Back

Selinko

10 Questions to Ask When Evaluating Connected Product Platform

Eugenia Vitali


18 May 2026

Attachment Details Selinko-Trident-ACM-UI-UX

The connected product platform you choose today determines what your brand can do with product data for the next decade. The wrong platform does not just underperform, it embeds structural constraints that are costly, sometimes impossible, to reverse. These 10 questions give procurement, brand protection, and technology leaders the framework to tell the difference.

Why Platform Evaluation Needs a Structured Framework

Most connected product platform evaluations start in the wrong place. They focus on the consumer-facing tap experience, how beautiful the authentication page looks, how many post-purchase content features are available, whether the platform supports a loyalty integration. These things matter. But they are surface-level features that every credible platform can demonstrate in a sales presentation.

What is much harder to see in a demo, and what determines whether the platform delivers real commercial value at scale, is the infrastructure underneath. How the product identity is structured. Who governs the data. How the system behaves when a bottle of cognac allocated to Singapore appears in a scan in Lyon. Whether the platform can support EU Digital Product Passport compliance without building a separate system to do it.

The questions below are designed to surface those infrastructure decisions, not the features. They are organised from foundational to operational, and each includes specific follow-up questions to ask the vendor and warning signs to listen for in the response.

A useful pre-evaluation test: Before any platform demo, ask the vendor to explain in plain language how product identity is structured across your full product range, not for a single SKU pilot, but across categories, markets, and functions including compliance, supply chain, after-sales, and resale. The answer to this question alone tells you more about platform architecture than any feature demonstration.

Question 1: How is product identity structured and who controls it?

This is the most consequential question in the evaluation. A connected product platform is not primarily a consumer engagement tool or a QR code generator, it is a product identity infrastructure. How that identity is structured determines whether every subsequent capability, grey market detection, DPP compliance, resale authentication, AI-powered analytics, can be built on a unified foundation or requires separate systems for each function.

The distinction to understand is between a unified identity model — where one item-level identifier per product is governed centrally and used across compliance, supply chain, after-sales, resale, and engagement, and a siloed model, where each function or regulation introduces its own identifier, creating fragmented records that cannot be reconciled. Platforms that lock you into siloed identity embed the most expensive technical debt in the industry.

Ask the vendor:

  • Can one item-level identity support compliance, supply chain, consumer engagement, and resale without creating separate identifiers?
  • Who owns and controls the primary identity database, the brand or the platform provider?
  • If we move to a different platform in three years, can we export our complete product identity records with full scan history?
Warning sign: The vendor struggles to explain how their identity model works across more than one use case simultaneously, or the answer differs depending on whether you’re talking to the compliance team vs the marketing team.
Good answer: One item-level identifier per product, defined once at production, used across all functions. The brand owns the data and can export it fully at any point.

Question 2: Does the platform support multiple access technologies under one identity or does each technology create its own data silo?

Most sophisticated brand protection programmes ultimately deploy more than one physical identifier,  NFC for luxury goods, secure QR for high-volume lines, RFID for supply chain checkpoint scanning. The critical question is whether these technologies all point to the same unified product identity, or whether each one generates its own product reference and data structure.

When NFC, QR, and RFID each create separate identifiers for the same product, a consumer authentication via NFC cannot be correlated with a supply chain scan via RFID. The scan intelligence that powers grey market detection becomes impossible to generate because the data lives in separate, irreconcilable records. The platform should treat NFC, QR, and RFID as access layers to the same identity, not as separate product tracking systems.

Ask the vendor

  • If we deploy NFC for luxury lines and serialised QR for volume SKUs, do both point to the same product identity record?
  • Can we add a new access technology in the future without creating a new identifier or rebuilding the existing data structure?
  • How does the platform handle products that carry both NFC and QR — does the consumer tap and the supply chain scan connect to the same record?
Warning sign: The vendor’s NFC solution and QR solution are sold by different teams, run on different backends, or the vendor cannot clearly explain how the two data streams are unified.
Good answer: All access technologies, NFC, QR, RFID, are access layers to the same governed item-level identity. Adding or changing a technology does not require creating a new identifier or rebuilding data connections.

Question 3: What is the security architecture, specifically at the chip level and the backend validation level?

