2. Positive Technologies Corporate Identity Manual 2014
Introduction
Welcome to Positive Technologies. Provided within this document you will find the
guidelines, specifications and rules of usage for our visual identity.
A brand signifies more than just a logo mark. It represents who we are and what it is
that sets us apart from the crowd. Building our brand necessitates a consistency in
delivery and meaning as our brand awareness unfolds. This document is to be used as a
springboard for creating any collateral and/or communications on behalf of the Positive
Technology brand.
The guidelines described in this manual are the building blocks for creating
communication. It is essential that these specifications are closely followed.
4. Positive Technologies Corporate Identity Manual 2014
Page 2
Logo Mark
The Positive Technologies Corporate logo is the main
element of the Positive corporate identity. The logo mark
is the most visible and recognizable asset of the identity
program and guidelines for use of the logo should be
followed closely to ensure the integrity of the Brand.
5. Positive Technologies Corporate Identity Manual 2014
Page 3
Area of Isolation
The logo mark should always have a specific amount of
clear space surrounding it all times. The proper area of
isolation can be observed in the above graphic wherein
“x” is equal in height to the word TECHNOLOGIES and ”y”
is equal to the width of the letter ‘i’ in the word POSITIVE.
7. Positive Technologies Corporate Identity Manual 2014
Page 5
Color Palette
R 0
G 0
B 0
C 50
M 50
Y 50
K 100
Pantone® Black Pantone® 186 Pantone® Cool Gray 7
R 208
G 32
B 46
C 12
M 100
Y 92
K 3
R 153
G 152
B 153
C 43
M 35
Y 35
K 1
8. Positive Technologies Corporate Identity Manual 2014
Page 6
Typography
The primary typeface for Positive Technologies is Myriad
Pro. Myriad Pro is a sans-serif typeface that is easy to read
both on page and on screen and is a clean and distinct
font family. A number of weights are available within this
family and allow a wide range of flexibility for creative
expression. The typeface should always be optically
kerned with a tracking of 10.
Myriad Pro // Light
ABCDEFGHIJKLMN OPQRSTUVWXYZ
a b c d e f g h i j k l m n o p q r s t u v w x y z
1 2 3 4 5 6 7 8 9 0 & @ $ % ^ * [ ] { } / /
Myriad Pro // Semibold
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
1 2 3 4 5 6 7 8 9 0 & @ $ % ^ * [ ] { } / /
Myriad Pro // Bold
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
1 2 3 4 5 6 7 8 9 0 & @ $ % ^ * [ ] { } / /
9. Positive Technologies Corporate Identity Manual 2014
Page 7
Iconography // 2D Icons
A 2 dimensional icon library (shown here) and a 3
dimensional icon library (page 8) are used as story
building blocks. These graphics may be used separately
to communicate an idea or they may be used collectively
to build a more complex infographic.
1. Clock
7. Laptop
13. Speaker
19. Building
25. Telecom
2. Lens/Shutter
8. Computer Screen
14. Speech Bubbles
20. Bank
26. Trash Can
3. Gear
9. Battery
15. Wrench
21. Manufacturing
27. Empty Trash Can
4. Ripples
10. Document
16. Padlock
22. Server Stack
28. Shield
5. Globe
11. Envelope
17. Lightning Bolt
23. Server
6. Pie Chart
12. Flag
18. Electrical Plug
24. Person
10. Positive Technologies Corporate Identity Manual 2014
Page 8
Iconography // 3D Icons
A 2 dimensional icon library (page 7) and a 3 dimensional
icon library (shown here) are used as story building
blocks. These graphics may be used separately to
communicate an idea or they may be used collectively to
build a more complex infographic.
