SlideShare a Scribd company logo
1 of 12
Download to read offline
2014
Positive Technologies Corporate Identity Manual
Positive Technologies Corporate Identity Manual 2014
Introduction
Welcome to Positive Technologies. Provided within this document you will find the
guidelines, specifications and rules of usage for our visual identity.
A brand signifies more than just a logo mark. It represents who we are and what it is
that sets us apart from the crowd. Building our brand necessitates a consistency in
delivery and meaning as our brand awareness unfolds. This document is to be used as a
springboard for creating any collateral and/or communications on behalf of the Positive
Technology brand.
The guidelines described in this manual are the building blocks for creating
communication. It is essential that these specifications are closely followed.
Positive Technologies Corporate Identity Manual 2014
Page 1
Contents
Logo Mark .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 2
Area of Isolation .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
Logo Alternates .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 4
Color Palette .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 5
Typography .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 6
Iconography .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 7
Illustration Style .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 9
Page Layout Grid .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 10
Positive Technologies Corporate Identity Manual 2014
Page 2
Logo Mark
The Positive Technologies Corporate logo is the main
element of the Positive corporate identity. The logo mark
is the most visible and recognizable asset of the identity
program and guidelines for use of the logo should be
followed closely to ensure the integrity of the Brand.
Positive Technologies Corporate Identity Manual 2014
Page 3
Area of Isolation
The logo mark should always have a specific amount of
clear space surrounding it all times. The proper area of
isolation can be observed in the above graphic wherein
“x” is equal in height to the word TECHNOLOGIES and ”y”
is equal to the width of the letter ‘i’ in the word POSITIVE.
Positive Technologies Corporate Identity Manual 2014
Page 4
Logo Alternates
1 Color 2 Color 3 Color
Positive Technologies Corporate Identity Manual 2014
Page 5
Color Palette
R	 0
G	 0
B	 0
C	 50
M	50
Y	 50
K	 100
Pantone® Black Pantone® 186 Pantone® Cool Gray 7
R	 208
G	 32
B	 46
C	 12
M	100
Y	 92
K	 3
R	 153
G	 152
B	 153
C	 43
M	35
Y	 35
K	 1
Positive Technologies Corporate Identity Manual 2014
Page 6
Typography
The primary typeface for Positive Technologies is Myriad
Pro. Myriad Pro is a sans-serif typeface that is easy to read
both on page and on screen and is a clean and distinct
font family. A number of weights are available within this
family and allow a wide range of flexibility for creative
expression. The typeface should always be optically
kerned with a tracking of 10.
Myriad Pro // Light
ABCDEFGHIJKLMN OPQRSTUVWXYZ
a b c d e f g h i j k l m n o p q r s t u v w x y z
1 2 3 4 5 6 7 8 9 0 & @ $ % ^ * [ ] { } / /
Myriad Pro // Semibold
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
1 2 3 4 5 6 7 8 9 0 & @ $ % ^ * [ ] { } / /
Myriad Pro // Bold
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
1 2 3 4 5 6 7 8 9 0 & @ $ % ^ * [ ] { } / /
Positive Technologies Corporate Identity Manual 2014
Page 7
Iconography // 2D Icons
A 2 dimensional icon library (shown here) and a 3
dimensional icon library (page 8) are used as story
building blocks. These graphics may be used separately
to communicate an idea or they may be used collectively
to build a more complex infographic.
1. Clock
7. Laptop
13. Speaker
19. Building
25. Telecom
2. Lens/Shutter
8. Computer Screen
14. Speech Bubbles
20. Bank
26. Trash Can
3. Gear
9. Battery
15. Wrench
21. Manufacturing
27. Empty Trash Can
4. Ripples
10. Document
16. Padlock
22. Server Stack
28. Shield
5. Globe
11. Envelope
17. Lightning Bolt
23. Server
6. Pie Chart
12. Flag
18. Electrical Plug
24. Person
Positive Technologies Corporate Identity Manual 2014
Page 8
Iconography // 3D Icons
A 2 dimensional icon library (page 7) and a 3 dimensional
icon library (shown here) are used as story building
blocks. These graphics may be used separately to
communicate an idea or they may be used collectively to
build a more complex infographic.
1. Clock
7. Laptop
13. Speaker
19. Building
25. Telecom
2. Lens/Shutter
8. Computer Screen
