vectra logo usage guidelines and corporate color palette style guide and color... · m u ltic ored...

15
Vectra logo usage guidelines and corporate color palette October 2017

Upload: vunga

Post on 01-Mar-2019

227 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Vectra logo usage guidelines and corporate color palette Style Guide and Color... · m u ltic ored r p a nb c kg d. Do not place the Vectra logo within a frame ho ig sh e f y Do not

Vectra logo usage guidelines and corporate color palette

October 2017

Page 2: Vectra logo usage guidelines and corporate color palette Style Guide and Color... · m u ltic ored r p a nb c kg d. Do not place the Vectra logo within a frame ho ig sh e f y Do not

Vectra logo usage guidelines and corporate color palette

2

Table of Content

Introduction .............................................................................................................. 3

Our logo ................................................................................................................... 4

Primary and alternate logo variants ........................................................................... 5

Correct logo usage ............................................................................................... 6

Incorrect logo usage ............................................................................................. 8

The Cognito™ wordmark ........................................................................................... 9

Cognito image usage guidelines ............................................................................... 9

Vectra font family .................................................................................................... 10

Marketing collateral examples ................................................................................. 11

Corporate color palette ........................................................................................... 13

Color formulas .................................................................................................... 14

Brand management ................................................................................................ 15

Page 3: Vectra logo usage guidelines and corporate color palette Style Guide and Color... · m u ltic ored r p a nb c kg d. Do not place the Vectra logo within a frame ho ig sh e f y Do not

Vectra logo usage guidelines and corporate color palette

3

Introduction

This document provides you with some guidelines about how to properly use the Vectra logo, Vectra wordmarks and corporate color palette in a variety of marketing and sales materials.

The Vectra logo and wordmarks are among the most vital representations of our brand and are cornerstones of our identity. The proper use of our logo and wordmarks is necessary to preserve the integrity of the Vectra brand.

They include:

The Vectra wordmark and the Vectra Networks logo are registered trademarks.

Security that thinks.®The tagline Security that thinks® is a registered trademark.

Vectra®

The word Vectra® is a registered trademark.

Page 4: Vectra logo usage guidelines and corporate color palette Style Guide and Color... · m u ltic ored r p a nb c kg d. Do not place the Vectra logo within a frame ho ig sh e f y Do not

Vectra logo usage guidelines and corporate color palette

4

Our logo

Our logo is composed of four distinct elements: The green “chiclet”, the Vectra wordmark, the “Security that thinks.” tagline, and the registered trademark symbol. These elements and their relationship must never be altered or modified in any way. The proportions are shown on this page.

The Vectra logo always appears with the tagline “Security that thinks.” The logo may be used without this tagline only with prior approval.

Copyright text should be used when promoting Vectra materials in your outbound emails, web site and marketing collateral.

The Vectra copyright notice and trademark statement is:

© [year of publication] Vectra Networks Inc. All rights reserved. Vectra, the Vectra Networks logo and Security that thinks are registered trademarks and Cognito, the Vectra Threat Labs and the Threat Certainty Index are trademarks of Vectra Networks. Other brand, product and service names are trademarks, registered trademarks or service marks of their respective holders.

®

Wordmark

Recommended Clear Space

“Chiclet”(icon)

X

X

X

X

Page 5: Vectra logo usage guidelines and corporate color palette Style Guide and Color... · m u ltic ored r p a nb c kg d. Do not place the Vectra logo within a frame ho ig sh e f y Do not

Vectra logo usage guidelines and corporate color palette

5

Our logo: Primary and alternate variants

There are two variants of our logo, the primary horizontal configuration and the alternate stacked vertical configuration:

Primary horizontal logo

Color logo Black logo Grey logo

Color logo for dark backgrounds Reverse white logo for dark backgrounds

Alternate stacked logo

Color logo Black logo Grey logo Color logo for dark backgrounds

Reverse white logo for dark backgrounds

Page 6: Vectra logo usage guidelines and corporate color palette Style Guide and Color... · m u ltic ored r p a nb c kg d. Do not place the Vectra logo within a frame ho ig sh e f y Do not

Vectra logo usage guidelines and corporate color palette

6

Our logo: Correct usage

Consistent use of the Vectra logo ensures that it is easily recognizable across all forms of media.

The green Vectra “chiclet”:

DIGITAL

RGB R:0 G:128 B:0HEX #008000

PRINT

PROCESS C:100 M:0 Y:100 K:50PANTONE PMS 356 C/CP

The Vectra wordmark as part of the logo:

DIGITAL

RGB R:0 G:0 B:0HEX #000000

PRINT

PROCESS C:0 M:0 Y:0 K:100PANTONE Black

The Vectra “Security that thinks.” tagline as part of the logo:

DIGITAL

RGB R:135 G:138 B:143HEX #868A8F

PRINT

PROCESS C:20 M:14 Y:12 K:40PANTONE PMS Cool Grey 7 C/CP

See “The Vectra corporate colors: Color formulas” later in this guide for more detailed color specs.

