TECHNOLOGIES
VOID TECHNOLOGY FOR VISIBLE TAMPER EVIDENCE
TECHNOLOGIES
VOID TECHNOLOGY FOR VISIBLE TAMPER EVIDENCE
TAMPER REVEALING TECHNOLOGY FOR PACKAGE SAFETY
FIRST OPENING EXPERIENCE
Our SecurityLabels ensure packaging integrity with tamper-evident technologies, such as our patented VOID technology. VOIDLabels automatically indicate any opening attempt. When the label is removed from the packaging, an opening effect is triggered, and the label cannot be reapplied unnoticed. This also ensures that the label cannot be reused. Our VOID technology makes it easy to recognize when a package has been already opened. We offer you a broad palette of different VOID technologies, from the elementary to the highly complex, that offer product protection and tamper-evidence for your specific application.
TAMPER REVEALING TECHNOLOGY FOR PACKAGE SAFETY
FIRST OPENING EXPERIENCE
Our SecurityLabels ensure packaging integrity with tamper-evident technologies, such as our patented VOID technology. VOIDLabels automatically indicate any opening attempt. When the label is removed from the packaging, an opening effect is triggered, and the label cannot be reapplied unnoticed. This also ensures that the label cannot be reused. Our VOID technology makes it easy to recognize when a package has been already opened. We offer you a broad palette of different VOID technologies, from the elementary to the highly complex, that offer product protection and tamper-evidence for your specific application.
TECH HIGHLIGHTS
WE OFFER A WIDE RANGE OF DIFFERENT
VOID TECHNOLOGIES
- Double Void
- Triple Void
- Wash Void
- Translucent Void
- High Contrast Void
- High Transparent Void
- Vienna Void
- Traceless Void
- Paper Void
The TRACELESS VOID Technology allows the label to be removed from the product or packaging without leaving residues. This technology is used for luxury products where the high-end packaging should not be affected by residues. The VOID effect is triggered within the layers of the label.

ROBUST PROTECTION ACROSS MULTIPLE FRAUD TYPES TO SECURE YOUR BRAND AND PRODUCTS
VOID TECHNOLOGY STOPS PRODUCT FRAUD IN ITS TRACKS
DIFFERENT TYPES OF PRODUCT FRAUD
Counterfeiting means simulating, reproducing, or modifying a product or its packaging without authorization.
IP rights infringement means using or implementing technologies or capabilities that are protected by intellectual property rights without authorization.
An adulterant substance means that a fraudulent component has been added to, or substituted within, the finished product.
Tampering means that a legitimate product, its packaging, or its security features have been altered without authorization.
Substitution means the complete or partial undeclared replacement of authentic components or ingredients with substitutes.
Simulation refers to an illegitimate product designed to resemble—but not exactly duplicate—a legitimate product.
Diversion means the sale or distribution of products outside their intended or authorized markets.
Theft refers to legitimate products that are stolen and then passed off as legitimately sourced.
Overrun means producing legitimate products in excess of contractual or regulatory limits, including false production reporting or undeclared production shifts.

