WELLNET TREEBRAND IDENTITY CREATIVE CONCEPT 1.02Sourcefire, Inc. (NASDAQ: FIRE), a world leader inintelligent cybersecurity solutions, is transforming the wayglobal large- to mid-size organizations and governmentagencies manage and minimize network security risks. Withsolutions from a next-generation network security platformto advanced malware protection, Sourcefire providescustomers with Agile Security® that is as dynamic as thereal world it protects and the attackers against which itdefends. Trusted for more than 10 years, Sourcefire hasbeen consistently recognized for its innovation and industryleadership with numerous patents, world-class research,and award-winning technology. Today, the nameSourcefire has grown synonymous with innovation, securityintelligence and agile end-to-end security protection.SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
HEX#EB0028RGBr235 g0 b40CMYKc1 m100 y92 k0PANTONEPMS 185CHEX#000000RGBr0 g0 b0CMYKc75 m68 y67 k90PANTONEBlack CBRAND IDENTITY LOGO 1.03SOURCEFIRE BRAND IDENTITY GUIDELINES 2012Our logo is the most visible and definingsignal of the Sourcefire brand identity.It is one of our most important assets andmust be used carefully and consistentlyto ensure that our brand is effectivelypresented and promoted across allmedia.
BRAND IDENTITY SECONDARY MARK 1.04SOURCEFIRE BRAND IDENTITY GUIDELINES 2012In addition to our logo we introduce asecondary mark that we use consistentlythroughout all collateral.Below you will see two examples of how wehave applied this mark to collateral. In onewe place it to the far right of the logo with agradient line, and in the other we use it as awatermark on a business card.
The Sourcefire logo can be applied in itspositive form or reversed out on contrastingbackground. These two are the preferredapplications of our logo.PREFERRED POSITIVE LOGOALTERNATE REVERSED LOGOBRAND IDENTITY LOGO APPLICATION 1.05SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
The preferred use of the logo are both fullcolor on white and reversed color on black.Solid black on white background isacceptable for black and white applications,and the logo may also be reversed out inwhite on a black background.POSITIVE ON WHITEBLACK ON WHITEREVERSED ON BLACKREVERSED ON BLACKSOURCEFIRE BRAND IDENTITY GUIDELINES 2012BRAND IDENTITY LOGO VERSIONS 1.06
BRAND IDENTITY LOGO CLEAR SPACE AND MINIMUM SIZE 1.07MINIMUM SIZE: PRINT MINIMUM SIZE: SCREEN50PX1 INCHSCLEAR SPACESSSOURCEFIRE BRAND IDENTITY GUIDELINES 2012It is important that the Sourcefire logobe visible and uncluttered in its context.A minimum of “S” area around thelogo should be observed. These sizerequirements should be followed for alllogo applications. The “S” measurementrepresents the height of the “S” in theSourcefire logo.The preferred minimum print size for thelogo is 1” wide. The logo should alwaysbe scaled proportionally width/height.The preferred minimum pixel size forthe logo is 50px wide. The logo shouldalways be scaled proportionally width/height.
The Sourcefire logo has beendesigned to effectively promotethe brand in its unaltered stateand should not be modified orcorrupted in any manner.Improper use of the logocompromises the integrity of ourbrand and makes legalprotection more difficult.These examples represent someof the possible misuses–carefulconsideration should be given tocircumstances that are notillustrated in these examples.Do not place the logo on complex imagesDo not add elements to the logoDo not add a drop shadow or filter effectDo not alter logo colorsDo not place the logo on an angleDo not recreate elements of the logo Do not distort or change proportions of the logo Do not place the logo on a patternDo not place the logo within another shapeBRAND IDENTITY LOGO INCORRECT USAGE 1.08SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
SOURCEFIRESOURCEFIRE BRAND ELEMENTS 2.02SOURCEFIRE BRAND IDENTITY GUIDELINES 2012Sourcefire, Inc. (NASDAQ: FIRE), a world leader in intelligent cybersecuritysolutions, is transforming the way global large- to mid-size organizations andgovernment agencies manage and minimize network security risks. Withsolutions from a next-generation network security platform to advancedmalware protection, Sourcefire provides customers with Agile Security® that isas dynamic as the real world it protects and the attackers against which itdefends. Trusted for more than 10 years, Sourcefire has been consistentlyrecognized for its innovation and industry leadership with numerous patents,world-class research, and award-winning technology. Today, the nameSourcefire has grown synonymous with innovation, security intelligence andagile end-to-end security protection.