1. Clock
7. Laptop
13. Speaker
19. Building
25. Telecom
2. Lens/Shutter
8. Computer Screen
14. Speech Bubbles
20. Bank
26. Trash Can
3. Gear
9. Battery
15. Wrench
21. Manufacturing
27. Empty Trash Can
4. Ripples
10. Document
16. Padlock
22. Server Stack
28. Shield
5. Globe
11. Envelope
17. Lightning Bolt
23. Server
6. Pie Chart
12. Flag
18. Electrical Plug
24. Person
11. Positive Technologies Corporate Identity Manual 2014
Page 9
Illustration Style
Our illustration style is a single width line art style that
follows a photo realistic asthetic. A careful balance of
detail and story telling must be clearly observable.
12. Positive Technologies Corporate Identity Manual 2014
Page 10
Page Layout Grid
PRODUCT BRIEF - APPLICATION FIREWALL
As web applications proliferate so too do the attacks mounted against them
– spurred on by automation, advanced threats against web applications have
become the weapons of choice for cyber-attackers. Traditional firewalls,
IPS (intrusion protection), and NFGW (next gen firewalls) no longer provide
sufficient protection against attacks mounted against web applications and
failure to secure these applications will likely result in loss of confidential data,
fraud, loss of business and damage to your brand/reputation.
Positive Technologies Application Firewall™ benefits from the combined
knowledge of 200 security experts (Positive Research) and developers
who have applied modern science to secure your web applications from
emerging threats. With features not found in other solutions, Application
Firewall protects you against zero-day attacks, web-fraud, data leakage
and bot (anti-automation) control with an innovative use of normalization,
heuristics, automatic policy learning and behavioral analysis techniques
which result in lower costs due to shorter remediation cycles and far fewer
false positives.
Uncover Threats before they Strike
Application Firewall studies traffic patterns and events generated by your
business systems during normal business operations. It then uses this
history as a benchmark against which to measure future events, ensuring
anomalies are quickly discovered. Its built-in correlation engine (aggregation,
classification, prioritization of threats and attack chain analysis) and web
forensics (Log and pcap analysis) provide additional security to help you
guard against current and future threats.
Limit Risk and Accelerate Remediation
Virtual Patching, not possible with singular WAF solutions, ensures that
Application Firewall not only detects attacks and vulnerabilities but can
also be rapidly configured to defend against them while your development
team is finding a more permanent fix to the problem. This feature is
powerful: it generates a virtual patch by leveraging Positive Technologies
Application Inspector’s exploit generation capability that demonstrates how
vulnerabilities can be used to attack your business.
Eliminate HPP, HPC and Brute-Force Attacks
Application Firewall’s normalization techniques strip out any unnecessary
HTTP parameters from each query, passing only essential data to your servers.
This reduces the risk of your systems being bombarded with HTTP Parameter
Pollution and Contamination attacks, often used against traditional firewalls.
PROACTIVELY PROTECT WEB APPLICATIONS
AFAF
Application Firewall
continued
Key Benefits/Highlights
ª O-day Attacks: Application
Firewall adds an additional
layer of security by identifying
0-day attacks
ª Automatic virtual patching:
Application Firewall not
only detects attacks and
vulnerabilities, it defends
against them
ª Brute-force attacks: Detect
and counter brute-force
attacks with anti-fraud and
anti-bot techniques
ª Detect Web-fraud and
provide data leakage control
ª Anti-DDoS protection: Anti-
DDoS protection is provided at
the application layer
ª Built-in correlation engine:
Built-in correlation provides
aggregation, classification,
prioritization of threats and
analysis of attack chains
ª Web forensics: Web forensics
include Log and pcap (packet
capture) analysis
ª Anti-Automation: Anti-
Automation distinguishes
between humans and
automated clients that would
interact with a web app
ª Customized protection:
Out-of-the-box protection
for ERP, Online Banking and
Telecommunications Systems
Each document within the Positive Technologies collateral
library follows a simple 3 column design. Typically, body
copy spans 2 columns on the right of the page leaving
the left hand column as a sidebar to highlight or callout.
Product Brief Flyer Page Layout Grid
• .5” Margins
• 3 Column Design
• .25” Gutter