who’s behind your high priority infringement? · complimentary educational events • contact us...

Post on 22-Aug-2020

0 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

© 2015 MarkMonitor Inc. All rights reserved.

Who’s Behind Your

High Priority Infringement?

Connecting the Dots with Investigative Reports

Brittany Shaw

Brand Protection Consultant

Nancy Merritt

Global Relationship Manager

Agenda

Big Data & the Actionable Intelligence Cycle

Network Intelligence Technology

The Investigation Process

Investigative Report Examples & Case Studies

Overcoming Enforcement Barriers

Key Takeaways

Big Data: Where to Start?

Actionable Intelligence:

4 | Confidential

Purpose-Built AntiCounterfeiting Technology

Classification Applies unique multi-factor algorithms

Deep Detection Captures key values

Values extracted from websites

Visible content on site

Non-visible content

External associations to website

Rogue Site Confirmed

Industry-centric classification

Compares legit sites against suspected sites

Confirms infringement

Confirmation of rogue site

v.s

Compare

Five Operators are Essentially Responsible for 60% of Rogue Sites

Network Intelligence Clustering

Network # of Sites Monthly Sessions

Network 1 7,894 1,208,550

Network 2 936 41,550

Network 3 749 91,080

Network 4 507 18,510

Network 5 373 37,350

Data Collection Analysis Investigative Report Investigation

Rogue site

networking,

shipping data,

business

registrations,

online profiles,

online marketplace

behavior

Team of experts

& data-driven

recommendations

Supporting

evidence for

worst offenders

Raids, arrests,

prosecution,

etc.

Expedite via MM

agency relationships

The Investigation Process

Full insight into the behaviors

and relationships of people

operating the network behind

your infringement.

Connecting the Online Dots to the Physical World

Investigative Report

Enforcement Barriers

Defense is Critical, yet Constantly Playing Defense Leads to Fatigue

Protect Brand Identity

Defense

Immediately address visible

infringement online

Search engine delisting

DMCA notices

Consumer protection & education

Suppress infringement on a daily basis

MarkMonitor team of experts

To Win Against Counterfeiters, Brands Must Play Defense AND Offense

Target Infringement at the Source

Offense

Targeted and strategic

approaches leading to:

Civil Suits

Law Enforcement

Counterfeit Network Disruption o Money

o Production

o Distribution

Rogue Website Litigation

Key Takeaways: Tangible ROI

Focused investigations with impactful results

Fewer test buys and lower costs

Less warranty center complaints

Increased online traffic to brand site or affiliates

Track progress and increase efficacy

Measurable

Outcomes

Leveraging

Intelligence & Relationships

Thank You!

For information on MarkMonitor solutions, services and

complimentary educational events

• Contact us via email:

field.marketing@markmonitor.com

• Visit our website at:

www.markmonitor.com

• Contact us via phone:

US: 1 (800) 745 9229

Europe: +44 (0) 203 206 2220

top related