vectra logo usage guidelines and corporate color palette style guide and color... · m u ltic ored...
TRANSCRIPT
Vectra logo usage guidelines and corporate color palette
October 2017
Vectra logo usage guidelines and corporate color palette
2
Table of Content
Introduction .............................................................................................................. 3
Our logo ................................................................................................................... 4
Primary and alternate logo variants ........................................................................... 5
Correct logo usage ............................................................................................... 6
Incorrect logo usage ............................................................................................. 8
The Cognito™ wordmark ........................................................................................... 9
Cognito image usage guidelines ............................................................................... 9
Vectra font family .................................................................................................... 10
Marketing collateral examples ................................................................................. 11
Corporate color palette ........................................................................................... 13
Color formulas .................................................................................................... 14
Brand management ................................................................................................ 15
Vectra logo usage guidelines and corporate color palette
3
Introduction
This document provides you with some guidelines about how to properly use the Vectra logo, Vectra wordmarks and corporate color palette in a variety of marketing and sales materials.
The Vectra logo and wordmarks are among the most vital representations of our brand and are cornerstones of our identity. The proper use of our logo and wordmarks is necessary to preserve the integrity of the Vectra brand.
They include:
The Vectra wordmark and the Vectra Networks logo are registered trademarks.
Security that thinks.®The tagline Security that thinks® is a registered trademark.
Vectra®
The word Vectra® is a registered trademark.
Vectra logo usage guidelines and corporate color palette
4
Our logo
Our logo is composed of four distinct elements: The green “chiclet”, the Vectra wordmark, the “Security that thinks.” tagline, and the registered trademark symbol. These elements and their relationship must never be altered or modified in any way. The proportions are shown on this page.
The Vectra logo always appears with the tagline “Security that thinks.” The logo may be used without this tagline only with prior approval.
Copyright text should be used when promoting Vectra materials in your outbound emails, web site and marketing collateral.
The Vectra copyright notice and trademark statement is:
© [year of publication] Vectra Networks Inc. All rights reserved. Vectra, the Vectra Networks logo and Security that thinks are registered trademarks and Cognito, the Vectra Threat Labs and the Threat Certainty Index are trademarks of Vectra Networks. Other brand, product and service names are trademarks, registered trademarks or service marks of their respective holders.
®
Wordmark
Recommended Clear Space
“Chiclet”(icon)
X
X
X
X
Vectra logo usage guidelines and corporate color palette
5
Our logo: Primary and alternate variants
There are two variants of our logo, the primary horizontal configuration and the alternate stacked vertical configuration:
Primary horizontal logo
Color logo Black logo Grey logo
Color logo for dark backgrounds Reverse white logo for dark backgrounds
Alternate stacked logo
Color logo Black logo Grey logo Color logo for dark backgrounds
Reverse white logo for dark backgrounds
Vectra logo usage guidelines and corporate color palette
6
Our logo: Correct usage
Consistent use of the Vectra logo ensures that it is easily recognizable across all forms of media.
The green Vectra “chiclet”:
DIGITAL
RGB R:0 G:128 B:0HEX #008000
PROCESS C:100 M:0 Y:100 K:50PANTONE PMS 356 C/CP
The Vectra wordmark as part of the logo:
DIGITAL
RGB R:0 G:0 B:0HEX #000000
PROCESS C:0 M:0 Y:0 K:100PANTONE Black
The Vectra “Security that thinks.” tagline as part of the logo:
DIGITAL
RGB R:135 G:138 B:143HEX #868A8F
PROCESS C:20 M:14 Y:12 K:40PANTONE PMS Cool Grey 7 C/CP
See “The Vectra corporate colors: Color formulas” later in this guide for more detailed color specs.
The minimum clear space around the Vectra logo is equal to the height of the type in the logo.
X
X X
X X
X X
X X
1.0” (25.4 mm)
The preferred and minimum print size for all printed collateral, such as brochures and data sheets, is 1 inch or 25.4 mm. The preferred and minimum on-screen size for Web use is 90 pixels.
