Back

Product Authentication

How to Make the Business Case for Product Authentication 

Eugenia Vitali


11 May 2026

authentication

Product authentication is no longer just a brand protection decision,  it is a revenue, data, and compliance investment. Here is the comprehensive internal pitch guide for brand protection teams, marketing leaders, and C-suite executives making the case for digital authentication in 2026.

Why the Internal Case for Authentication Is Harder Than It Should Be

Product authentication investments are difficult to approve internally for a consistent set of reasons: the benefits are partially defensive and therefore harder to quantify than offensive revenue investments; the cost sits clearly in one budget while the value accrues across several; and the problem it solves, counterfeiting, grey market leakage, distribution compromise, is often underestimated because it is largely invisible without the very data infrastructure the investment would create.

This creates a circular argument that has blocked authentication investment at many brands: you cannot fully quantify the problem without the data that authentication generates, but you need the quantified problem to justify the authentication investment. Breaking that loop requires a different approach to the business case, one that frames authentication not as a cost of protection but as a return-generating infrastructure investment with multiple value streams.

The framing shift that changes the conversation: Product authentication is not an expense to protect existing revenue. It is an infrastructure investment that simultaneously recovers lost revenue, generates new commercial value, reduces enforcement costs, and satisfies regulatory obligations, through the same per-unit cost. When the case is made on all four dimensions simultaneously, the approval threshold changes entirely.

The Four Revenue and Value Streams Authentication Creates

A well-structured authentication business case presents value across four distinct streams, each material in its own right, and each addressable to a different internal stakeholder. The total ROI is the sum of all four, not any single one.

  1. Revenue RecoveryCounterfeit sales and grey market diversion represent direct, quantifiable revenue losses. Authentication generates the data to detect, map, and address both, returning purchases to authorised channels where the brand earns full margin. Even a modest reduction in grey market leakage typically generates returns that exceed the authentication infrastructure cost in the first year.
  2. Cost AvoidanceLegal enforcement, market audit programmes, manual investigation, and customs cooperation are expensive and time-intensive without data. Authentication-generated scan intelligence reduces the cost of each enforcement action by replacing guesswork with evidence, and enables proactive intervention before legal action is required.
  3. Commercial Value GeneratedFirst-party scan data, post-purchase consumer engagement, new owner acquisition through resale, and loyalty programme enrichment are commercial returns that the authentication infrastructure delivers beyond brand protection. These returns belong to the marketing and CX budget conversation, not the brand protection one.
  4. Compliance ValueEU Digital Product Passport requirements, CSDDD supply chain due diligence obligations, and pharmaceutical serialization mandates are creating regulatory compliance costs that authentication infrastructure satisfies automatically. The regulatory obligation is coming regardless, authentication makes compliance a by-product rather than a separate investment.

The Pitch for Each Internal Stakeholder

The CFO Pitch: Revenue Recovery and Compliance Risk
Lead with numbers, quantify the problem, anchor on avoidable cost

CFOs respond to quantified revenue impact and avoided cost. The authentication case for finance requires translating the brand protection problem into financial terms, which the absence of authentication data makes difficult, but not impossible. Start with what is publicly known about the category-level counterfeit and grey market exposure, then apply conservative estimates to the brand’s own distribution and revenue profile.

The core argument: “We estimate [X]% of our product reaching market in [territory] is either counterfeit or grey market diverted. At our average selling price and margin, that represents approximately €[Y] in lost authorised revenue annually. Authentication infrastructure costs €[Z] per unit across our [volume] units — a total of €[W] per year. Conservative grey market recovery of 20% on detected diversion routes returns the infrastructure cost within [timeframe]. That calculation excludes regulatory compliance value, which avoids potential DPP non-compliance penalties of up to [regulatory figure] per violation.”

The Brand Protection & Legal Pitch: Evidence and Enforcement Efficiency
Lead with intelligence quality, enforcement speed, and grey market visibility

Brand protection and legal teams understand the problem intimately — but they often lack the data to act on it at the speed and scale needed. The authentication pitch for this audience is about transforming their enforcement capability from reactive and evidence-poor to proactive and evidence-rich.