The minimum clear space around the Vectra logo is equal to the height of the type in the logo.

X

X X

X X

X X

X X

1.0” (25.4 mm)

The preferred and minimum print size for all printed collateral, such as brochures and data sheets, is 1 inch or 25.4 mm. The preferred and minimum on-screen size for Web use is 90 pixels.

X

X X

X X

X X

X X

1.0” (25.4 mm)

Page 7: Vectra logo usage guidelines and corporate color palette Style Guide and Color... · m u ltic ored r p a nb c kg d. Do not place the Vectra logo within a frame ho ig sh e f y Do not

Vectra logo usage guidelines and corporate color palette

7

For other uses like signage or large banners and posters, exercise sound design judgment when scaling the logo. Give attention to the clarity, impact and quality of the logo’s appearance.

On light-colored backgrounds, the logo can be used with its original colors.

If the background is dark enough, the “dark-bg” version of the Vectra logo should be used.

Place the logo on backgrounds that provide high contrast and legibility to ensure that it is clear and recognizable. On colored backgrounds where the contrast is not strong enough for the original color logo to stand out, the dark-bg or all-white logos should be used.

No

The Vectra tagline does not stand out

No

Vectra word mark does not stand out

Yes

Yes

Our logo: Correct usage

Page 8: Vectra logo usage guidelines and corporate color palette Style Guide and Color... · m u ltic ored r p a nb c kg d. Do not place the Vectra logo within a frame ho ig sh e f y Do not

Vectra logo usage guidelines and corporate color palette

8

Altering or recreating the Vectra logo in any way can have an adverse impact on the consistency and brand recognition we strive to achieve and is strongly discouraged.

Featuring the solution

Automated threat management by

ABCompany ABCompany

Featuring the solutionFeaturing the solution

Automated threat management by

ABCompanyFeaturing the solution

Featuring the

Automated threat management by

ABCompany

Featuring the solution

Automated threat management by

ABCompany ABCompany

Featuring the solution

Automated threat management by

ABCompany ABCompany

Featuring the solution

Automated threat management by

ABCompany ABCompany

Do not change the color of the Vectra logo. Do not use the Vectra logo on a textured, multicolored or patterned background.

Do not place the Vectra logo within a frame or holding shape of any kind.

Do not position the Vectra logo at an angle.

Do not use the Vectra logo coupled with other text or content.

Do not use the Vectra logo in a sentence.

Do not lock up the Vectra logo with other logos. Do not use the Vectra logo in close proximityto other logos.

Do not use any one part of the Vectra logo on its own.

Do not change the color of the Vectra logo. Do not use the Vectra logo on a textured, multicolored or patterned background.

Do not place the Vectra logo within a frame or holding shape of any kind.

Featuring the solution

Automated threat management by

ABCompany ABCompany

Featuring the solutionFeaturing the solution

Automated threat management by

ABCompanyFeaturing the solution

Featuring the

Automated threat management by

ABCompany

Featuring the solution

Automated threat management by

ABCompany ABCompany

Featuring the solution

Automated threat management by

ABCompany ABCompany

Featuring the solution

Automated threat management by

ABCompany ABCompany

Do not change the color of the Vectra logo. Do not use the Vectra logo on a textured, multicolored or patterned background.

Do not place the Vectra logo within a frame or holding shape of any kind.

Do not position the Vectra logo at an angle.

Do not use the Vectra logo coupled with other text or content.

Do not use the Vectra logo in a sentence.

Do not lock up the Vectra logo with other logos. Do not use the Vectra logo in close proximityto other logos.

Do not use any one part of the Vectra logo on its own.Do not use any one part of the Vectra logo on its own.

Do not use the Vectra logo in a sentence. Do not use the Vectra logo coupled with other text or content.

Featuring the solution

Automated threat management by

ABCompany ABCompany

Featuring the solutionFeaturing the solution

Automated threat management by

ABCompanyFeaturing the solution

Featuring the

Automated threat management by

ABCompany

Featuring the solution

Automated threat management by

ABCompany ABCompany

Featuring the solution

Automated threat management by

ABCompany ABCompany

Featuring the solution

Automated threat management by

ABCompany ABCompany

Do not change the color of the Vectra logo. Do not use the Vectra logo on a textured, multicolored or patterned background.