14. Speech Bubbles
20. Bank
26. Trash Can
3. Gear
9. Battery
15. Wrench
21. Manufacturing
27. Empty Trash Can
4. Ripples
10. Document
16. Padlock
22. Server Stack
28. Shield
5. Globe
11. Envelope
17. Lightning Bolt
23. Server
6. Pie Chart
12. Flag
18. Electrical Plug
24. Person
Positive Technologies Corporate Identity Manual 2014
Page 9
Illustration Style
Our illustration style is a single width line art style that
follows a photo realistic asthetic. A careful balance of
detail and story telling must be clearly observable.
Positive Technologies Corporate Identity Manual 2014
Page 10
Page Layout Grid
PRODUCT BRIEF - APPLICATION FIREWALL
As web applications proliferate so too do the attacks mounted against them
– spurred on by automation, advanced threats against web applications have
become the weapons of choice for cyber-attackers. Traditional firewalls,
IPS (intrusion protection), and NFGW (next gen firewalls) no longer provide
sufficient protection against attacks mounted against web applications and
failure to secure these applications will likely result in loss of confidential data,
fraud, loss of business and damage to your brand/reputation.
Positive Technologies Application Firewall™ benefits from the combined
knowledge of 200 security experts (Positive Research) and developers
who have applied modern science to secure your web applications from
emerging threats. With features not found in other solutions, Application
Firewall protects you against zero-day attacks, web-fraud, data leakage
and bot (anti-automation) control with an innovative use of normalization,
heuristics, automatic policy learning and behavioral analysis techniques
which result in lower costs due to shorter remediation cycles and far fewer
false positives.
Uncover Threats before they Strike
Application Firewall studies traffic patterns and events generated by your
business systems during normal business operations. It then uses this
history as a benchmark against which to measure future events, ensuring
anomalies are quickly discovered. Its built-in correlation engine (aggregation,
classification, prioritization of threats and attack chain analysis) and web
forensics (Log and pcap analysis) provide additional security to help you
guard against current and future threats.
Limit Risk and Accelerate Remediation
Virtual Patching, not possible with singular WAF solutions, ensures that
Application Firewall not only detects attacks and vulnerabilities but can
also be rapidly configured to defend against them while your development
team is finding a more permanent fix to the problem. This feature is
powerful: it generates a virtual patch by leveraging Positive Technologies
Application Inspector’s exploit generation capability that demonstrates how
vulnerabilities can be used to attack your business.
Eliminate HPP, HPC and Brute-Force Attacks
Application Firewall’s normalization techniques strip out any unnecessary
HTTP parameters from each query, passing only essential data to your servers.
This reduces the risk of your systems being bombarded with HTTP Parameter
Pollution and Contamination attacks, often used against traditional firewalls.
PROACTIVELY PROTECT WEB APPLICATIONS
AFAF
Application Firewall
continued 
Key Benefits/Highlights
ª O-day Attacks: Application
Firewall adds an additional
layer of security by identifying
0-day attacks
ª Automatic virtual patching:
Application Firewall not
only detects attacks and
vulnerabilities, it defends
against them
ª Brute-force attacks: Detect
and counter brute-force
attacks with anti-fraud and
anti-bot techniques
ª Detect Web-fraud and
provide data leakage control
ª Anti-DDoS protection: Anti-
DDoS protection is provided at
the application layer  
ª Built-in correlation engine:
Built-in correlation provides
aggregation, classification,
prioritization of threats and
analysis of attack chains
ª Web forensics: Web forensics
include Log and pcap (packet
capture) analysis
ª Anti-Automation: Anti-
Automation distinguishes
between humans and
automated clients that would
interact with a web app
ª Customized protection:
Out-of-the-box protection
for ERP, Online Banking and
Telecommunications Systems
Each document within the Positive Technologies collateral
library follows a simple 3 column design. Typically, body
copy spans 2 columns on the right of the page leaving
the left hand column as a sidebar to highlight or callout.
Product Brief Flyer Page Layout Grid
•	 .5” Margins
•	 3 Column Design
•	 .25” Gutter