Security in connected product platforms is frequently discussed at the level of “encrypted NFC” without the specifics that determine whether that encryption is genuinely resistant to cloning or merely a marketing claim. The security of NFC-based authentication depends on two layers: the cryptographic implementation at the chip level, and the backend validation logic that processes each tap event.

At the chip level, the key question is whether the implementation uses a static identifier (which can be copied) or a cryptographic challenge-response protocol (where each tap generates a unique mathematically derived output using a private key that never leaves the chip). At the backend level, the question is whether duplicate scans, geographic anomalies, and velocity irregularities are detected in real time or reviewed manually in periodic reports.

Ask the vendor

  • Does the NFC implementation use cryptographic challenge-response (e.g. AES-128 or ECC), or does it rely on a static chip identifier?
  • How does the backend detect cloning attempts, what happens when the same chip identity is scanned simultaneously in two different locations?
  • What is the key management architecture where are private keys stored, and what happens to the security model if the platform’s backend is compromised?
Warning sign: The vendor describes their security as “encrypted” without being able to specify the cryptographic standard, key management approach, or duplicate detection mechanism at the backend.
Good answer: AES-128 or ECC challenge-response at the chip level. Private keys stored in secure hardware and never transmitted. Real-time duplicate detection at the backend with automated alerting, not periodic log review.

Question 4: How does the platform detect and surface grey market diversion?

Grey market diversion, genuine products sold outside authorised distribution channels, is one of the most commercially damaging and least visible threats facing premium brands. It is invisible to traditional brand protection methods because the product is authentic. Only item-level serialisation with geographic scan monitoring can detect it systematically.

The platform should not only flag individual anomalous scans, it should accumulate scan patterns across multiple events into diversion route maps that identify the source territory, transit path, and destination market. This requires the platform to store territory allocation data at the point of serialisation and correlate consumer scan locations against it in real time, not retrospectively in weekly reports.

Ask the vendor

  • At what point in the production process is territory allocation recorded for each unit, before it leaves the factory or at a later stage?
  • How quickly after a geographic anomaly occurs does the brand team receive an alert, real time, daily, or in a weekly report?
  • Can you show us an example of a diversion route map generated from actual scan data not a mock-up?
  • What evidence does the platform generate that would support a formal distributor conversation or legal enforcement action?
Warning sign: The platform flags individual anomalous scans but cannot map them into diversion routes or correlate them with specific distribution allocations. Grey market reporting is retrospective rather than real-time.
Good answer: Territory allocation recorded at serialisation. Real-time geographic anomaly alerts. Automatic route mapping from scan clusters. Timestamped, geolocated scan records exportable as evidence for enforcement.

Question 5: Who owns the data and what are the contractual terms around data portability?

Data ownership is the most frequently overlooked dimension of connected product platform evaluation, and the most commercially consequential. The scan intelligence generated by a connected product programme has compounding value: three years of behavioral data on where products are consumed, how often they are authenticated, and which geographies generate anomalous patterns is more valuable than one year. It is also irreplaceable, the data cannot be reconstructed after the fact if you switch platforms.

Platforms that control the primary identity database, restrict data export, or hold scan history under proprietary formats effectively hold the brand’s most valuable product intelligence as a vendor dependency. Brands must own their data fully, not as a contractual courtesy, but as a structural right enforced in the platform architecture.

Ask the vendor

  • Who owns the product identity records and scan event history, the brand or the platform?
  • What format is data exported in,  proprietary, or an open standard that any system can consume?
  • What happens to our product identity records and scan history if we terminate the contract?
  • Can we integrate our scan data directly into our own data warehouse or BI platform without using the vendor’s analytics interface?
Warning sign: The vendor’s contract requires data to remain on their platform, export is limited to summary reports rather than raw records, or the exit terms are vague about what happens to the brand’s scan history.
Good answer: The brand owns all product identity records and scan data in full. Complete export is available at any time in an open format. Termination provisions explicitly protect the brand’s access to its historical data.

Question 6: How does the platform support EU Digital Product Passport compliance and is it built into the same infrastructure or a separate system?