PRIMARY PALETTEBRAND ELEMENTS COLOR PRIMARY PALETTE 2.03SOURCEFIRE BRAND IDENTITY GUIDELINES 2012HEX#ecececRGBr118 g118 b118CMYKc55 m47 y46 k11PANTONEPMS 22% 6CHEX#EB0028RGBr235 g0 b40CMYKc1 m100 y92 k0PANTONEPMS 185CSourcefire’s brand is also unified by a consistent color standard. The color palette is divided into two categories, primary and secondary. The primary palette should be dominant invisual expressions. The secondary palette provides flexibility to the system and allows a broader range of color identification.Consistent usage will enhance the visual presentation of the brand across all expressions.*Please note that upon receiving the Sourcefire brand guidelines we can adjust all colors in this document accordingly; all color shades have been pulled directly from thesourcefire logo and website*HEX#000000RGBr0 g0 b0CMYKc75 m68 y67 k90PANTONEBlack C19770 Patuxent Woods Drive | Columbia, MD 21046 | p. 800.917.4134 | f. 410.290.0024 | www.sourcefire.com
PANTONESECONDARY PALETTESOURCEFIRE BRAND IDENTITY GUIDELINES 2012BRAND ELEMENTS COLOR SECONDARY PALETTE 2.04HEX#F9E431RGBr249 g228 b49CMYKc4 m4 y90 k0PANTONEPMS 113CHEX#1DB24BRGBr112 g136 b56CMYKc79 m0 y100 k0PANTONEPMS 361CHEX#E32B25RGBr174 g84 b122CMYKc32 m79 y32 k3PANTONEPMS 485CHEX#2F9AA6RGBr0 g90 b134CMYKc96 m64 y26 k8PMS 2945CThe colors reflected in a printout of this guide should not be considered an accurate PANTONE color match. Refer to the currentedition of the PANTONE Color Formula Guide for accurate color assessment. PANTONE® is a registered trademark of Pantone, Inc.PMS refers to Pantone Matching System.
ClanOTClanOT LightABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789ClanOT BookABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789ClanOT MediumABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789ClanOT BoldABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789USAGE GUIDELINES• Large Titling• Page TitlingBRAND ELEMENTS PRIMARY TYPOGRAPHY 2.05SOURCEFIRE BRAND IDENTITY GUIDELINES 2012ClanOT Light is the primary font for page titling, and large titling. Thesefonts, in concert with Ultimate Light Medium make up the refreshedSourcefire brand.
The Nexa family is used for supporting typography. Used primarily fornavigation in the website, its various weights can also be used for subnavigation or headers.NEXANexa LightABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789Nexa RegularABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789Nexa BoldNexa BlackNexa BookUSEAGE GUIDELINES• Large Promo SubtitleBRAND ELEMENTS SUPPORTING TYPOGRAPHY 2.06SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
A variety of the Ultimate font faces make up the bulk of context. Thecombination of Ultimate Light and Medium make up the body copy,and also are used in side promos and sub navigation.ULTIMATEUltimate LightABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789Ultimate RegularABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789Ultimate Demi BoldUltimate Medium ItalicUltimate BoldUSEAGE GUIDELINES• Call to action type• Main body type• Navigation• Subheaders on promosBRAND ELEMENTS SUPPORTING TYPOGRAPHY 2.07SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS ICONOGRAPHY 2.08SOURCEFIRE BRAND IDENTITY GUIDELINES 2012ICONOGRAPHYIcons should be simple two-dimensional graphics that are one color and easilycommunicate our services. Icons can appear on the homepage and in other collateral.Any new icons should follow above look and feel.