More Related Content

Viewers also liked

VisionsLive Style Guide November 2014_v1
VisionsLive Style Guide November 2014_v1VisionsLive Style Guide November 2014_v1
VisionsLive Style Guide November 2014_v1Barry McLeod
 
Source Fire Corporate Style Guide
Source Fire Corporate Style GuideSource Fire Corporate Style Guide
Source Fire Corporate Style GuideBluetext
 
Samsung Mobile Brand Guideline
Samsung Mobile Brand GuidelineSamsung Mobile Brand Guideline
Samsung Mobile Brand GuidelineChris Boyles
 

Viewers also liked (6)

VisionsLive Style Guide November 2014_v1
VisionsLive Style Guide November 2014_v1VisionsLive Style Guide November 2014_v1
VisionsLive Style Guide November 2014_v1
 
Wave slideshow
Wave slideshowWave slideshow
Wave slideshow
 
Source Fire Corporate Style Guide
Source Fire Corporate Style GuideSource Fire Corporate Style Guide
Source Fire Corporate Style Guide
 
JED Brand Guidelines
JED Brand GuidelinesJED Brand Guidelines
JED Brand Guidelines
 
Let’s make waves
Let’s make wavesLet’s make waves
Let’s make waves
 
Samsung Mobile Brand Guideline
Samsung Mobile Brand GuidelineSamsung Mobile Brand Guideline
Samsung Mobile Brand Guideline
 

Similar to Standards Guide_A4_V02

Concorde_TechBooklet_6.1.16
Concorde_TechBooklet_6.1.16Concorde_TechBooklet_6.1.16
Concorde_TechBooklet_6.1.16Kelly Knight
 
Bfs platform guidelines
Bfs platform guidelinesBfs platform guidelines
Bfs platform guidelinesDebbie Moore
 
SPi Global Services Overview
SPi Global Services OverviewSPi Global Services Overview
SPi Global Services Overviewbloevens
 
White Paper - Salesforce's Unique Approach to Retail Execution
White Paper - Salesforce's Unique Approach to Retail ExecutionWhite Paper - Salesforce's Unique Approach to Retail Execution
White Paper - Salesforce's Unique Approach to Retail ExecutionCarey Wong
 
Portal application development using Websphere Portlet Factory
Portal application development using Websphere Portlet FactoryPortal application development using Websphere Portlet Factory
Portal application development using Websphere Portlet FactoryDacartec Servicios Informáticos
 
Pspice userguide ingles
Pspice userguide inglesPspice userguide ingles
Pspice userguide inglesunoenero
 
Doors Getting Started
Doors Getting StartedDoors Getting Started
Doors Getting Startedsong4fun
 
01 introduction tovulcanmanual_v81_20120817-libre
01 introduction tovulcanmanual_v81_20120817-libre01 introduction tovulcanmanual_v81_20120817-libre
01 introduction tovulcanmanual_v81_20120817-libreWalquer huacani calsin
 
LH Brand BookFINAL
LH Brand BookFINAL LH Brand BookFINAL
LH Brand BookFINAL Clay Hathorn
 
Technology Planning Document V1.1small
Technology Planning Document V1.1smallTechnology Planning Document V1.1small
Technology Planning Document V1.1smalldigital.signage
 
Sage Intelligence 100 Microsoft Excel Tips and Tricks
Sage Intelligence 100 Microsoft Excel Tips and TricksSage Intelligence 100 Microsoft Excel Tips and Tricks
Sage Intelligence 100 Microsoft Excel Tips and TricksBurCom Consulting Ltd.
 
In designcs5 scripting tutorial
In designcs5 scripting tutorialIn designcs5 scripting tutorial
In designcs5 scripting tutorialMustfeez Rasul
 

Similar to Standards Guide_A4_V02 (20)

Branding Guidlines
Branding GuidlinesBranding Guidlines
Branding Guidlines
 
Concorde_TechBooklet_6.1.16
Concorde_TechBooklet_6.1.16Concorde_TechBooklet_6.1.16
Concorde_TechBooklet_6.1.16
 
Bfs platform guidelines
Bfs platform guidelinesBfs platform guidelines
Bfs platform guidelines
 
SPi Global Services Overview
SPi Global Services OverviewSPi Global Services Overview
SPi Global Services Overview
 
White Paper - Salesforce's Unique Approach to Retail Execution
White Paper - Salesforce's Unique Approach to Retail ExecutionWhite Paper - Salesforce's Unique Approach to Retail Execution
White Paper - Salesforce's Unique Approach to Retail Execution
 
Portal application development using Websphere Portlet Factory
Portal application development using Websphere Portlet FactoryPortal application development using Websphere Portlet Factory
Portal application development using Websphere Portlet Factory
 
Pspice userguide ingles
Pspice userguide inglesPspice userguide ingles
Pspice userguide ingles
 
Doors Getting Started
Doors Getting StartedDoors Getting Started
Doors Getting Started
 
Plesk Modules
Plesk ModulesPlesk Modules
Plesk Modules
 
Acad acg
Acad acgAcad acg
Acad acg
 
01 introduction tovulcanmanual_v81_20120817-libre
01 introduction tovulcanmanual_v81_20120817-libre01 introduction tovulcanmanual_v81_20120817-libre
01 introduction tovulcanmanual_v81_20120817-libre
 