The core argument: “Right now, our brand protection programme discovers counterfeiting and grey market activity weeks or months after it develops — through consumer complaints, retailer reports, and periodic market audits. We then pursue enforcement with anecdotal evidence that is expensive to substantiate legally. Authentication gives us real-time scan data that maps counterfeit clusters and grey market routes as they emerge, with timestamped, geolocated scan records that are admissible as evidence. Our enforcement actions become faster, more targeted, and significantly less expensive per case. We stop reacting and start preventing.”

The CMO & Marketing Pitch: First-Party Data and Consumer Engagement
Lead with data ownership, engagement channel, and loyalty value

Marketing leaders are navigating the end of third-party cookie data, rising customer acquisition costs, and growing pressure to demonstrate direct consumer relationships. Authentication infrastructure addresses all three,  but the pitch needs to be made in the language of marketing value, not brand protection.

The core argument: “Every NFC tap is a direct, frictionless consumer interaction — owned entirely by us, not mediated by a retailer or platform. Each tap generates first-party behavioral data: location, frequency, device, and ownership lifecycle patterns tied to specific products. That data is more precise and more actionable than anything we can buy from third parties. Beyond data, authentication turns every product into a post-purchase engagement channel, delivering personalised content, loyalty rewards, and resale services that extend the customer relationship beyond the point of sale. And every resale tap is a new customer acquired at zero acquisition cost.”

The Operations & Supply Chain Pitch: Visibility and Compliance
Lead with supply chain intelligence, DPP readiness, and distribution control

Operations and supply chain leaders care about visibility, control, and regulatory readiness. Authentication infrastructure delivers all three through the same serialization and scan monitoring system that protects against counterfeiting, making it an operational asset as much as a brand protection tool.

The core argument: “Item-level serialization gives us real-time visibility into where every unit in our distribution network actually is — not just where our logistics records say it should be. We detect distribution deviations, track inventory discrepancies, and identify supply chain leakage points before they become commercial or legal problems. The same infrastructure generates the product lifecycle data required for EU Digital Product Passport compliance — which we will need to deliver by [regulatory deadline] regardless of whether we deploy authentication. Building it now for commercial value is significantly more efficient than building it under regulatory deadline pressure.”

Answering the Three Objections That Kill Most Authentication Proposals

Most internal authentication proposals encounter three consistent objections. Each has a direct, data-grounded answer, but the answer needs to be prepared before the meeting, not improvised during it.

  1. Objection 01:  “The per-unit cost is too high for our margin structure.”

    The Direct Answer: The per-unit cost of NFC authentication for a premium product is typically between €0.20 and €0.80. For a product priced at €300, that is a cost of 0.07–0.27% of retail price,  less than the cost of the tissue paper in the dust bag. The question is not whether the cost is high: it is whether the cost is proportionate to the value at risk. For a product category where grey market diversion alone represents 8–15% of distribution volume, the cost of not authenticating is measured in millions. The cost of authenticating is measured in cents per unit.
    The reframe: What is the current cost of one successful grey market diversion route, measured in margin loss across the units flowing through it annually? That number is almost certainly larger than the annual authentication infrastructure cost for the same product range.

  2. Objection 02: “We already have holograms and security labels, we’re already protected.”

    The Direct Answer: Holograms tell consumers a product might be genuine. They tell the brand nothing no scan data, no geographic intelligence, no anomaly detection, no grey market visibility. A hologram on a diverted product in an unauthorised market looks identical to a hologram on an authorised sale in the right channel. The brand cannot distinguish them, cannot count them, and cannot act on them. Holograms are a consumer-facing trust signal. Digital authentication is an intelligence system. The question is not whether holograms have value, it is whether a passive label is an adequate substitute for real-time data on where your products are and how they are being sold.
    The test: Can your current hologram tell you how many of last season’s units are currently being sold in a market they were not allocated to? If not, your current protection is not protecting you from the most commercially damaging form of brand leakage.

