Optaglio Consulting Practice

We help to protect human identities, state documents, and premium brands.

OPTAGLIO is a company with more than 20-year experience and hundreds of successful projects, a global leader in technology and innovation research. We have assembled unrivaled experience, supplemented it with security management experience and embodied it into a consistent methodology. Therefore our consultants have been respected partners for a range of tasks from high-level protection strategy through technology recommendation up to tender organization and project management.

IDENTITY PROTECTION

Governments around the world face different kinds of challenges:

  • -          Identifying and authenticating people on the territory of the state, especially crossing borders or entering classified zones.
  • -          Ensuring that all citizens can prove their identity
  • -          Guaranteeing that personal documents, issued by them, are not a source of false identities.

Falsifiers are more and more sophisticated and technologically advanced. Their attacks are more and more frequent and dangerous. On the other hand, governments and their suppliers can benefit from bullet-proof technologies. However, it is harder and harder to select the right technologies and build a consistent solution for a reasonable money. It is especially critical that no weak points attracting attackers are left.

"It is especially critical that no weak points attracting attackers are left."

We help our clients to answer questions, such as the following:

  • -          What kinds of attacks on identities can be expected?
  • -          What are the weak points in processes?
  • -          How to ensure compliance with all relevant standards?
  • -          What combination of material and anti-counterfeit technologies is optimal for particular ID card, passport, driving license etc.?
  • -          The right definition of personal document issuing process.
  • -          What accompany activities, such as information campaigns, need to be done?

DOCUMENTS, STAMPS AND SECURITIES PROTECTION

While protecting tax revenues, two basic strategies can be applied. Governments can build „big brother systems,“ implement extensive surveillance, face protests, and legal actions. The other way insists in issuing documents that simply cannot be counterfeited – banknotes, highway vignettes, stamps, tax stamps, coupons, etc.

In real life, measures from both sides need to be used. However, the more resistant are documents, the less obtrusive can be surveillance systems, and the lower are total costs. Moreover, creating full trust into state documents is similarly important as properly working justice system.

"...the more resistant are documents, the less obtrusive can be surveillance systems."

Unlimited resources can be spent on technology and complicated production. It is important to find the right solution to cover risks for an acceptable budget.

We help our clients to answer questions, such as the following:

  • -     What processes and issues should be covered by security documents /labels /stamps.
  • -     How likely counterfeit attempts can be expected. What technologies can be used by the falsifiers?
  • -     What combination of security elements should be used to protect state documents?
  • -     Definition of processes for security elements distribution, application, and check.
  • -     What are criteria for technology providers selection?

BRAND PROTECTION

Nobody wants to spend money on building a brand that will be used by fakes producers. We believe that anti-counterfeit features and aspects should be applied along a product lifecycle, from drafting basic idea through design and production to promotion and distribution. With a smart strategy, anti-counterfeit protection is rather a competitive benefit than extra cost, especially when consistent approach across markets and product lines is implemented.

With a smart strategy, anti-counterfeit protection is rather a competitive benefit than extra cost.

We help our clients to answer questions, such as the following:

  • What si the most suitable set of anti-counterfeit technologies for particular product portfolio.
  • How the synergy between our graphic design and visual options of anti-counterfeit technologies can be me created.
  • Implementing of protection into a process of product design.
  • What kinds of attacks on security elements can be expected? What technologies will be used by falsifiers?
  • What security rules should be applied in a production process.
  • Calculating business case for anti-counterfeit protection.
  • Implementation of forensic elements.
  • A connection between anti-counterfeit protection and legal processes.