Plant Simulation Passo a Passo
Plant Simulation Passo a PassoPlant Simulation Passo a Passo
Plant Simulation Passo a Passo
 
Manual Civil 3d Ingles
Manual Civil 3d InglesManual Civil 3d Ingles
Manual Civil 3d Ingles
 
LH Brand BookFINAL
LH Brand BookFINAL LH Brand BookFINAL
LH Brand BookFINAL
 
Vba uk
Vba ukVba uk
Vba uk
 
Technology Planning Document V1.1small
Technology Planning Document V1.1smallTechnology Planning Document V1.1small
Technology Planning Document V1.1small
 
Sage Intelligence 100 Microsoft Excel Tips and Tricks
Sage Intelligence 100 Microsoft Excel Tips and TricksSage Intelligence 100 Microsoft Excel Tips and Tricks
Sage Intelligence 100 Microsoft Excel Tips and Tricks
 
In designcs5 scripting tutorial
In designcs5 scripting tutorialIn designcs5 scripting tutorial
In designcs5 scripting tutorial
 
Manual rational rose
Manual rational roseManual rational rose
Manual rational rose
 
Watertowercafe live
Watertowercafe liveWatertowercafe live
Watertowercafe live
 

Standards Guide_A4_V02

  • 2. Positive Technologies Corporate Identity Manual 2014 Introduction Welcome to Positive Technologies. Provided within this document you will find the guidelines, specifications and rules of usage for our visual identity. A brand signifies more than just a logo mark. It represents who we are and what it is that sets us apart from the crowd. Building our brand necessitates a consistency in delivery and meaning as our brand awareness unfolds. This document is to be used as a springboard for creating any collateral and/or communications on behalf of the Positive Technology brand. The guidelines described in this manual are the building blocks for creating communication. It is essential that these specifications are closely followed.
  • 3. Positive Technologies Corporate Identity Manual 2014 Page 1 Contents Logo Mark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Area of Isolation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Logo Alternates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Color Palette . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Typography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Iconography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Illustration Style . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Page Layout Grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
  • 4. Positive Technologies Corporate Identity Manual 2014 Page 2 Logo Mark The Positive Technologies Corporate logo is the main element of the Positive corporate identity. The logo mark is the most visible and recognizable asset of the identity program and guidelines for use of the logo should be followed closely to ensure the integrity of the Brand.
  • 5. Positive Technologies Corporate Identity Manual 2014 Page 3 Area of Isolation The logo mark should always have a specific amount of clear space surrounding it all times. The proper area of isolation can be observed in the above graphic wherein “x” is equal in height to the word TECHNOLOGIES and ”y” is equal to the width of the letter ‘i’ in the word POSITIVE.
  • 6. Positive Technologies Corporate Identity Manual 2014 Page 4 Logo Alternates 1 Color 2 Color 3 Color
  • 7. Positive Technologies Corporate Identity Manual 2014 Page 5 Color Palette R 0 G 0 B 0 C 50 M 50 Y 50 K 100 Pantone® Black Pantone® 186 Pantone® Cool Gray 7 R 208 G 32 B 46 C 12 M 100 Y 92 K 3 R 153 G 152 B 153 C 43 M 35 Y 35 K 1
  • 8. Positive Technologies Corporate Identity Manual 2014 Page 6 Typography The primary typeface for Positive Technologies is Myriad Pro. Myriad Pro is a sans-serif typeface that is easy to read both on page and on screen and is a clean and distinct font family. A number of weights are available within this family and allow a wide range of flexibility for creative expression. The typeface should always be optically kerned with a tracking of 10. Myriad Pro // Light ABCDEFGHIJKLMN OPQRSTUVWXYZ a b c d e f g h i j k l m n o p q r s t u v w x y z 1 2 3 4 5 6 7 8 9 0 & @ $ % ^ * [ ] { } / / Myriad Pro // Semibold ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 1 2 3 4 5 6 7 8 9 0 & @ $ % ^ * [ ] { } / / Myriad Pro // Bold ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 1 2 3 4 5 6 7 8 9 0 & @ $ % ^ * [ ] { } / /
  • 9. Positive Technologies Corporate Identity Manual 2014 Page 7 Iconography // 2D Icons A 2 dimensional icon library (shown here) and a 3 dimensional icon library (page 8) are used as story building blocks. These graphics may be used separately to communicate an idea or they may be used collectively to build a more complex infographic. 1. Clock 7. Laptop 13. Speaker 19. Building 25. Telecom 2. Lens/Shutter 8. Computer Screen 14. Speech Bubbles 20. Bank 26. Trash Can 3. Gear 9. Battery 15. Wrench 21. Manufacturing 27. Empty Trash Can 4. Ripples 10. Document 16. Padlock 22. Server Stack 28. Shield 5. Globe 11. Envelope 17. Lightning Bolt 23. Server 6. Pie Chart 12. Flag 18. Electrical Plug 24. Person
