DOWNLOAD REPORTDOWNLOAD

Speakers : Jeff Sauro, Tim Bosenick, Lee Cooper    

5 consejos para proteger a tu marca

contra las falsificaciones

BRAND PROTECTION
EVASION TECHNIQUES &
KEYWORD CYCLES

REPORT

REPORT

Who's this report for

What's inside?

About Red Points

In Red Points we specialise in Intellectual Property protection and defend brands online, using a combination of our expert legal team, experienced analysts and our proprietary technology. Our technology is the core of our protection solution, it employs machine learning algorithms that scan the internet and identify all IP infringements. We then validate and remove infringements, all the while reporting the details of each infringement in real time for our clients. 

I WANT TO READ

Copyright © 2017 Red Points Solutions | Privacy Policy

In Red Points we specialise in Intellectual Property protection and defend brands online, using a combination of our expert legal team, experienced analysts and our proprietary technology. Our technology is the core of our protection solution, it employs machine learning algorithms that scan the internet and identify all IP infringements. We then validate and remove infringements, all the while reporting the details of each infringement in real time for our clients. 

 

About Red Points

About the Speakers

What's inside

The main objective of this webinar organized by Red Points is to describe actionable tactics that businesses of all sizes, including small and medium ones, can use when scaling their brands from local markets to a worldwide audience.

The tips will be mainly drawn from Karen Post’s professional experience, who has been working for more than 30 year in Branding and Communications with organizations that range from start-ups to Fortune 500 companies such as ACNielsen, Pepsi and Procter & Gamble.

The webinar will also count with the participation of Toni Pérez, VP of Marketing and Product at Red Points, who will be talking about the most common risks in brand management from the Intellectual Property Rights perspective.

Here are some of the topics that will be covered:

  • Building and communicating your brand, with real examples.
  • Differences and similarities between local and global branding.
  • Promoting your reputation among opinion makers.
  • How to protect your business against brand abuse.

Beating counterfeiters at their own game

DOWNLOAD REPORT

July 11th, 9:00 AM PST. 12 PM EST

BRAND PROTECTION EVASION TECHNIQUES & KEYWORD CYCLES

FEATURED SPEAKER 
Maysa Razav, Head of Anti Counterfeit for INTA

Who's this report for?

The constant race between brands and counterfeiters has brought important developments in IP security. But as online brand protection becomes more and more efficient, counterfeiters are changing their tactics to reach consumers. In this report, we investigate the evasion techniques adopted by counterfeiters. 

Brands now use protection services which monitor products using their brand name and are able to identify fake products on e-commerce sites. This has become a problem for counterfeiters as they are having their product listings removed before they can sell a significant amount. 

Using Red Points technology, we were able to track the lifecycle of keywords and uncover a range of tactics employed in order to hide the illicit nature of fake-product listings.

Read the full research here and get more insights for your business.


We look into the measures counterfeiters are taking to evade classic and smart brand protection tactics based on technology. 

This research is aimed at brand owners concerned about protecting their businesses from online infringers.  

In this document we cover:

 · Key findings 
· Simple keywords
· Language variations 
· Alternative keywords

· Generic descriptions

We look into the measures counterfeiters are taking to evade classic and smart brand protection tactics based on technology.

In this document we cover: 

· Key findings
· Simple keywords 
· Language variations
· Alternative keywords 
· Generic descriptions