+ All Categories
Home > Documents > Standards Guide_A4_V02

Standards Guide_A4_V02

Date post: 12-Aug-2015
Category:
Upload: john-broderick
View: 115 times
Download: 0 times
Share this document with a friend
Popular Tags:
12
2014 Positive Technologies Corporate Identity Manual
Transcript
Page 1: Standards Guide_A4_V02

2014

Positive Technologies Corporate Identity Manual

Page 2: Standards Guide_A4_V02

Positive Technologies Corporate Identity Manual 2014

Introduction

Welcome to Positive Technologies. Provided within this document you will find the guidelines, specifications and rules of usage for our visual identity.

A brand signifies more than just a logo mark. It represents who we are and what it is that sets us apart from the crowd. Building our brand necessitates a consistency in delivery and meaning as our brand awareness unfolds. This document is to be used as a springboard for creating any collateral and/or communications on behalf of the Positive Technology brand.

The guidelines described in this manual are the building blocks for creating communication. It is essential that these specifications are closely followed.

Page 3: Standards Guide_A4_V02

Positive Technologies Corporate Identity Manual 2014

Page 1Contents

Logo Mark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

Area of Isolation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Logo Alternates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Color Palette . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

Typography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

Iconography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

Illustration Style . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Page Layout Grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

Page 4: Standards Guide_A4_V02

Positive Technologies Corporate Identity Manual 2014

Page 2Logo Mark

The Positive Technologies Corporate logo is the main element of the Positive corporate identity. The logo mark is the most visible and recognizable asset of the identity program and guidelines for use of the logo should be followed closely to ensure the integrity of the Brand.

Page 5: Standards Guide_A4_V02

Positive Technologies Corporate Identity Manual 2014

Page 3Area of Isolation

The logo mark should always have a specific amount of clear space surrounding it all times. The proper area of isolation can be observed in the above graphic wherein “x” is equal in height to the word TECHNOLOGIES and ”y” is equal to the width of the letter ‘i’ in the word POSITIVE.

Page 6: Standards Guide_A4_V02

Positive Technologies Corporate Identity Manual 2014

Page 4Logo Alternates

1 Color 2 Color 3 Color

Page 7: Standards Guide_A4_V02

Positive Technologies Corporate Identity Manual 2014

Page 5Color Palette

R 0G 0B 0

C 50M 50Y 50K 100

Pantone® Black Pantone® 186 Pantone® Cool Gray 7

R 208G 32B 46

C 12M 100Y 92K 3

R 153G 152B 153

C 43M 35Y 35K 1

Page 8: Standards Guide_A4_V02

Positive Technologies Corporate Identity Manual 2014

Page 6Typography

The primary typeface for Positive Technologies is Myriad Pro. Myriad Pro is a sans-serif typeface that is easy to read both on page and on screen and is a clean and distinct font family. A number of weights are available within this family and allow a wide range of flexibility for creative expression. The typeface should always be optically kerned with a tracking of 10.

Myriad Pro // LightA B C D E F G H I J K L M N O P Q R S T U V W X Y Za b c d e f g h i j k l m n o p q r s t u v w x y z1 2 3 4 5 6 7 8 9 0 & @ $ % ^ * [ ] { } / /

Myriad Pro // SemiboldA B C D E F G H I J K L M N O P Q R S T U V W X Y Za b c d e f g h i j k l m n o p q r s t u v w x y z1 2 3 4 5 6 7 8 9 0 & @ $ % ^ * [ ] { } / /

Myriad Pro // BoldA B C D E F G H I J K L M N O P Q R S T U V W X Y Za b c d e f g h i j k l m n o p q r s t u v w x y z1 2 3 4 5 6 7 8 9 0 & @ $ % ^ * [ ] { } / /

Page 9: Standards Guide_A4_V02

Positive Technologies Corporate Identity Manual 2014

Page 7Iconography // 2D Icons

A 2 dimensional icon library (shown here) and a 3 dimensional icon library (page 8) are used as story building blocks. These graphics may be used separately to communicate an idea or they may be used collectively to build a more complex infographic.

1 . Clock

7 . Laptop

13 . Speaker

19 . Building

25 . Telecom

2 . Lens/Shutter

8 . Computer Screen

14 . Speech Bubbles

20 . Bank

26 . Trash Can

3 . Gear

9 . Battery

15 . Wrench

21 . Manufacturing

27 . Empty Trash Can

4 . Ripples

10 . Document

16 . Padlock

22 . Server Stack

28 . Shield

5 . Globe

11 . Envelope

17 . Lightning Bolt

23 . Server

6 . Pie Chart

12 . Flag

18 . Electrical Plug

24 . Person

Page 10: Standards Guide_A4_V02

Positive Technologies Corporate Identity Manual 2014

Page 8Iconography // 3D Icons

A 2 dimensional icon library (page 7) and a 3 dimensional icon library (shown here) are used as story building blocks. These graphics may be used separately to communicate an idea or they may be used collectively to build a more complex infographic.