Do not place the Vectra logo within a frame or holding shape of any kind.

Do not position the Vectra logo at an angle.

Do not use the Vectra logo coupled with other text or content.

Do not use the Vectra logo in a sentence.

Do not lock up the Vectra logo with other logos. Do not use the Vectra logo in close proximityto other logos.

Do not use any one part of the Vectra logo on its own.

Do not position the Vectra logo at an angle. Do not lock up the Vectra logo with other logos. Do not use the Vectra logo in close proximity to other logos.

Our logo: Incorrect usage

Page 9: Vectra logo usage guidelines and corporate color palette Style Guide and Color... · m u ltic ored r p a nb c kg d. Do not place the Vectra logo within a frame ho ig sh e f y Do not

Vectra logo usage guidelines and corporate color palette

9

Like the Vectra logo, Cognito is an important representation of our brand and a cornerstone of our identity. Proper use of the Cognito wordmark is vital to preserve the integrity of the Vectra brand.

Cognito™

The Cognito wordmark is a trademark of Vectra Networks and should always have the ™ symbol when it first appears.

Cognito image usage guidelinesThe consistent use of Cognito images ensures that it is easily recognizable as part of the Vectra brand across all forms of media.

The Cognito images and background colors should never be modified or redrawn. Altering or recreating Cognito can have an adverse impact on the consistency and brand recognition we strive to achieve and is strongly discouraged.

For web, videos, signage, banners, posters, apparel and all other uses, exercise sound design judgment when scaling Cognito images. Give attention to the scale, clarity, impact and quality of the Cognito appearance.

The Cognito™ wordmark

Incorrect

Incorrect

Correct

Incorrect

Page 10: Vectra logo usage guidelines and corporate color palette Style Guide and Color... · m u ltic ored r p a nb c kg d. Do not place the Vectra logo within a frame ho ig sh e f y Do not

Vectra logo usage guidelines and corporate color palette

10

The Vectra corporate font family for all printed material is Helvetica Neue.

Display font

Helvetica Neue Extended

ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz1234567890!@#$%^&*()_+Headlines and titles are set in Helvetica Neue Extended and should be sentence case.

Basic text font

Helvetica Neue

ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz1234567890!@#$%^&*()_+Body text is set in Helvetica Neue Light. Other weights and variants of the Helvetica Neue font family may be used for emphasis where needed.

Vectra font family

Page 11: Vectra logo usage guidelines and corporate color palette Style Guide and Color... · m u ltic ored r p a nb c kg d. Do not place the Vectra logo within a frame ho ig sh e f y Do not

Vectra logo usage guidelines and corporate color palette

11

These examples show the proper use of the Vectra logo in marketing collateral

© 2016 Vectra Networks Inc. All rights reserved. Vectra and the Vectra Networks logo are registered trademarks and Security that thinks, the Vectra Threat Labs, and the Threat Certainty Index are trademarks of Vectra Networks. Other brand, product and service names are trademarks, registered trademarks or service marks of their respective holders.

Email [email protected] Phone +1 408-326-2020 www.vectranetworks.com

Conclusion

The data science behind the Vectra Automated Threat

Management model represents an unprecedented innovation in

detection methodologies.

Leveraging packet-level behavioral analysis, this new model

uniquely combines human expertise, global learning and local

learning in one simple, integrated solution that greatly improves

security operations.

Detecting the plethora of new, highly sophisticated cyber attacks

continues to be a challenging prospect. But Vectra remains

steadfast in its commitment to the development of new tools and

methodologies that detect all manner of threats well into

the future.

For example, botnet monetization may indicate the presence

of crimeware but not a targeted attack. However, internal

reconnaissance and lateral movement behaviors are strongly

linked to targeted attacks.

In Bayesian network terms, spam emails have a lower linkage to

targeted attacks when compared to a host that exhibits staged

transfers of data or data smuggling behaviors.

The Vectra Automated Threat Management model also assigns

particular importance to behaviors that progress across strategic

phases of the kill chain. If a host exhibits command-and-control

communication, internal reconnaissance and lateral movement

behaviors, the risk of a targeted attack becomes more likely.

While the use of Bayesian networks is not quite as simple as

some of these examples, it offers a framework for understanding

events, hosts and detection methods to automatically elevate

coordinated attacks.

Although the underlying calculations are quite complicated, these

combined methods enable Vectra to prioritize attack behaviors

and hosts that represent the most serious threats with the highest

certainty in the network, as shown below.

