Date post: | 12-Aug-2015 |
Category: |
Documents |
Upload: | john-broderick |
View: | 115 times |
Download: | 0 times |
2014
Positive Technologies Corporate Identity Manual
Positive Technologies Corporate Identity Manual 2014
Introduction
Welcome to Positive Technologies. Provided within this document you will find the guidelines, specifications and rules of usage for our visual identity.
A brand signifies more than just a logo mark. It represents who we are and what it is that sets us apart from the crowd. Building our brand necessitates a consistency in delivery and meaning as our brand awareness unfolds. This document is to be used as a springboard for creating any collateral and/or communications on behalf of the Positive Technology brand.
The guidelines described in this manual are the building blocks for creating communication. It is essential that these specifications are closely followed.
Positive Technologies Corporate Identity Manual 2014
Page 1Contents
Logo Mark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Area of Isolation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Logo Alternates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Color Palette . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Typography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Iconography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Illustration Style . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Page Layout Grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Positive Technologies Corporate Identity Manual 2014
Page 2Logo Mark
The Positive Technologies Corporate logo is the main element of the Positive corporate identity. The logo mark is the most visible and recognizable asset of the identity program and guidelines for use of the logo should be followed closely to ensure the integrity of the Brand.
Positive Technologies Corporate Identity Manual 2014
Page 3Area of Isolation
The logo mark should always have a specific amount of clear space surrounding it all times. The proper area of isolation can be observed in the above graphic wherein “x” is equal in height to the word TECHNOLOGIES and ”y” is equal to the width of the letter ‘i’ in the word POSITIVE.
Positive Technologies Corporate Identity Manual 2014
Page 4Logo Alternates
1 Color 2 Color 3 Color
Positive Technologies Corporate Identity Manual 2014
Page 5Color Palette
R 0G 0B 0
C 50M 50Y 50K 100
Pantone® Black Pantone® 186 Pantone® Cool Gray 7
R 208G 32B 46
C 12M 100Y 92K 3
R 153G 152B 153
C 43M 35Y 35K 1
Positive Technologies Corporate Identity Manual 2014
Page 6Typography
The primary typeface for Positive Technologies is Myriad Pro. Myriad Pro is a sans-serif typeface that is easy to read both on page and on screen and is a clean and distinct font family. A number of weights are available within this family and allow a wide range of flexibility for creative expression. The typeface should always be optically kerned with a tracking of 10.
Myriad Pro // LightA B C D E F G H I J K L M N O P Q R S T U V W X Y Za b c d e f g h i j k l m n o p q r s t u v w x y z1 2 3 4 5 6 7 8 9 0 & @ $ % ^ * [ ] { } / /
Myriad Pro // SemiboldA B C D E F G H I J K L M N O P Q R S T U V W X Y Za b c d e f g h i j k l m n o p q r s t u v w x y z1 2 3 4 5 6 7 8 9 0 & @ $ % ^ * [ ] { } / /
Myriad Pro // BoldA B C D E F G H I J K L M N O P Q R S T U V W X Y Za b c d e f g h i j k l m n o p q r s t u v w x y z1 2 3 4 5 6 7 8 9 0 & @ $ % ^ * [ ] { } / /
Positive Technologies Corporate Identity Manual 2014
Page 7Iconography // 2D Icons
A 2 dimensional icon library (shown here) and a 3 dimensional icon library (page 8) are used as story building blocks. These graphics may be used separately to communicate an idea or they may be used collectively to build a more complex infographic.
1 . Clock
7 . Laptop
13 . Speaker
19 . Building
25 . Telecom
2 . Lens/Shutter
8 . Computer Screen
14 . Speech Bubbles
20 . Bank
26 . Trash Can
3 . Gear
9 . Battery
15 . Wrench
21 . Manufacturing
27 . Empty Trash Can
4 . Ripples
10 . Document
16 . Padlock
22 . Server Stack
28 . Shield
5 . Globe
11 . Envelope
17 . Lightning Bolt
23 . Server
6 . Pie Chart
12 . Flag
18 . Electrical Plug
24 . Person
Positive Technologies Corporate Identity Manual 2014
Page 8Iconography // 3D Icons
A 2 dimensional icon library (page 7) and a 3 dimensional icon library (shown here) are used as story building blocks. These graphics may be used separately to communicate an idea or they may be used collectively to build a more complex infographic.
