This document discusses how to select authentication solutions to combat counterfeiting according to your needs. It recommends conducting background work to understand the nature and causes of counterfeiting threats. It also stresses the importance of organizational commitment from senior leadership. The document then provides guidance on selecting appropriate authentication technologies and solutions based on your manufacturing processes. It emphasizes that solutions must be properly implemented, monitored and upgraded over time to successfully fight counterfeiting.