2 Vectra Networks

Vectra Threat Certainty Index™ Vectra Ransomware Detection

Detections that matter

Vectra empowers IT security teams by condensing vast amounts of

data down to simple, actionable answers that save time, effort and

money. Alerts are automatically correlated by host and displayed

on the intuitive Threat Certainty Index™. The Threat Certainty Index

360-degree threat detection

to and from internal sources as well as the Internet. Vectra

automatically detects threats at every stage of an attack including

reconnaissance, command-and-control, lateral movement, data

tracks and scores the progression of an attack over time to

pinpoint and prioritize an active targeted attack.

Insightful real-time investigation

The Vectra platform intuitively shows the progression of a threat

across multiple phases of an attack with quick access to any level

of detail. The user interface shows the phase of the attack and a

summary of the threat that was detected.

Details about an attack are just one-click away so you can easily

view the exact packets between the compromised host in your

network and other internal assets it is attacking or external parties

with which it is communicating.

Security that thinks™ The Vectra platform continuously listens, learns, and remembers in order to automatically detect threats from

malware, targeted attackers and malicious insiders. Based on patent-pending data science and machine

learning, Vectra exposes the malicious behavior of known and unknown threats without relying on signatures or

reputation lists.

Full lifecycle detection of ransomware

Vectra detects ransomware campaigns against enterprises and

other organizations across all phases attack. The Vectra solution

ransomware as it seeks to damage critical assets.

In addition to detecting ransomware directly, the Vectra detects

network scans and spreading behavior that malware relies on to

Works for everything

Modern networks and the Internet-of-things contain a wide variety

of devices, operating systems and applications, and it is virtually

impossible for signatures, sandboxes, and endpoint agents to

support them all. By applying data science to the behaviors and

threats across the entire attack surface.

Works out of the box

The Vectra platform is deployed in passive mode and comes in a

variety of form factors to provide full visibility into your network.

The all-in-one Vectra X-series platform is suited for large core

networks and is easily deployed near the aggregation switches or

wide area network (WAN) gateways where they can see all user

White paper

The data science behind Vectra threat detections

Data Sheet

H I G H L I G H T S

• Detects active intrusions across all phases of attack

• Detects malicious behaviors in

signatures or reputation feeds

• Automates Tier 1 security analysis to empower staff and reduce response time

• Pinpoints physical hosts at the center of an active attack

• Delivers clear, intuitive analysis with one-click access to all supporting evidence

• Automatically tracks and scores threats in context over the full duration of attack

• systems, applications and devices

• Simple, passive deployment on a SPAN or TAP port

X-Series PlatformsS-Series Sensors

Vectra® Networks provides network-based behavioral analytics that automatically

detects and analyzes active intrusions across any and all phases of a cyber attack.

Vectra picks up where perimeter security leaves off by providing deep, continuous

attack as hackers attempt to spy, spread, and steal inside your network.

Using a combination of data science, machine learning and behavioral analysis, Vectra

proactively detects malicious attack behaviors that indicate the presence of known and

All detections are automatically scored and correlated to quickly prioritize the threats

that matter most so you can promptly stop the attack and mitigate its impact.

Detects all phases of an attack

Modern attackers thrive on their ability to persist and methodically spread through a

network to eventually gain access to key assets. Even the most sophisticated perimeter

security lacks the internal visibility needed to detect these threats.

cyber attacks, such as internal reconnaissance, the internal spread of malware, abuse

command-and-control and other hidden communications. All detected threats are

automatically scored, correlated, and prioritized to easily reveal the true scope and

progression of an attack.

Vectra Dashboard

Data sheet White paper

Page 12: Vectra logo usage guidelines and corporate color palette Style Guide and Color... · m u ltic ored r p a nb c kg d. Do not place the Vectra logo within a frame ho ig sh e f y Do not

Vectra logo usage guidelines and corporate color palette

12

These examples show the proper use of the Vectra logo in marketing collateral

OrganizationTribune Media

IndustryMedia

ChallengeDetect security breaches at Tribune Media’s headquarters and broadcast stations

Selection criteriaReal-time visibility into

network breaches

Results•

security threats

• Gained single view of threats across the enterprise network, including remote sites

• Prevented wasting time uncovering false positives

Media outlets are juicy targets for hackers, and Tribune Media is doing all it can to protect its high-value assets, including television and radio stations, with strong defenses. Its newest defense is real-time detection and analysis of active network breaches.

Tribune Media gets the scoop on network breaches

show they are a media company with canny survival skills. While many media outlets crashed and burned adjusting to an online, mobile world, Tribune Media excelled in engaging and connecting viewers across the nation with content across every distribution platform.