EU Digital Product Passport requirements are expanding across luxury, fashion, cosmetics, and electronics on a regulatory timeline that has already begun. Brands that build connected product infrastructure for commercial reasons authentication, grey market detection, consumer engagement should be generating the data that populates a DPP as a by-product of that infrastructure, not building a separate compliance system in addition to it.

The question to ask is not “does your platform support DPP?”  every vendor will say yes. The question is whether DPP compliance is delivered through the same item-level identity and lifecycle data that drives the commercial use cases, or whether it requires a parallel data collection and reporting system that the brand must maintain separately.

Ask the vendor

  • Is DPP data, materials, manufacturing origin, lifecycle events, captured through the same product identity infrastructure used for authentication and engagement?
  • Which specific DPP regulatory requirements (ESPR categories, data schema standards) does the platform currently support?
  • How does the platform handle DPP requirements that vary by product category or market, can the data model adapt without rebuilding the identity structure?
Warning sign: The vendor’s DPP offering is a separate module with its own data structure that needs to be connected to the authentication platform a classic indicator of siloed identity architecture.
Good answer: DPP data is captured through the same product lifecycle record used for authentication and engagement. Compliance is a reporting layer on top of existing data, not a new data collection system.

Question 7: How does the platform handle lifecycle identity does the product record persist through resale, ownership transfer, and secondary market transactions?

The secondary luxury market is worth hundreds of billions globally and growing faster than primary luxury. A connected product platform that delivers authentication at first sale but cannot support verified ownership transfer, resale provenance records, or new owner onboarding in the secondary market is a first-generation solution being sold as comprehensive infrastructure.

Lifecycle identity means the product’s digital record persists and accumulates through every ownership event not just the first sale. When a bag or a bottle changes hands, the new owner should be able to tap the product and access its complete history: manufacture origin, previous owners, service events, and every authentication interaction. The platform must support this continuity without requiring a new identifier or manual reconciliation when ownership transfers.

Ask the vendor

  • Does the product identity record persist through secondary market transactions without requiring re-registration or a new identifier?
  • How does ownership transfer work what does the seller initiate, what does the buyer confirm, and how long does the transfer take to process?
  • When a product is resold, does the new owner see the full provenance history or only the record from their ownership forward?
  • Can the platform integrate with brand-operated certified pre-owned programmes or third-party resale platforms?
Warning sign: The platform treats the product record as closed after first sale. Resale support requires a separate module or a new registration flow that creates a break in the provenance chain.
Good answer: The same item-level identity persists through every ownership transfer. Transfer is initiated by the seller, confirmed by the buyer tapping the physical product, and completes within seconds with the full provenance chain maintained.

Question 8: How does the platform integrate with existing core systems ERP, supply chain, CRM, and e-commerce?

A connected product platform that operates in isolation from the brand’s existing operational systems is a marketing tool, not an operational infrastructure investment. The commercial value of item-level product data, grey market alerts triggering distributor action, scan velocity informing replenishment decisions, ownership data enriching CRM profiles only materialises when the platform’s data flows into the systems where those decisions are actually made.

Integration quality is also a leading indicator of platform architecture quality. Platforms built on open, well-documented APIs that the brand controls are structurally different from platforms that require custom integrations negotiated case by case. The former scales; the latter accumulates technical debt.

Ask the vendor

  • Does the platform offer open, well-documented REST APIs that the brand’s own development team can use directly?
  • Can scan intelligence and alert data be pushed automatically to our existing BI platform, ERP, or supply chain management system?
  • What integrations exist out of the box and which require custom development that the brand must scope and fund?
  • How does the platform handle real-time data delivery at scale what is the latency between a scan event and its availability in our downstream systems?
Warning sign: Integration is described as “possible” but requires custom development scoped and contracted separately. The vendor’s platform is designed as a destination for data, not a supplier of data to other systems.
Good answer: Open, documented APIs available to the brand’s development team. Pre-built connectors for major ERP and CRM platforms. Real-time webhook delivery for scan events. No lock-in to the vendor’s analytics interface.

Question 9: How is the platform deployed in manufacturing and what is the true implementation timeline and operational complexity?