1 . Clock

7 . Laptop

13 . Speaker

19 . Building

25 . Telecom

2 . Lens/Shutter

8 . Computer Screen

14 . Speech Bubbles

20 . Bank

26 . Trash Can

3 . Gear

9 . Battery

15 . Wrench

21 . Manufacturing

27 . Empty Trash Can

4 . Ripples

10 . Document

16 . Padlock

22 . Server Stack

28 . Shield

5 . Globe

11 . Envelope

17 . Lightning Bolt

23 . Server

6 . Pie Chart

12 . Flag

18 . Electrical Plug

24 . Person

Page 11: Standards Guide_A4_V02

Positive Technologies Corporate Identity Manual 2014

Page 9Illustration Style

Our illustration style is a single width line art style that follows a photo realistic asthetic. A careful balance of detail and story telling must be clearly observable.

Page 12: Standards Guide_A4_V02

Positive Technologies Corporate Identity Manual 2014

Page 10Page Layout Grid

PRODUCT BRIEF - APPLICATION FIREWALL

As web applications proliferate so too do the attacks mounted against them – spurred on by automation, advanced threats against web applications have become the weapons of choice for cyber-attackers. Traditional firewalls, IPS (intrusion protection), and NFGW (next gen firewalls) no longer provide sufficient protection against attacks mounted against web applications and failure to secure these applications will likely result in loss of confidential data, fraud, loss of business and damage to your brand/reputation.

Positive Technologies Application Firewall™ benefits from the combined knowledge of 200 security experts (Positive Research) and developers who have applied modern science to secure your web applications from emerging threats. With features not found in other solutions, Application Firewall protects you against zero-day attacks, web-fraud, data leakage and bot (anti-automation) control with an innovative use of normalization, heuristics, automatic policy learning and behavioral analysis techniques which result in lower costs due to shorter remediation cycles and far fewer false positives.

Uncover Threats before they StrikeApplication Firewall studies traffic patterns and events generated by your business systems during normal business operations. It then uses this history as a benchmark against which to measure future events, ensuring anomalies are quickly discovered. Its built-in correlation engine (aggregation, classification, prioritization of threats and attack chain analysis) and web forensics (Log and pcap analysis) provide additional security to help you guard against current and future threats.

Limit Risk and Accelerate RemediationVirtual Patching, not possible with singular WAF solutions, ensures that Application Firewall not only detects attacks and vulnerabilities but can also be rapidly configured to defend against them while your development team is finding a more permanent fix to the problem. This feature is powerful: it generates a virtual patch by leveraging Positive Technologies Application Inspector’s exploit generation capability that demonstrates how vulnerabilities can be used to attack your business.

Eliminate HPP, HPC and Brute-Force AttacksApplication Firewall’s normalization techniques strip out any unnecessary HTTP parameters from each query, passing only essential data to your servers. This reduces the risk of your systems being bombarded with HTTP Parameter Pollution and Contamination attacks, often used against traditional firewalls.

PROACTIVELY PROTECT WEB APPLICATIONSAFApplication Firewall

continued

Key Benefits/Highlights

ª O-day Attacks: Application Firewall adds an additional layer of security by identifying 0-day attacks

ª Automatic virtual patching: Application Firewall not only detects attacks and vulnerabilities, it defends against them

ª Brute-force attacks: Detect and counter brute-force attacks with anti-fraud and anti-bot techniques

ª Detect Web-fraud and provide data leakage control

ª Anti-DDoS protection: Anti-DDoS protection is provided at the application layer  

ª Built-in correlation engine: Built-in correlation provides aggregation, classification, prioritization of threats and analysis of attack chains

ª Web forensics: Web forensics include Log and pcap (packet capture) analysis

ª Anti-Automation: Anti-Automation distinguishes between humans and automated clients that would interact with a web app

ª Customized protection: Out-of-the-box protection for ERP, Online Banking and Telecommunications Systems

Each document within the Positive Technologies collateral library follows a simple 3 column design. Typically, body copy spans 2 columns on the right of the page leaving the left hand column as a sidebar to highlight or callout.

Product Brief Flyer Page Layout Grid• .5” Margins• 3 Column Design• .25” Gutter


Recommended