SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
www.6DCP.com
FOOD SAFETY SOLUTION
About Us
Six Degrees Counterfeit Prevention, LLC
(6DCP) is globally licensed by
CryptoCodex LTD. to market and distribute
MDLE (Micro Database Less
Encapsulation), the most effective security
solution for detecting superfluous, falsified,
or adulterated products, for detecting
lost/stolen/diverted goods, and is track &
trace ready to meet worldwide regulation.
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITYSix Degrees Counterfeit Prevention, LLC. | www.6DCP.com
COUNTERFEIT PROTECTION
GREY MARKET DETECTION
TRACK & TRACE READY
BRAND LOYALTY
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
SCAN
AUTHENTICATE
Estimated $1.7
trillion industry in
2009
Estimated to
destroy 10% of top
line revenue
Rising 15.6%
annually
http://www.netnames.com/blog/
wp-
content/uploads/2015/10/NetNa
mes-Counterfeiting-Report-
2015_REVISEDFINAL.pdf
A Global Pandemic
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
$1.7
$2.0
$2.3
$2.6
$3.0
$3.5
2009 2010 2011 2012 2013 2014
Counterfeit Industry: In Trillions $USD
http://www.iacc.org/resources/about/statistics
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Nineteen people face charges over the
“painted” olives, including the use of
banned additives and planning to sell edible
goods containing dangerous substances,
the forestry police said on Wednesday.
Thousands of tonnes of foreign oil
falsely labelled as Italian had also been sold
in the US and Japan, police said, raising
fears that counterfeits could damage the
reputation of Italian food. Producers rely on
a perception of luxury to sell at higher
prices abroad.
http://www.theguardian.com/world/2016/feb/03/green-
olives-painted-copper-sulphate-seized-italian-police
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
http://www.italymagazine.com/news/production-fake-
parmesan-cheese-exceeds-real-parmigiano-2014
10001100111101010010110001100110
01111010100100111001111010100100
11000110011110101001011011010100
11010100100110001100111101010010
11001100111011001100111010100100
11000110011110101001011011010100
00011001111010100100011001111010
10010110001100110011110101001001
11001111010100100111011011010100
10001100111101010010110001100110
01111010100100111001111010100100
11000110011110101001011011010100
11010100100110001100111101010010
11001100111011001100111010100100
11000110011110101001011011010100
00011001111010100100011001111010
10010110001100110011110101001001
11001111010100100111011011010100
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
THE SOLUTION: MDLE
PROTECTING THE MOST IMPORTANT INFORMATION ASSETS
What is MDLE?
MDLE is a military grade and patented
process for encrypting and encapsulating
sensitive information otherwise stored in a
database, in cost effective data carriers
such as 2D barcodes. Technology
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Compatible with All Production Environments
Encrypted 2D barcode (database record) is sent to the production line printer, packaging company, other.
MDLE Encryption
Server
Database
ERP
MDLE Encrypted
2D Barcode
SECURE OFFLINE. Disconnected from Internet
Production Line Printer
Packaging/Labelling ConverterEncryption
Server
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
MDLE Label
*
*
*Provided by 3rd Party
MDLE Supports Aggregation
PRODUCT
PRODUCT
PRODUCT
PRODUCT
PRODUCT
PRODUCT
PRODUCT
PRODUCT
PRODUCT
PRODUCT
PRODUCT
PRODUCT
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
MDLE Supports Secure Track & Trace*
PROD
UCT
PROD
UCT
PROD
UCT
PROD
UCT
PROD
UCT
PROD
UCT
PROD
UCT
PROD
UCT
PROD
UCT
PROD
UCT
PROD
UCT
PROD
UCT
Track & Trace Database
Supply Chain Security | Secure Serialization | Compliant with all Global Standards
* MDLE is a security module that integrates into existing ERP and Track & Trace Software
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
MILLION EYES INSPECTORS
Genuine Results
Possible Counterfeit
GLOBAL SURVEILLANCE | DETECTION | MARKETING
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
MDLE Log File
Inspectors obtain real time
product status. If an authority
figure triggered an alert, the
message will display when the
MDLE secure barcode is
scanned.
Inspectors can access an
additional layer of information not
visible to the general public.
Inspectors obtain real time
activity reports and mapping
capabilities to monitor the supply
chain.
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Inspector Access
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Product Status
Consumer Alerts
Consumer Engagement
MDLE Supports Brand Loyalty Programs
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
USER
AUTHENTICATES
LABEL AND RECEIVES
AN INCENTIVE, i.e.
COUPON
USER SHARES
SECURE COUPON
ON SOCIAL
NETWORK
DATA IS LOGGED
AND CAN BE USED
TO DEVELOP
INNOVATIVE
MARKETING
OPPORTUNITIES
Brand Ambassadors can share incentives/coupons on social networks with all
activity being traceable back to the original user.
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Encrypts an entire database record
into a 2D barcode or other data
carrier
Decentralizes sensitive information and
eliminates need for a central database
Seamless integration into existing ERP
and production environments
Low barrier to entry
“Defining drop shipments is an important issue. There are novel low cost methods that guarantee
product authentication as pennies per unit that cannot be reverse engineered. Check out
www.6dcp.com/track-and-trace”......“While I did not work with Privacy Inside (now Cryptocodex) on this
application, I did a preliminary analysis of their merging barcodes with PHR and found this