X
X X
X X
X X
X X
1.0” (25.4 mm)
Vectra logo usage guidelines and corporate color palette
7
For other uses like signage or large banners and posters, exercise sound design judgment when scaling the logo. Give attention to the clarity, impact and quality of the logo’s appearance.
On light-colored backgrounds, the logo can be used with its original colors.
If the background is dark enough, the “dark-bg” version of the Vectra logo should be used.
Place the logo on backgrounds that provide high contrast and legibility to ensure that it is clear and recognizable. On colored backgrounds where the contrast is not strong enough for the original color logo to stand out, the dark-bg or all-white logos should be used.
No
The Vectra tagline does not stand out
No
Vectra word mark does not stand out
Yes
Yes
Our logo: Correct usage
Vectra logo usage guidelines and corporate color palette
8
Altering or recreating the Vectra logo in any way can have an adverse impact on the consistency and brand recognition we strive to achieve and is strongly discouraged.
Featuring the solution
Automated threat management by
ABCompany ABCompany
Featuring the solutionFeaturing the solution
Automated threat management by
ABCompanyFeaturing the solution
Featuring the
Automated threat management by
ABCompany
Featuring the solution
Automated threat management by
ABCompany ABCompany
Featuring the solution
Automated threat management by
ABCompany ABCompany
Featuring the solution
Automated threat management by
ABCompany ABCompany
Do not change the color of the Vectra logo. Do not use the Vectra logo on a textured, multicolored or patterned background.
Do not place the Vectra logo within a frame or holding shape of any kind.
Do not position the Vectra logo at an angle.
Do not use the Vectra logo coupled with other text or content.
Do not use the Vectra logo in a sentence.
Do not lock up the Vectra logo with other logos. Do not use the Vectra logo in close proximityto other logos.
Do not use any one part of the Vectra logo on its own.
Do not change the color of the Vectra logo. Do not use the Vectra logo on a textured, multicolored or patterned background.
Do not place the Vectra logo within a frame or holding shape of any kind.
Featuring the solution
Automated threat management by
ABCompany ABCompany
Featuring the solutionFeaturing the solution
Automated threat management by
ABCompanyFeaturing the solution
Featuring the
Automated threat management by
ABCompany
Featuring the solution
Automated threat management by
ABCompany ABCompany
Featuring the solution
Automated threat management by
ABCompany ABCompany
Featuring the solution
Automated threat management by
ABCompany ABCompany
Do not change the color of the Vectra logo. Do not use the Vectra logo on a textured, multicolored or patterned background.
Do not place the Vectra logo within a frame or holding shape of any kind.
Do not position the Vectra logo at an angle.
Do not use the Vectra logo coupled with other text or content.
Do not use the Vectra logo in a sentence.
Do not lock up the Vectra logo with other logos. Do not use the Vectra logo in close proximityto other logos.
Do not use any one part of the Vectra logo on its own.Do not use any one part of the Vectra logo on its own.
Do not use the Vectra logo in a sentence. Do not use the Vectra logo coupled with other text or content.
Featuring the solution
Automated threat management by
ABCompany ABCompany
Featuring the solutionFeaturing the solution
Automated threat management by
ABCompanyFeaturing the solution
Featuring the
Automated threat management by
ABCompany
Featuring the solution
Automated threat management by
ABCompany ABCompany
Featuring the solution
Automated threat management by
ABCompany ABCompany
Featuring the solution
Automated threat management by
ABCompany ABCompany
Do not change the color of the Vectra logo. Do not use the Vectra logo on a textured, multicolored or patterned background.
Do not place the Vectra logo within a frame or holding shape of any kind.
Do not position the Vectra logo at an angle.
Do not use the Vectra logo coupled with other text or content.
Do not use the Vectra logo in a sentence.
Do not lock up the Vectra logo with other logos. Do not use the Vectra logo in close proximityto other logos.
Do not use any one part of the Vectra logo on its own.