1 . Clock
7 . Laptop
13 . Speaker
19 . Building
25 . Telecom
2 . Lens/Shutter
8 . Computer Screen
14 . Speech Bubbles
20 . Bank
26 . Trash Can
3 . Gear
9 . Battery
15 . Wrench
21 . Manufacturing
27 . Empty Trash Can
4 . Ripples
10 . Document
16 . Padlock
22 . Server Stack
28 . Shield
5 . Globe
11 . Envelope
17 . Lightning Bolt
23 . Server
6 . Pie Chart
12 . Flag
18 . Electrical Plug
24 . Person
Positive Technologies Corporate Identity Manual 2014
Page 9Illustration Style
Our illustration style is a single width line art style that follows a photo realistic asthetic. A careful balance of detail and story telling must be clearly observable.
Positive Technologies Corporate Identity Manual 2014
Page 10Page Layout Grid
PRODUCT BRIEF - APPLICATION FIREWALL
As web applications proliferate so too do the attacks mounted against them – spurred on by automation, advanced threats against web applications have become the weapons of choice for cyber-attackers. Traditional firewalls, IPS (intrusion protection), and NFGW (next gen firewalls) no longer provide sufficient protection against attacks mounted against web applications and failure to secure these applications will likely result in loss of confidential data, fraud, loss of business and damage to your brand/reputation.
Positive Technologies Application Firewall™ benefits from the combined knowledge of 200 security experts (Positive Research) and developers who have applied modern science to secure your web applications from emerging threats. With features not found in other solutions, Application Firewall protects you against zero-day attacks, web-fraud, data leakage and bot (anti-automation) control with an innovative use of normalization, heuristics, automatic policy learning and behavioral analysis techniques which result in lower costs due to shorter remediation cycles and far fewer false positives.
Uncover Threats before they StrikeApplication Firewall studies traffic patterns and events generated by your business systems during normal business operations. It then uses this history as a benchmark against which to measure future events, ensuring anomalies are quickly discovered. Its built-in correlation engine (aggregation, classification, prioritization of threats and attack chain analysis) and web forensics (Log and pcap analysis) provide additional security to help you guard against current and future threats.
Limit Risk and Accelerate RemediationVirtual Patching, not possible with singular WAF solutions, ensures that Application Firewall not only detects attacks and vulnerabilities but can also be rapidly configured to defend against them while your development team is finding a more permanent fix to the problem. This feature is powerful: it generates a virtual patch by leveraging Positive Technologies Application Inspector’s exploit generation capability that demonstrates how vulnerabilities can be used to attack your business.
Eliminate HPP, HPC and Brute-Force AttacksApplication Firewall’s normalization techniques strip out any unnecessary HTTP parameters from each query, passing only essential data to your servers. This reduces the risk of your systems being bombarded with HTTP Parameter Pollution and Contamination attacks, often used against traditional firewalls.
PROACTIVELY PROTECT WEB APPLICATIONSAFApplication Firewall
continued
Key Benefits/Highlights
ª O-day Attacks: Application Firewall adds an additional layer of security by identifying 0-day attacks
ª Automatic virtual patching: Application Firewall not only detects attacks and vulnerabilities, it defends against them
ª Brute-force attacks: Detect and counter brute-force attacks with anti-fraud and anti-bot techniques
ª Detect Web-fraud and provide data leakage control
ª Anti-DDoS protection: Anti-DDoS protection is provided at the application layer
ª Built-in correlation engine: Built-in correlation provides aggregation, classification, prioritization of threats and analysis of attack chains
ª Web forensics: Web forensics include Log and pcap (packet capture) analysis
ª Anti-Automation: Anti-Automation distinguishes between humans and automated clients that would interact with a web app
ª Customized protection: Out-of-the-box protection for ERP, Online Banking and Telecommunications Systems
Each document within the Positive Technologies collateral library follows a simple 3 column design. Typically, body copy spans 2 columns on the right of the page leaving the left hand column as a sidebar to highlight or callout.
Product Brief Flyer Page Layout Grid• .5” Margins• 3 Column Design• .25” Gutter