Implementation complexity is consistently underestimated in connected product platform evaluations, particularly by vendors whose demonstrations involve pre-serialised samples and staging environments that bear no resemblance to a real production line. The questions that matter are: what changes at the packaging or manufacturing level, who is responsible for NFC chip embedding or QR code serialisation, and what is the realistic timeline from contract to first serialised products in market.

The distinction between a platform that integrates with existing packaging supplier workflows and one that requires new equipment, new suppliers, or significant production line changes is commercially significant particularly for brands managing multiple product lines across multiple manufacturing locations.

Ask the vendor

  • Who handles NFC chip embedding does the platform work with our existing packaging suppliers or require new ones?
  • What changes are required at our production facilities, and what is the realistic timeline from signed contract to first serialised products shipping?
  • Can you provide a reference from a brand with comparable product complexity and manufacturing geography who has completed implementation?
  • What does a pilot programme look like structurally and does the pilot identity architecture match what we would use at full scale?
Warning sign: The vendor’s pilot proposal uses a temporary identity model or separate data structure that will not connect to the full-scale system. A pilot that cannot be extended to full deployment without rebuilding means starting over.
Good answer: The pilot uses the same identity architecture as the full deployment. Integration with existing packaging suppliers is standard. A realistic 8–16 week timeline to first serialised product, with references available from comparable programmes.

Question 10: What does the platform's roadmap look like and is the vendor's business model aligned with the brand's long-term interests?

A connected product platform is not a one-time deployment it is an ongoing infrastructure relationship. The platform’s roadmap determines what capabilities will be available in two and five years: AI-powered anomaly detection, expanded DPP compliance categories, deeper resale ecosystem integrations, new geographic market support. The vendor’s business model determines whether their commercial interests are aligned with your brand’s control over its own product identity.

Vendors whose revenue model depends on the brand’s data remaining on their platform, rather than on the brand’s continued use of a platform that genuinely serves its interests, create misaligned incentives that manifest in data portability restrictions, proprietary formats, and contractual terms that make switching costly. Evaluate the vendor’s alignment as carefully as their feature set.

Ask the vendor

  • Where is AI-powered scan intelligence on the product roadmap and what data foundations does it require that we should be building today?
  • How does the platform handle regulatory changes if new DPP categories are added, is that covered in existing contracts or a new commercial negotiation?
  • How does the vendor’s pricing model scale with programme growth per unit, per scan, per market, or a platform fee?
  • What is the vendor’s ownership structure and financial stability and what happens to our data and programme continuity if the vendor is acquired or ceases to operate?
Warning sign: The vendor cannot share a concrete product roadmap, pricing scales in ways that create disincentives to grow the programme, or data portability terms are conditional on contract renewal.
Good answer: A transparent roadmap with committed timelines. Pricing that scales proportionally and predictably. Data portability that is unconditional and fully documented in the contract. Financial stability that can be independently verified.

A Quick Evaluation Scorecard

After completing vendor conversations using the questions above, use this scorecard to compare platforms across the dimensions that matter most for long-term control and commercial value.

Connected Product Platform Evaluation Key Dimensions

  1. Unified item-level identity across all functions
    Non-negotiable
  2. Multiple access technologies under one identity model
    Critical
  3. Cryptographic chip security with real-time backend validation
    Non-negotiable
  4. Real-time grey market detection with route mapping
    Critical
  5. Full brand data ownership and unconditional portability
    Non-negotiable
  6. DPP compliance through existing infrastructure not a separate module
    Critical
  7. Lifecycle identity persisting through resale and ownership transfer
    Important
  8. Open APIs and ERP/CRM integration without custom development
    Important
  9. Pilot architecture matching full-scale deployment identity model
    Critical
  10. Vendor roadmap, pricing transparency, and financial stability
    Important

The non-negotiables determine the ceiling of what is possible. A platform that fails on unified identity, data ownership, or cryptographic security does not fail on those dimensions alone it limits every capability that depends on them: grey market intelligence, DPP compliance, resale authentication, and AI-powered analytics. Evaluate the non-negotiables first, and evaluate them rigorously.

Explore Selinko's Solution

Selinko’s connected product platform is built on unified item-level identity, full brand data ownership, and cryptographic NFC security, deployed across luxury, spirits, cosmetics, and premium goods brands globally.

Get in Touch

Blog

Discover more articles

All our articles