The website designs allcontain a heavy topsection which is balancedby a more open, lighterbottom half. The brand isreinforced by using thebrand colors, red, blackand grey. Top dynamicleads use the newillustration styles to providebursts of color that attractthe eye to importantmessaging or call toactions.Page variety can beexplored by using varioustemplates and illustrationstyles.This dynamic lead usesred dot indicators thatshow which promo iscurrently being viewed.BRAND ELEMENTS WEB 2.09SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
The drop down navigationshould be styled withsubnavigation links on theright, and image promoon the left.The drop down boxshould have sometransparency and subtlebackground dropshadow.BRAND ELEMENTS WEB 2.10SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS WEB 2.11SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS WEB 2.12SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS WEB 2.13SOURCEFIRE BRAND IDENTITY GUIDELINES 2012Clicking the agile securitybutton expands the pageto reveal video and typepromos. If the user clicksthe agile security button inthe top right of the homepage it sends the userdown the page and thissection automaticallyexpands.
BRAND ELEMENTS WEB 2.14SOURCEFIRE BRAND IDENTITY GUIDELINES 2012Landing pages use adifferent type of dynamiclead at the top of the page.This style uses three thinline timers that fill with redas time passes. When theline is completely red thenext promo will appearand the next timer willbegin.
BRAND ELEMENTS WEB 2.15SOURCEFIRE BRAND IDENTITY GUIDELINES 2012Generic pages use a staticdynamic lead at the top ofpages. Below the dynamiclead this template uses abasic three column grid.
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012BRAND ELEMENTS MOBILE SITE 2.16The website features aresponsive design, so it isoptimized for mobiledevices. The design isslightly different thandesktop on mobile devicesbut features many of thesame styles, dynamicleads, and promos.
BRAND ELEMENTS EMAIL TEMPLATE 2.17SOURCEFIRE BRAND IDENTITY GUIDELINES 2012Email templates also usecustom illustrations in topheaders. These use the lighterversions of illustration, and likethe website use a balance ofSourcefire red, black, and grey.Ultimate Medium 14ptUltimate Light 15ptUltimate Light 12ptUltimate Light 12ptUltimate Light 14ptUltimate Medium 16ptClan OT Medium 18ptClan OT Medium 24pt
BRAND ELEMENTS POWERPOINT 2.18SOURCEFIRE BRAND IDENTITY GUIDELINES 2012Powerpoint templates use thelighter version of this particularillustration. Other light versionsof illustrations could besubstituted as long as theillustration feels balanced in thecomposition.Clan OT Light 60ptNexa Black 18pt
BRAND ELEMENTS POWERPOINT 2.19SOURCEFIRE BRAND IDENTITY GUIDELINES 2012The interior Powerpoint templateis light like the cover template.This keeps the design consistentand reduces the ink used inprinting.Clan OT Light 38ptUltimate Regular 22ptUltimate Light 18pt
BRAND ELEMENTS ILLUSTRATION STYLE 2.20SOURCEFIRE BRAND IDENTITY GUIDELINES 2012Illustrations all have light anddark versions. These illustrationsuse a consistent color paletteand contain the same level ofcomplexity that reflects thetheme of the illustration. Thecomplexity is based on anillustration’s shape, interiordesign, outer line work, and iconwork in the background.Clan OT Light 51ptNexa Black 24pt
BRAND ELEMENTS ILLUSTRATION STYLE 2.21SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS ILLUSTRATION STYLE 2.22SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS ILLUSTRATION STYLE 2.23SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS ILLUSTRATION STYLE 2.24SOURCEFIRE BRAND IDENTITY GUIDELINES 2012The illustrations without words should be used for the websitedynamic leads since the text shown on the website overlays theimage that is uploaded.