The Chicago-based media company is the nation’s largest independent broadcaster with 42 television and radio stations that reach more than 70 million households. WGN America, the company’s national entertainment network, is available in 73 million households. The company’s other holdings include Tribune Studios, Gracenote and WGN-Radio. Altogether, Tribune Media’s outlets are busy content engines producing local news, original programming and sporting events.

Know the unknown“Every security organization’s biggest challenge is knowing what you don’t know,”

company in 2014, after the company spun out its newspaper business to focus on broadcasting and digital media.

“I was hired to build a security infrastructure from the ground up, and we had a lot of security tools in place,” says Smith. “We were missing a solution that would give us real-time network visibility.”

Case Study

Broadcast news

Case study

Direct marketing

Corporate web site

Page 13: Vectra logo usage guidelines and corporate color palette Style Guide and Color... · m u ltic ored r p a nb c kg d. Do not place the Vectra logo within a frame ho ig sh e f y Do not

Vectra logo usage guidelines and corporate color palette

13

There are a wide range of colors in our corporate palette. As shown below, green, black and grey make up our primary colors that we most often use.

The additional secondary colors may be used as accent colors in web banners, signage and co-branded marketing material.

Please exercise good design judgment when you use and combine these colors in your Vectra partner marketing efforts.

The Vectra corporate color palette

BlackPMS 356

PMS Cool Grey 7

Primary (logo) colors Secondary colors

PMS 299 PMS 108 ORANGE

PMS 303

PMS 636

PURPLE

PMS 534

RED

PMS 356 Secondary colors on top of primary colors

Black

PMS Cool Grey 7

Page 14: Vectra logo usage guidelines and corporate color palette Style Guide and Color... · m u ltic ored r p a nb c kg d. Do not place the Vectra logo within a frame ho ig sh e f y Do not

Vectra logo usage guidelines and corporate color palette

14

The following is a list of color formulas for the primary and secondary Vectra colors.

Please be sure to use the Pantone Solid Coated or CMYK process color values for PRINT only. For digital applications such as web, PowerPoint and email, only use the RGB or hexadecimal colors values.

The Vectra corporate colors: Color formulas

DIGITAL

RGB R:0 G:128 B:0HEX #008000

PRINT

PROCESS C:100 M:0 Y:100 K:50PANTONE PMS 356 C/CP

DIGITAL

RGB R:0 G:0 B:0HEX #000000

PRINT

PROCESS C:0 M:0 Y:0 K:100PANTONE Black

DIGITAL

RGB R:135 G:138 B:143HEX #868A8F

PRINT

PROCESS C:20 M:14 Y:12 K:40PANTONE PMS Cool Grey 7 C/CP

DIGITAL

RGB R:0 G:153 B:204HEX #0099CC

PRINT

PROCESS C:86 M:8 Y:0 K:0PANTONE PMS 299 C/CP

DIGITAL

RGB R:255 G:230 B:0HEX #FFE600

PRINT

PROCESS C:0 M:5 Y:98 K:0PANTONE PMS 108 C/CP

DIGITAL

RGB R:255 G:153 B:0HEX #FF9900

PRINT

PROCESS C:0 M:46 Y:100 K:0

DIGITAL

RGB R:0 G:42 B:58HEX #002A3A

PRINT

PROCESS C:100 M:47 Y:22 K:82PANTONE PMS 303 C/CP

DIGITAL

RGB R:114 G:23 B:237HEX #7217ED

DIGITAL

RGB R:204 G:0 B:51HEX #CC0033

DIGITAL

RGB R:134 G:211 B:229HEX #86D3E5

PRINT

PROCESS C:41 M:8 Y:0 K:10PANTONE PMS 636 C/CP

DIGITAL

RGB R:25 G:52 B:89HEX #193459

PRINT

PROCESS C:98 M:83 Y:39 K:31PANTONE PMS 534 C/CP

Primary (logo) colors Secondary colors

Page 15: Vectra logo usage guidelines and corporate color palette Style Guide and Color... · m u ltic ored r p a nb c kg d. Do not place the Vectra logo within a frame ho ig sh e f y Do not

Vectra logo usage guidelines and corporate color palette

Brand management

© 2017 Vectra Networks, Inc. All rights reserved. Vectra, the Vectra Networks logo and Security that thinks are registered trademarks and Cognito, the Vectra Threat Labs and the Threat Certainty Index are trademarks of Vectra Networks. Other brand, product and service names are trademarks, registered trademarks or service marks of their respective holders.

Email [email protected] Phone +1 408-326-2020 Web vectra.ai

For further information or questions regardging the proper use of the Vectra logo and color palette, please contact:

Mike Banic VP of Marketing [email protected] +1 650-787-9763

Steve Fukuda Director of Marketing Communications [email protected] +1 408-326-2020, x133