Do not position the Vectra logo at an angle. Do not lock up the Vectra logo with other logos. Do not use the Vectra logo in close proximity to other logos.
Our logo: Incorrect usage
Vectra logo usage guidelines and corporate color palette
9
Like the Vectra logo, Cognito is an important representation of our brand and a cornerstone of our identity. Proper use of the Cognito wordmark is vital to preserve the integrity of the Vectra brand.
Cognito™
The Cognito wordmark is a trademark of Vectra Networks and should always have the ™ symbol when it first appears.
Cognito image usage guidelinesThe consistent use of Cognito images ensures that it is easily recognizable as part of the Vectra brand across all forms of media.
The Cognito images and background colors should never be modified or redrawn. Altering or recreating Cognito can have an adverse impact on the consistency and brand recognition we strive to achieve and is strongly discouraged.
For web, videos, signage, banners, posters, apparel and all other uses, exercise sound design judgment when scaling Cognito images. Give attention to the scale, clarity, impact and quality of the Cognito appearance.
The Cognito™ wordmark
Incorrect
Incorrect
Correct
Incorrect
Vectra logo usage guidelines and corporate color palette
10
The Vectra corporate font family for all printed material is Helvetica Neue.
Display font
Helvetica Neue Extended
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz1234567890!@#$%^&*()_+Headlines and titles are set in Helvetica Neue Extended and should be sentence case.
Basic text font
Helvetica Neue
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz1234567890!@#$%^&*()_+Body text is set in Helvetica Neue Light. Other weights and variants of the Helvetica Neue font family may be used for emphasis where needed.
Vectra font family
Vectra logo usage guidelines and corporate color palette
11
These examples show the proper use of the Vectra logo in marketing collateral
© 2016 Vectra Networks Inc. All rights reserved. Vectra and the Vectra Networks logo are registered trademarks and Security that thinks, the Vectra Threat Labs, and the Threat Certainty Index are trademarks of Vectra Networks. Other brand, product and service names are trademarks, registered trademarks or service marks of their respective holders.
Email [email protected] Phone +1 408-326-2020 www.vectranetworks.com
Conclusion
The data science behind the Vectra Automated Threat
Management model represents an unprecedented innovation in
detection methodologies.
Leveraging packet-level behavioral analysis, this new model
uniquely combines human expertise, global learning and local
learning in one simple, integrated solution that greatly improves
security operations.
Detecting the plethora of new, highly sophisticated cyber attacks
continues to be a challenging prospect. But Vectra remains
steadfast in its commitment to the development of new tools and
methodologies that detect all manner of threats well into
the future.
For example, botnet monetization may indicate the presence
of crimeware but not a targeted attack. However, internal
reconnaissance and lateral movement behaviors are strongly
linked to targeted attacks.
In Bayesian network terms, spam emails have a lower linkage to
targeted attacks when compared to a host that exhibits staged
transfers of data or data smuggling behaviors.
The Vectra Automated Threat Management model also assigns
particular importance to behaviors that progress across strategic
phases of the kill chain. If a host exhibits command-and-control
communication, internal reconnaissance and lateral movement
behaviors, the risk of a targeted attack becomes more likely.
While the use of Bayesian networks is not quite as simple as
some of these examples, it offers a framework for understanding
events, hosts and detection methods to automatically elevate
coordinated attacks.
Although the underlying calculations are quite complicated, these
combined methods enable Vectra to prioritize attack behaviors
and hosts that represent the most serious threats with the highest
certainty in the network, as shown below.
2 Vectra Networks
Vectra Threat Certainty Index™ Vectra Ransomware Detection
Detections that matter
Vectra empowers IT security teams by condensing vast amounts of
data down to simple, actionable answers that save time, effort and
money. Alerts are automatically correlated by host and displayed
on the intuitive Threat Certainty Index™. The Threat Certainty Index
360-degree threat detection
to and from internal sources as well as the Internet. Vectra
automatically detects threats at every stage of an attack including
reconnaissance, command-and-control, lateral movement, data
tracks and scores the progression of an attack over time to
pinpoint and prioritize an active targeted attack.