approach a strong audit tool for counterfeit commercial goods” – Andre Szykier, Chief Scientist at
Aegis Health Security
“Simple is always better ... by elimination of the perceived complexity in the authentication world
6DCP products could be a pivot point that will help achieve a more reasonable following.” – Michael
Agee (RIP), Brand Protection Specialist
“Having come from a solution provider that used encryption based technologies for serialization, I was
well aware of your company and knew the respect you have garnered for your technology.
However, as I have come to know more about it through our discussions and demonstrations, I am
simply overwhelmed by the strength of your product. You are able to cover the three central
tenets of brand protection in the most forceful way possible – security, scalability, and
performance. – Dr. Avi Chaudhuri
What the Experts Say About Us
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
01100110011110101001001100011001
11101010010110011001111010100100
11000110011110101001011011010100
10001100111101010010110001100110
01111010100100111001111010100100
11000110011110101001011011010100
11010100100110001100111101010010
11001100111011001100111010100100
11000110011110101001011011010100
01100110011110101001001100011001
11101010010110011001111010100100
11000110011110101001011011010100
10001100111101010010110001100110
01111010100100111001111010100100
11000110011110101001011011010100
11010100100110001100111101010010
11001100111011001100111010100100
11000110011110101001011011010100
TECHNICAL SPECIFICATIONS
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
011001100111101010010011000110011110101001011001
100111101010010011000110011110101001011011010100
100011001111010100101100011001100111101010010011
100111101010010011000110011110101001011011010100
110101001001100011001111010100101100110011101100
110011101010010011000110011110101001011011010100
000110011110101001000110011110101001011000110011
001111010100100111001111010100100111011011010100
Patented encryption method that eliminates need to store sensitive information in an
online database.
Encryption Key is truly chaotic.
Based on a innovative and patented technology called Pure Human Randomization, or
PHR.
PHR is protected against Rainbow Crack, Dictionary Attack, Cryptanalysis and Brute
Force.
Military Grade Encryption
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
011001100111101010010011000110011110101001011001
100111101010010011000110011110101001011011010100
100011001111010100101100011001100111101010010011
100111101010010011000110011110101001011011010100
110101001001100011001111010100101100110011101100
110011101010010011000110011110101001011011010100
000110011110101001000110011110101001011000110011
001111010100100111001111010100100111011011010100
Encryption – Performance Features
Key Strength – 1 million bit or more
400% faster when compared to AES.
MPU use – Mathematical Process Unit in CPU use only 3% –7%.
+/- 5% overhead of the file from original data set.
Capable of encrypting entire columns of a database (up to 300 characters) into one 2D
barcode.
US Patent No. 8914369
White Paper
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
01100110011110101001001100011001
11101010010110011001111010100100
11000110011110101001011011010100
10001100111101010010110001100110
01111010100100111001111010100100
11000110011110101001011011010100
11010100100110001100111101010010
11001100111011001100111010100100
11000110011110101001011011010100
01100110011110101001001100011001
11101010010110011001111010100100
11000110011110101001011011010100
10001100111101010010110001100110
01111010100100111001111010100100
11000110011110101001011011010100
11010100100110001100111101010010
11001100111011001100111010100100
11000110011110101001011011010100
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
THE IRON RING
DATABASE LESS
AUTHENTICATION
Secure ONLINE Environment
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
MDLE Decryption
(Key) Server
Incoming
Web Server
MEANINGLESS DATA
STORED ONLINE
The Decryption Server stores ONLY
the keys to authenticate the MDLE
label
The Decryption Server is protected
by The Iron Ring, a revolutionary
database less authentication method
Even if the Decryption Server is
hacked, no sensitive information will
be exposed
The Iron Ring
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
* Hardware has been approved for use by
the US Government to protect nuclear
facilities and other ultra sensitive
networks.
1. User scans the encrypted MDLE security label with their smartphone,
tablet, laptop, or desktop equipped with a camera or webcam. The
payload is extracted and sent for authentication.
2. The incoming web server receives the incoming encrypted payload
and the user’s return IP address and transfers it through a
unidirectional data flow membrane.
3. The first unidirectional data flow membrane* acts as a gatekeeper,
and passes only payloads encrypted by the MDLE encryption server
to the decryption key server.
4. The decryption key server, authenticates the encrypted payload, and
logs the date, time, location, and IP address of every scanning event.
5. The authentication response is sent through an outgoing web server
through a second unidirectional data flow membrane.
6. The second unidirectional data flow membrane* transfers the
authentication response to the return address of the user which
scanned the MDLE security label, and protects against malicious
incoming attacks.
1. User receives authentication response.
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
CONTACT US
9074 De Garmo Avenue
Sun Valley, California 91352 USA
Tel: 818-570-1277
Email: info@6dcp.com
Web: www.6dcp.com