BRAND ELEMENTS STATIONARY 2.25SOURCEFIRE BRAND IDENTITY GUIDELINES 201219770 Patuxent Woods Drive | Columbia, MD 21046 | p. 800.917.4134 | f. 410.290.0024 | www.sourcefire.com9770 Patuxent Woods DriveColumbia, MD 21046www.sourcefire.comStationary is kept open and light.Secondary mark is used in allpieces of collateral.Ultimate Light 7ptUltimate Light 7ptUltimate Regular 8ptUltimate Light 7ptUltimate Light 7ptUltimate Medium 7ptJohn DoeVice President9770 Patuxent Woods DriveColumbia, MD 21046w. 1 (800) 917-4134c. 1 (301) firstname.lastname@example.orgUltimate Light 10pt
BRAND ELEMENTS DATA SHEET 2.26SOURCEFIRE BRAND IDENTITY GUIDELINES 20121Change is constant.We all know information technology deployments are com-plex and chaotic. In the real world, the IT environment changesunpredictably, and staff is pressured for time, experience andresources. Threats are, in most cases, unpredictable and un-knowable. In the real world, you cannot effectively addresssecurity with static defenses. Sourcefire takes a new approach tosecurity—one that quickly and effectively protects your environ-ment against rapidly changing attacks. Designed to deliver AgileSecurity™, Sourcefire’s solutions, from industry-leading next-generation network security appliances to advanced malwareprotection, are as dynamic as the real world they protect andthe attackers against which they defend.1AGILE SECURITY TITLIGN HERE LOREM1A continuous process,supported by advancedtechnologies, that enablesyou to:• SEE everything in yourenvironment• LEARN by applyingsecurity intelligence todata• ADAPT defensesautomatically ACT inreal-timeAgile SecuritySUB TITLING TO GO HERE LOREM IPSMSolutions At A GlanceTo better protect your unique environment, Sourcefire’s portfolio of intelligent cybersecurity solutionsincludes:Next-Generation Intrusion Prevention System (NGIPS)Sourcefire NGIPS sets a new standard in advanced threat protection, integrating real-time contextualawareness, intelligent security automation, and unprecedented performance with industry-leadingthreat prevention effectiveness. Optional application control and URL filtering provide greater threatmitigation over applications, users and suspicious sites.Next-Generation Firewall (NGFW)Sourcefire provides the only NGFW to combine control and effective threat protection. NGFW in-cludes the world’s most powerful NGIPS, integrated application control and firewall functionality in auniversal, high-performance security appliance that, unlike other offerings, requires no compromises.2Advanced Malware ProtectionOur enterprise-class advanced jmalware analysis and protection solutions are among the first touse ‘big data’ to provide the visibility and control you need to discover, understand and stop threatsmissed by other security layers. A version to protect against mobile malware is also available.Security Innovation At Work For YouSourcefire’s portfolio of cybersecurity solutions incorporate innovative and patented technologiesdesigned to fuel your advantage against attackers.2AGILE SECURITY TITLIGN HERE LOREMFirePOWER™ Network Security Appliances – our purpose-built networksecurity appliances feature unique hardware acceleration technology that de-livers industry-best threat protection with unmatched performance, scalabilityand energy efficiencyFireSIGHT® Defense Center – the central management console for allSourcefire security solutions featuring patented real-time awareness tech-nology for next-generation solutions that provides full stack visibility, eventcorrelation and security automation to respond to changing conditions andnew attacksFireAMP™ Advanced Malware Protection – an intelligent malware pro-tection solution that leverages cloud computing and large-scale data miningto deliver a uniquely effective approach to detection, analysis and remedia-tion of advanced malware outbreaksFireCLOUD™ Security Intelligence Services – collective intelligence deliv-ered from our cloud-based, big data analytics system designed to discover,analyze and store information on network threats, advanced malware, filereputation and other security dataKey CapabilitiesProviding continuous protection in a world of continuous change, Sourcefire solutions stand apartwith the following key capabilities:Advanced Threat Protection – FirePOWER next-generation network security appliances deliverthe best threat prevention that money can buy—period. Our industry-leading security protection andeffectiveness is validated by independent third-party testing and thousands of satisfied customersaround the world. FireAMP provides additional protection, stopping malware at the point of entry.Data sheet templates also use custom illustrations in top headers. Theseuse the lighter versions of illustration, and like the website use a balance ofSourcefire red, black, and grey.Ultimate Light 10pt Ultimate Light 8ptUltimate Demi 8ptUltimate Light 22ptUltimate Light 12ptUltimate Demi 12ptUltimate Demi 10ptUltimate Light 11pt