Insightful real-time investigation
The Vectra platform intuitively shows the progression of a threat
across multiple phases of an attack with quick access to any level
of detail. The user interface shows the phase of the attack and a
summary of the threat that was detected.
Details about an attack are just one-click away so you can easily
view the exact packets between the compromised host in your
network and other internal assets it is attacking or external parties
with which it is communicating.
Security that thinks™ The Vectra platform continuously listens, learns, and remembers in order to automatically detect threats from
malware, targeted attackers and malicious insiders. Based on patent-pending data science and machine
learning, Vectra exposes the malicious behavior of known and unknown threats without relying on signatures or
reputation lists.
Full lifecycle detection of ransomware
Vectra detects ransomware campaigns against enterprises and
other organizations across all phases attack. The Vectra solution
ransomware as it seeks to damage critical assets.
In addition to detecting ransomware directly, the Vectra detects
network scans and spreading behavior that malware relies on to
Works for everything
Modern networks and the Internet-of-things contain a wide variety
of devices, operating systems and applications, and it is virtually
impossible for signatures, sandboxes, and endpoint agents to
support them all. By applying data science to the behaviors and
threats across the entire attack surface.
Works out of the box
The Vectra platform is deployed in passive mode and comes in a
variety of form factors to provide full visibility into your network.
The all-in-one Vectra X-series platform is suited for large core
networks and is easily deployed near the aggregation switches or
wide area network (WAN) gateways where they can see all user
White paper
The data science behind Vectra threat detections
Data Sheet
H I G H L I G H T S
• Detects active intrusions across all phases of attack
• Detects malicious behaviors in
signatures or reputation feeds
• Automates Tier 1 security analysis to empower staff and reduce response time
• Pinpoints physical hosts at the center of an active attack
• Delivers clear, intuitive analysis with one-click access to all supporting evidence
• Automatically tracks and scores threats in context over the full duration of attack
• systems, applications and devices
• Simple, passive deployment on a SPAN or TAP port
X-Series PlatformsS-Series Sensors
Vectra® Networks provides network-based behavioral analytics that automatically
detects and analyzes active intrusions across any and all phases of a cyber attack.
Vectra picks up where perimeter security leaves off by providing deep, continuous
attack as hackers attempt to spy, spread, and steal inside your network.
Using a combination of data science, machine learning and behavioral analysis, Vectra
proactively detects malicious attack behaviors that indicate the presence of known and
All detections are automatically scored and correlated to quickly prioritize the threats
that matter most so you can promptly stop the attack and mitigate its impact.
Detects all phases of an attack
Modern attackers thrive on their ability to persist and methodically spread through a
network to eventually gain access to key assets. Even the most sophisticated perimeter
security lacks the internal visibility needed to detect these threats.
cyber attacks, such as internal reconnaissance, the internal spread of malware, abuse
command-and-control and other hidden communications. All detected threats are
automatically scored, correlated, and prioritized to easily reveal the true scope and
progression of an attack.
Vectra Dashboard
Data sheet White paper
Vectra logo usage guidelines and corporate color palette
12
These examples show the proper use of the Vectra logo in marketing collateral
OrganizationTribune Media
IndustryMedia
ChallengeDetect security breaches at Tribune Media’s headquarters and broadcast stations
Selection criteriaReal-time visibility into
network breaches
Results•
security threats
• Gained single view of threats across the enterprise network, including remote sites
• Prevented wasting time uncovering false positives
Media outlets are juicy targets for hackers, and Tribune Media is doing all it can to protect its high-value assets, including television and radio stations, with strong defenses. Its newest defense is real-time detection and analysis of active network breaches.
Tribune Media gets the scoop on network breaches
show they are a media company with canny survival skills. While many media outlets crashed and burned adjusting to an online, mobile world, Tribune Media excelled in engaging and connecting viewers across the nation with content across every distribution platform.
