Protection and authentication can be performed explicitly or as part of a client engagement. The extension, integration of new technologies, integration of third-party manufacturers or integration with other systems is easily possible. This allows protection to be maintained as a continuous process. So you can always be one step ahead of counterfeiters.
The acquired data have standard evaluations and serve as a basis for decision-making for subsequent measures. This data can be used for evidence in the preparation of legal cases.