BRAND ELEMENTS WHITE PAPER 2.27SOURCEFIRE BRAND IDENTITY GUIDELINES 2012White paper templates use the secondary mark on the title page.Throughout they also use a balance of Sourcefire red, black, and grey.1SNORT® THREATPREVENTIONCOMPONENTS21TITLIGN HERE LOREMINTRODUCTIONSnort’s threat detection and prevention components work to-gether to reassemble traffic, prevent evasions, detect threats,and output information about these threats without creatingfalse positives or missing legitimate threats.The threat prevention process in Snort consistsof multiple components which work together to reassembletraffic as a target host would see it, identify traffic areas thatmay contain threats, and match Snort rules against thesetraffic areas to recognize attacks. Together, these componentsefficiently detect threats and reduce or eliminate false alarms.The threat prevention components of Snort includea packet classifier, which decides which packets are inspect-ed; an IP defragmenter and aTCP reassembler, which ensureSnort inspects IP fragments andTCP segments in the properorder; a portscan processor, which watches for portscans,and a detection engine, which performs protocol normaliza-tion, rule matching, and many other detection functions.Snort’s detection components reside at the core of the threatprevention capabilities of Sourcefire Intrusion Sensors.Theyensure that threats are detected, false positives and nega-tives are avoided, and detection performance is high.BENEFITSThe threat prevention components of Snort:• Select traffic to be inspected, ensuring that only traffic thatcould be vulnerable is inspected. Looking at only relevanttraffic helps Snort’s performance and limits the potential forfalse positives.• Normalize traffic to ensure that it is in a consistent formatand in the proper order prior to inspection. By putting trafficin a consistent format and inthe order that the target sees it, Snort avoids the potential forevasion.• Match traffic against one of the industry’s largest rulesetsusing a number of different detection methods. By usingmultiple detection methods and using a large ruleset, Snortensures thata wide variety of threats is detected and false negatives areavoided.and security automation to respond to changingTHREAT PREVENTION COMPONENTSPACKET CLASSIFIERSnort begins processing the traffic it sees by classifying it ata high level.The classifier decides whether a packet is:• Token Ring/Ethernet/etc. • VLAN/NotVLAN• IP/Not IP• TCP/UDP/ICMPIP DEFRAGMENTEROnce packet classification is complete, Snort defragments IPpackets.IP fragmentation is the splitting of an IP datagram into twoor more smaller IP datagrams.Typically IP datagrams arefragmented when the maximum size of a frame (MTU)is exceeded, although they can be fragmented for otherreasons. IP fragments can arrive in any order at the destina-tion system, and can reach the destination using differentpaths.The destination system buffers IP fragments until allthe fragments of a datagram are received, following which itprocesses the datagram.Effective IPS implementations must handle: • IP fragmentsarriving out of order• IP datagrams that never complete• Incorrect IP optionsWith certain IPS implementations, attackers cantake advantage of IP fragmentation by exploitingthe fact that different operating systems and IP implemen-tations reassemble IP fragments differently under unusualcircumstances.These circumstances can include:• Overlapping IP fragments• Retransmitted fragmentsSnort has a module called frag3 that serves as its IP de-fragmenter. In order to detect attacks effectively, frag3 mustreassemble IP datagrams in the same way that the destina-tion system for the attack would.Target- based analysis is arelatively new concept in network- based intrusion preven-tion.The idea of a target-based system is to model the actualtargets on the network instead of merely modeling theprotocols and looking for attacks within them.In an environment where the attacker can determine whatClan OT Light 28ptUltimate Demi 12ptUltimate Light 10ptUltimate Demi 10ptUltimate Light 10pt
BRAND ELEMENTS EVENT POP UP 2.28SOURCEFIRE BRAND IDENTITY GUIDELINES 201220% dead spaceEvent pop up templates can useboth versions of a particularillustration. All illustrations can beused as long as the illustrationfeels balanced in thecomposition.Clan OT Thin 190ptNexa Black 90ptUltimate Light 178pt
SOURCEFIRE.COMDECEMBER 20129770 Patuxent Woods DriveColumbia, MD 21046, United States