The Chicago-based media company is the nation’s largest independent broadcaster with 42 television and radio stations that reach more than 70 million households. WGN America, the company’s national entertainment network, is available in 73 million households. The company’s other holdings include Tribune Studios, Gracenote and WGN-Radio. Altogether, Tribune Media’s outlets are busy content engines producing local news, original programming and sporting events.
Know the unknown“Every security organization’s biggest challenge is knowing what you don’t know,”
company in 2014, after the company spun out its newspaper business to focus on broadcasting and digital media.
“I was hired to build a security infrastructure from the ground up, and we had a lot of security tools in place,” says Smith. “We were missing a solution that would give us real-time network visibility.”
Case Study
Broadcast news
Case study
Direct marketing
Corporate web site
Vectra logo usage guidelines and corporate color palette
13
There are a wide range of colors in our corporate palette. As shown below, green, black and grey make up our primary colors that we most often use.
The additional secondary colors may be used as accent colors in web banners, signage and co-branded marketing material.
Please exercise good design judgment when you use and combine these colors in your Vectra partner marketing efforts.
The Vectra corporate color palette
BlackPMS 356
PMS Cool Grey 7
Primary (logo) colors Secondary colors
PMS 299 PMS 108 ORANGE
PMS 303
PMS 636
PURPLE
PMS 534
RED
PMS 356 Secondary colors on top of primary colors
Black
PMS Cool Grey 7
Vectra logo usage guidelines and corporate color palette
14
The following is a list of color formulas for the primary and secondary Vectra colors.
Please be sure to use the Pantone Solid Coated or CMYK process color values for PRINT only. For digital applications such as web, PowerPoint and email, only use the RGB or hexadecimal colors values.
The Vectra corporate colors: Color formulas
DIGITAL
RGB R:0 G:128 B:0HEX #008000
PROCESS C:100 M:0 Y:100 K:50PANTONE PMS 356 C/CP
DIGITAL
RGB R:0 G:0 B:0HEX #000000
PROCESS C:0 M:0 Y:0 K:100PANTONE Black
DIGITAL
RGB R:135 G:138 B:143HEX #868A8F
PROCESS C:20 M:14 Y:12 K:40PANTONE PMS Cool Grey 7 C/CP
DIGITAL
RGB R:0 G:153 B:204HEX #0099CC
PROCESS C:86 M:8 Y:0 K:0PANTONE PMS 299 C/CP
DIGITAL
RGB R:255 G:230 B:0HEX #FFE600
PROCESS C:0 M:5 Y:98 K:0PANTONE PMS 108 C/CP
DIGITAL
RGB R:255 G:153 B:0HEX #FF9900
PROCESS C:0 M:46 Y:100 K:0
DIGITAL
RGB R:0 G:42 B:58HEX #002A3A
PROCESS C:100 M:47 Y:22 K:82PANTONE PMS 303 C/CP
DIGITAL
RGB R:114 G:23 B:237HEX #7217ED
DIGITAL
RGB R:204 G:0 B:51HEX #CC0033
DIGITAL
RGB R:134 G:211 B:229HEX #86D3E5
PROCESS C:41 M:8 Y:0 K:10PANTONE PMS 636 C/CP
DIGITAL
RGB R:25 G:52 B:89HEX #193459
PROCESS C:98 M:83 Y:39 K:31PANTONE PMS 534 C/CP
Primary (logo) colors Secondary colors
Vectra logo usage guidelines and corporate color palette
Brand management
© 2017 Vectra Networks, Inc. All rights reserved. Vectra, the Vectra Networks logo and Security that thinks are registered trademarks and Cognito, the Vectra Threat Labs and the Threat Certainty Index are trademarks of Vectra Networks. Other brand, product and service names are trademarks, registered trademarks or service marks of their respective holders.
Email [email protected] Phone +1 408-326-2020 Web vectra.ai
For further information or questions regardging the proper use of the Vectra logo and color palette, please contact:
Mike Banic VP of Marketing [email protected] +1 650-787-9763
Steve Fukuda Director of Marketing Communications [email protected] +1 408-326-2020, x133