  • 10. Positive Technologies Corporate Identity Manual 2014 Page 8 Iconography // 3D Icons A 2 dimensional icon library (page 7) and a 3 dimensional icon library (shown here) are used as story building blocks. These graphics may be used separately to communicate an idea or they may be used collectively to build a more complex infographic. 1. Clock 7. Laptop 13. Speaker 19. Building 25. Telecom 2. Lens/Shutter 8. Computer Screen 14. Speech Bubbles 20. Bank 26. Trash Can 3. Gear 9. Battery 15. Wrench 21. Manufacturing 27. Empty Trash Can 4. Ripples 10. Document 16. Padlock 22. Server Stack 28. Shield 5. Globe 11. Envelope 17. Lightning Bolt 23. Server 6. Pie Chart 12. Flag 18. Electrical Plug 24. Person
  • 11. Positive Technologies Corporate Identity Manual 2014 Page 9 Illustration Style Our illustration style is a single width line art style that follows a photo realistic asthetic. A careful balance of detail and story telling must be clearly observable.
  • 12. Positive Technologies Corporate Identity Manual 2014 Page 10 Page Layout Grid PRODUCT BRIEF - APPLICATION FIREWALL As web applications proliferate so too do the attacks mounted against them – spurred on by automation, advanced threats against web applications have become the weapons of choice for cyber-attackers. Traditional firewalls, IPS (intrusion protection), and NFGW (next gen firewalls) no longer provide sufficient protection against attacks mounted against web applications and failure to secure these applications will likely result in loss of confidential data, fraud, loss of business and damage to your brand/reputation. Positive Technologies Application Firewall™ benefits from the combined knowledge of 200 security experts (Positive Research) and developers who have applied modern science to secure your web applications from emerging threats. With features not found in other solutions, Application Firewall protects you against zero-day attacks, web-fraud, data leakage and bot (anti-automation) control with an innovative use of normalization, heuristics, automatic policy learning and behavioral analysis techniques which result in lower costs due to shorter remediation cycles and far fewer false positives. Uncover Threats before they Strike Application Firewall studies traffic patterns and events generated by your business systems during normal business operations. It then uses this history as a benchmark against which to measure future events, ensuring anomalies are quickly discovered. Its built-in correlation engine (aggregation, classification, prioritization of threats and attack chain analysis) and web forensics (Log and pcap analysis) provide additional security to help you guard against current and future threats. Limit Risk and Accelerate Remediation Virtual Patching, not possible with singular WAF solutions, ensures that Application Firewall not only detects attacks and vulnerabilities but can also be rapidly configured to defend against them while your development team is finding a more permanent fix to the problem. This feature is powerful: it generates a virtual patch by leveraging Positive Technologies Application Inspector’s exploit generation capability that demonstrates how vulnerabilities can be used to attack your business. Eliminate HPP, HPC and Brute-Force Attacks Application Firewall’s normalization techniques strip out any unnecessary HTTP parameters from each query, passing only essential data to your servers. This reduces the risk of your systems being bombarded with HTTP Parameter Pollution and Contamination attacks, often used against traditional firewalls. PROACTIVELY PROTECT WEB APPLICATIONS AFAF Application Firewall continued  Key Benefits/Highlights ª O-day Attacks: Application Firewall adds an additional layer of security by identifying 0-day attacks ª Automatic virtual patching: Application Firewall not only detects attacks and vulnerabilities, it defends against them ª Brute-force attacks: Detect and counter brute-force attacks with anti-fraud and anti-bot techniques ª Detect Web-fraud and provide data leakage control ª Anti-DDoS protection: Anti- DDoS protection is provided at the application layer   ª Built-in correlation engine: Built-in correlation provides aggregation, classification, prioritization of threats and analysis of attack chains ª Web forensics: Web forensics include Log and pcap (packet capture) analysis ª Anti-Automation: Anti- Automation distinguishes between humans and automated clients that would interact with a web app ª Customized protection: Out-of-the-box protection for ERP, Online Banking and Telecommunications Systems Each document within the Positive Technologies collateral library follows a simple 3 column design. Typically, body copy spans 2 columns on the right of the page leaving the left hand column as a sidebar to highlight or callout. Product Brief Flyer Page Layout Grid • .5” Margins • 3 Column Design • .25” Gutter