Contenu connexe

Tendances

bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1cbcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
Sam Kumarsamy
 
Parking solution presentation
Parking solution presentationParking solution presentation
Parking solution presentation
Saqib Raza
 
PCI DSS Done RIGHT and WRONG by Anton Chuvakin and Branden Williams
PCI DSS Done RIGHT and WRONG by Anton Chuvakin and Branden WilliamsPCI DSS Done RIGHT and WRONG by Anton Chuvakin and Branden Williams
PCI DSS Done RIGHT and WRONG by Anton Chuvakin and Branden Williams
Anton Chuvakin
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
Ulf Mattsson
 

Tendances (19)

Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
PCI Myths
PCI MythsPCI Myths
PCI Myths
 
AL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_webAL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_web
 
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
 
G06.2014 magic quadrant for secure web gateways
G06.2014   magic quadrant for secure web gatewaysG06.2014   magic quadrant for secure web gateways
G06.2014 magic quadrant for secure web gateways
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
 
A Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security StandardsA Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security Standards
 
Enhance security, reliability & efficiency with blockchain technology
Enhance security, reliability & efficiency with blockchain technologyEnhance security, reliability & efficiency with blockchain technology
Enhance security, reliability & efficiency with blockchain technology
 
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1cbcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
 
Avigilon investor-presentation-jan-20-2016-final
Avigilon investor-presentation-jan-20-2016-finalAvigilon investor-presentation-jan-20-2016-final
Avigilon investor-presentation-jan-20-2016-final
 
Parking solution presentation
Parking solution presentationParking solution presentation
Parking solution presentation
 
Guide: Security and Compliance
Guide: Security and ComplianceGuide: Security and Compliance
Guide: Security and Compliance
 
PCI DSS Done RIGHT and WRONG by Anton Chuvakin and Branden Williams
PCI DSS Done RIGHT and WRONG by Anton Chuvakin and Branden WilliamsPCI DSS Done RIGHT and WRONG by Anton Chuvakin and Branden Williams
PCI DSS Done RIGHT and WRONG by Anton Chuvakin and Branden Williams
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
 
CLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José AntunesCLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José Antunes
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity
 

En vedette

ZUKISWA MLAMLA- CURRICULUM VITAE (Updated)
ZUKISWA MLAMLA- CURRICULUM VITAE (Updated)ZUKISWA MLAMLA- CURRICULUM VITAE (Updated)
ZUKISWA MLAMLA- CURRICULUM VITAE (Updated)
Zukiswa Mlamla
 

En vedette (11)

The 13 Tribes
The 13 TribesThe 13 Tribes
The 13 Tribes
 
դնթ
դնթդնթ
դնթ
 
Disney consumer products - Marketing Nutrition To Children
Disney consumer products - Marketing Nutrition To ChildrenDisney consumer products - Marketing Nutrition To Children
Disney consumer products - Marketing Nutrition To Children
 
7 Best Tips For Cold Emails To Work
7 Best Tips For Cold Emails To Work7 Best Tips For Cold Emails To Work
7 Best Tips For Cold Emails To Work
 
ZUKISWA MLAMLA- CURRICULUM VITAE (Updated)
ZUKISWA MLAMLA- CURRICULUM VITAE (Updated)ZUKISWA MLAMLA- CURRICULUM VITAE (Updated)
ZUKISWA MLAMLA- CURRICULUM VITAE (Updated)
 
Consigli Su Come Creare Il Proprio Make Up Bag
Consigli Su Come Creare Il Proprio Make Up BagConsigli Su Come Creare Il Proprio Make Up Bag
Consigli Su Come Creare Il Proprio Make Up Bag
 
Vizag Interior Project
Vizag Interior ProjectVizag Interior Project
Vizag Interior Project
 
Question 2 - Genre
Question 2 - GenreQuestion 2 - Genre
Question 2 - Genre
 
JessicaBGarcia resume 2016
JessicaBGarcia resume 2016JessicaBGarcia resume 2016
JessicaBGarcia resume 2016
 
Slide historia
Slide historiaSlide historia
Slide historia
 
Antiarrhythmics
AntiarrhythmicsAntiarrhythmics
Antiarrhythmics
 

Similaire à 6DCP Food Safety Solution

QRedit Presentation_2016
QRedit Presentation_2016QRedit Presentation_2016
QRedit Presentation_2016
Eddie Cohen
 
Company Profile
Company ProfileCompany Profile
Company Profile
3SC World
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
LabSharegroup
 

Similaire à 6DCP Food Safety Solution (20)

BSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdfBSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdf
 
Blockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecuredBlockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecured
 
Blockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecuredBlockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecured
 
BeSecured_Brochure_02 (1).pdf
BeSecured_Brochure_02 (1).pdfBeSecured_Brochure_02 (1).pdf
BeSecured_Brochure_02 (1).pdf
 
QRedit Presentation_2016
QRedit Presentation_2016QRedit Presentation_2016
QRedit Presentation_2016
 
GPAS Service - Technology Overview.pptx
GPAS Service - Technology Overview.pptxGPAS Service - Technology Overview.pptx
GPAS Service - Technology Overview.pptx
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story Book
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
 
Authentication Technologies An Overview
Authentication Technologies An OverviewAuthentication Technologies An Overview
Authentication Technologies An Overview
 
ATL Medical
ATL MedicalATL Medical
ATL Medical
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
WatchGuard Corporate Presentation.pptx
WatchGuard  Corporate Presentation.pptxWatchGuard  Corporate Presentation.pptx
WatchGuard Corporate Presentation.pptx
 
Maritime Security & Port Security Solutions
Maritime Security & Port Security SolutionsMaritime Security & Port Security Solutions
Maritime Security & Port Security Solutions
 
Verify me Introduction ppt for your info
Verify me Introduction ppt for your infoVerify me Introduction ppt for your info
Verify me Introduction ppt for your info
 

6DCP Food Safety Solution