supply chains and retail channels. We are committed to continuous advancement of our technology platforms. We know the threats, understand the solutions, and can identify and fill the gaps in your brand protection program.
On-Product Solution FAQs
Why should I authenticate my product?
Counterfeiting is huge problem with huge impacts on the global economy, your well-intentioned customers, your brand, and ultimately your bottom line. For every consumer that wants to buy your product, there are thousands of people that want to counterfeit it, putting your brand integrity at risk. OpSec knows exactly how to protect the brand integrity of any product you can imagine, but we’re especially good at fashion. Shoes, athleisure wear, cosmetics, luxury soft goods, electronics, accessories – we’ve done it all, and we remain on the cutting edge of staying a step ahead of threats to your brand.
How does OpSec connect me with consumers?
By utilizing the secure cloud-based OpSec® Insight platform, you can use your on-product authentication features to engage with your consumers – increasing brand loyalty and improving customer market intelligence. OpSec enables your brand to follow consumer buying patterns to see where, how and when your brand is purchased, and enable a more personalized buying experience by offering rewards, offers and promotions.
What will my custom label look like, and how custom can we make the label look?
OpSec develops and manufactures the highest quality secure labels in the market. We offer a variety of finishes, sizes, materials, and security features for your label needs. When designing your label, we take your primary market into consideration and design imagery that will appeal to the customer you want to attract.
Why does it matter that each security tag has a unique identity?
The ability to identify, prove, and enforce business rules and laws against counterfeiting, diversion, overproduction in authorized factories, theft of goods from authorized factories and distribution channels, always depends on the ability to prove the authentic unique identity of each authorized item.
Why not have the factories just print a unique number on each product?
As easy as this seems, it is complex and counter-productive to the goal of creating an authentic unique identity for each authorized product. The complexity of creating the systems and processes to assure the accuracy and uniqueness of each number when printed on multiple production lines in multiple factories around the world, each day from year to year, would require a major diversion of resources. The bigger issue is that a printed number and/or barcode alone is the opposite of an authentic unique identifier. Without effective authentication technology in the security tag the number alone is as easily copied on purpose, or duplicated in error, as it is easily read by eye or scanned. When the same number or bar code can be read from similar looking items without authentication, the data associated with the identity loses its value. The product and provenance information can no longer be trusted.
What prevents the counterfeiter from attempting to copy one or two security tags and duplicating the same tags over-and-over again?
In time we may see this from counterfeiters with the highest capabilities. There are multiple safeguards against this. Duplicates are easily spotted by eye by simply checking more than one item and/or by duplicate queries in the system. Duplicate digital identities are flagged in the system to return the appropriate response when queried. The other overt, covert, and forensic features are also important for confirmation if this happens.
What if our product has such a high value the most advanced counterfeiter is willing to pay the price to try to copy each security tag individually?
In the most extreme case where each counterfeit is worth many thousands of dollars, it could be necessary to rely on the other overt, covert, and forensic features to carry out the enforcement efforts. In that case enforcement and prosecution are necessary. In all cases, regardless of the level of counterfeiting or fraud, the security tag technology and information system are the most cost-effective deterrents providing the tools and information for enforcement and prosecution. The technology alone does not prevent IP infringement. Enforcement and prosecution are a key part of all successful protection programs.
You’ll also have the support of our in-house design team.
Our design team consists of experts with a wide range of backgrounds, including the fashion and apparel field. They can provide original or off-the-shelf designs for hangtags, labels, packaging, badges, foils & holographic labels. OpSec is unique in being one of the few brand protection providers to offer this level of specialized expertise.
You’ll benefit from global expertise and continuous innovation.
With over 40 years’ experience and a staff of over 800 employees worldwide, OpSec draws on industry expertise that spans all aspects of global supply chains and retail channels. We are committed to continuous advancement of our technology platforms. We know the threats, understand the solutions, and can identify and fill the gaps in your brand protection program.
Online Solution FAQs
Set Up
What kind of training do we get?
Your dedicated CSM will work with you and your team on whatever training you require. We include a portal training in week 2 and ongoing training as necessary.
How much resource is needed on brand owner side to get up and running?
The resources needed from the brand owner are high at the beginning and taper off over time as our team become more independent and can act on your behalf. Your team will need to join kick-off calls, gather trademarks, approve enforcement templates, work through pilot success metrics if applicable, and make decisions regarding workflows for review, enforcing and reporting. Once the documentation is in place, the IP gathered and workflow agreed upon, the resourcing burden lessens.
What documents or materials does OpSec Security need to set up the solution?
We will require a copy of any trademarks you seek to enforce via external platforms. We will also require approval for emailed C&D templates. Additionally, we will require a LOA – letter of authorization, to be able to act on your behalf. If you have a partner program, we are monitoring we would like a copy of your partner guidelines and list of approved domains related to that partner program.
How long does setup take?
This will depend on the complexity of the brand owner’s scope and availability of your IP portfolio. Some platforms require very little or no documentation and can be operational right away, while others can take longer to be operational.
Services
How much resource is needed on the brand owner side on ongoing basis?
Ideally, we like to hold monthly meetings with the brand owner’s team. For larger brands or more complex projects, weekly meeting may be best. We also request someone from your team be available for email correspondence in a timely fashion for questions or issues. As a best practice – our most successful accounts have engaged clients who act as a partner with our team.
Can other departments and/or users be added later?
Definitely! We encourage multifunctional teams to take part in the brand protection effort. We have no limit on the number of users that can access our technology. Most of our best success come when other departments are involved, especially if there are multiple business problems being tackled
Can we run multiple programs (counterfeit, partner compliance) or does that increase cost?
This depends on the size of each business problem being addressed – in general, if analyst resources are limited, there will be some level of prioritization that will need to occur.
Is the time doing training and reports included in my allotted FTE time?
Training conducted by your CSM is complementary. FTE time is analyst time dedicated to analyzing your data, categorizing, and enforcing. If you require customized reporting, this is included in your FTE time as well.
Results
How soon until we can start taking down content?
This depends on your focus. Certain platforms can be up and running within a week with enforcements occurring as soon as all required documentation is received. However, before enforcing we want to make sure the client is comfortable and agrees with the actions that we take. While we could enforce on some infringements the first day, some form of client review is necessary in the early stages of the program.
What are the expected results based on other companies in my industry?
This is a highly variable answer; however, your team of brand protection professionals will have access to the experience and best practices gained from working with similar clients in your industry so results would be similar or greater than other companies in your peer group.
How do you detect phishing attacks?
Through various data feeds the OpSec technology can find attacks that have been distributed via email by harvesting links. The technology can identify likely phishing sites based on the site content.
How long does it take for a site to be blocked and removed?
Blocking generally happens in under one hour. Mitigation of classic phishing sites has a median shutdown time of 6 to 10 hours.