Rolls out solution aimed at bridging the gap between supply chain security and business effectiveness
- Secure Supply Chain: Vulnerability assessment, strategic planning and implementation of new processes and technologies for in-transit shipment security, perimeter security, facility access and border crossings, port security, worker and visitor credentialization, identity management, and data integrity and sharing.
- In-Transit Visibility: Supply chain optimization starts with tracking and tracing — the ability to know what's where at all times and where it has been — and virtual warehousing, which extends visibility beyond organizational walls and allows near real-time in-transit inventory allocation. This also includes data management and analytics for real-time exception handling, automated triggers and early-warning notifications.
- Anti-Counterfeiting: Prevention (stopping counterfeiting before it happens), detection (finding counterfeits already introduced into the supply chain), and response (triggers and actions when threats are detected or suspected).
- Asset Tracking: Effective management and utilization of assets requires visibility into asset location.
- Compliance Management: Changing regulations and big buyer mandates for RFID adoption and vendor performance management have made compliance a top priority, along with international trade management and security.
- Assessment and Planning: Value assessment and business case development, RFID strategy, pilot design, technical design, and risk and business continuity assessment.
- Implementation: Design and deployment of track and trace, or RFID-based systems and networks. Implementation emphasizes business process change to help ensure and maximize benefits.
- Infrastructure Outsourcing: Full management of computing and network technology for maximum operational efficiency, with tight IT security to provide data privacy and integrity.