  3. Objection 03: “Implementation is too complex and will disrupt our manufacturing process.”

    The Direct Answer: Modern authentication platforms are designed to integrate with existing manufacturing and packaging workflows without requiring facility redesign or production line changes. NFC chip embedding is typically handled at the packaging stage by the brand’s existing packaging supplier, it is a materials specification change, not a process change. Serialized QR codes can be added at any point in the production or packaging sequence with no equipment modification. Cloud backend integration is managed by the platform provider, not the brand’s internal IT team. A pilot programme across one product line or one market can typically be deployed in 8–16 weeks,  generating data that validates the business case before full-scale rollout.
    The pilot approach: Propose a single-SKU or single-territory pilot with a defined 6-month evaluation period. The pilot data, scan volumes, geographic distribution, anomaly flags,  provides the evidence base for a full deployment decision, and typically makes the business case more compellingly than any projection could.

A Implementation Timeline to Include in Your Proposal

Internal proposals fail when they feel open-ended. Including a phased implementation timeline with clear milestones gives decision-makers a concrete picture of what approval actually means,  and makes the ask feel manageable rather than transformational.

  • Scoping & supplier briefing: Define pilot scope – one SKU, one product line, or one territory. Brief packaging and manufacturing suppliers on NFC specification or QR serialization requirements. Select and onboard authentication platform provider. No production changes required at this stage.
  • Pilot production run: First serialized units produced with NFC chips or dynamic QR codes embedded or applied. Cloud backend configured with product identity records, distribution territory allocations, and scan intelligence parameters. Consumer-facing authentication experience designed and tested.
  • Pilot launch and data collection: Pilot units enter distribution. Scan events begin generating data consumer authentications, distributor checkpoint scans, geographic anomalies. Brand intelligence dashboard goes live. First grey market and anomaly signals emerge within weeks of distribution.
  • Pilot review and full rollout decision: Six months of scan data provides the evidence base for a full deployment decision, with real grey market intelligence, real consumer engagement data, and a quantified picture of distribution integrity. The decision to scale is made on evidence, not projection.
  • Full range deployment: Roll out across remaining product lines and territories, using the pilot learnings to optimise the consumer experience, intelligence parameters, and supplier briefing process. The infrastructure built for the pilot scales to the full catalogue without rebuilding the foundation.

The One-Page Business Case Summary

If you need to distil the entire argument into a format that can be read in two minutes before a board decision, here are the six points that carry the most weight.

Product Authentication: The Business Case at a Glance

The Problem

Example: Grey market diversion and counterfeiting are costing us an estimated [X]% of authorised distribution volume annually,  but we cannot quantify it precisely because we lack the data infrastructure to see it.

The Investment

Item-level NFC authentication at €0.20–0.80 per unit a fraction of a percent of product value. One infrastructure decision that creates four simultaneous return streams.

The Return

Grey market revenue recovery, enforcement cost reduction, first-party data commercial value, and DPP regulatory compliance all from the same per-unit investment. Conservative first-year ROI exceeds infrastructure cost for most premium product categories.

The Regulatory Pressure

EU Digital Product Passport requirements are mandatory for our category by [date]. Authentication infrastructure delivers compliance as a by-product. The alternative is building the same infrastructure under regulatory deadline pressure, without the commercial return.

The Risk of Inaction

Every year without authentication is a year of grey market data we cannot see, counterfeit exposure we cannot quantify, and regulatory compliance infrastructure we are not building. The problem does not pause while we deliberate.

The Proposal

Approve a single-SKU pilot with a 6-month evaluation period and a defined decision point for full rollout. The pilot generates real data that makes the full business case, removing projection risk from the approval decision.

Ready to Build Your Authentication Business Case?

Selinko works with brand protection, marketing, and operations teams to scope authentication programmes, model the ROI for specific product categories, and design pilot programmes that generate the data your internal approval process needs.

Get in Touch

Blog

Discover more articles

All our articles