This document provides branding guidelines for Sourcefire, including their logo, color palette, typography, icons and styles for various branding elements like their website, presentations, illustrations and collateral. It specifies the correct uses of their logo and secondary mark. The primary colors are Sourcefire red, black and grey. The main fonts are ClanOT for titles and Ultimate for body copy. Website designs feature dynamic graphic elements and a balanced layout. Illustration styles are also outlined.
Code for America's style guide offers information on brand usage, language and tone. If you're planning on using this for a community press event please also contact lr[at]codeforamerica.org for assistance.
These guidelines summarize the fundamental technical characteristics of the Fontech brand, serving as a guide for any material produced under the brand Fontech. We face the future with a new brand that represents the technology arm of the company. After many exciting years consolidating our brand in the WiFi market with a young, casual attitude that confronted the topics of the telecommunications industry in a fresh way, we now evolve to demonstrate our maturity, capacity, and know-how as a company!
Code for America's style guide offers information on brand usage, language and tone. If you're planning on using this for a community press event please also contact lr[at]codeforamerica.org for assistance.
These guidelines summarize the fundamental technical characteristics of the Fontech brand, serving as a guide for any material produced under the brand Fontech. We face the future with a new brand that represents the technology arm of the company. After many exciting years consolidating our brand in the WiFi market with a young, casual attitude that confronted the topics of the telecommunications industry in a fresh way, we now evolve to demonstrate our maturity, capacity, and know-how as a company!
The Design Squid brandbook is not only an in depth look at our services and projects that define us, it's also an example for other design companies to use to create their own.
All organizations have a brand or corporate identity and the way in which it is perceived is often vital to the way in which clients and employees respond to that organization. The key to good brand identity design is the simple communication of the client's public image. Brand should reflect the company, and the products or services that company provides. A good brand identity enables a company to position itself visually in the market alongside its competitors.
My overall task is to create such a brand identity and brand identity program - from the logo through appropriate design applications, such as stationery, menus, napkins, uniforms, web home page and signage. I must choose one of the particular culturally-based themes to reflect the bistro's personality - give it a name and design a brand identity (logo) and set of brand guidelines. It is important to have an idea of how the concept of a particular country and culture will work as a space where people will be spending some time eating and drinking. The brand identity for the chosen bistro must reflect this concept. Each of these bistros should also reflect the area they are located in, basing on my demographic and style research.
Of all the options, I chose British Colonial themed bistro of which will be located in the area of Bangsar, Kuala Lumpur. Designed in Adobe InDesign and Adobe Illustrator, this is the brand identity manual for the bistro, showing a set of consistent and flexible guidelines and rules so that future items can be designed using these guidelines and rules and remain part of a growing consistent brand identity.
This presentations highlights the Cisco Security Architecture. For more information Cisco's security products and solutions please visit our website here: http://www.cisco.com/web/CA/products/vpn.html
Presentación - Cisco ASA with FirePOWER ServicesOscar Romano
En la medida que más empresas mueven sus modelos de negocio hacia la movilidad, la nube e Internet de las cosas, sus soluciones de seguridad deben ser más dinámicas y escalables. Sin embargo, hasta la fecha, la mayoría de las soluciones de seguridad no han seguido el ritmo de cambio y no han podido adaptarse a las nuevas amenazas y ataques. Hoy, las soluciones de seguridad están basadas en un modelo binario de “bien vs mal”, el cual carece de la visibilidad necesaria para entender el contexto. El 16 de septiembre, Cisco dio a conocer su más reciente paso en esta dirección.
ASA Firepower NGFW Update and Deployment ScenariosCisco Canada
This session will focus on typical deployment scenarios for the Adaptive Security Appliance family running FirePower Services. Also, a feature overview and comparison of the ASA with Firepower services and the new Firepower Threat Defense (FTD) image will be included with updates on the new Firepower hardware platform. Deployment use cases will include Internet Edge, various segmentation scenarios, and VPN. A configuration walk-through and accepted best practices will be covered. This session is designed for existing ASA customers and targets the security and network engineer. They will learn the benefit of a FirePower NGFW in network edge and Internet use cases
The Design Squid brandbook is not only an in depth look at our services and projects that define us, it's also an example for other design companies to use to create their own.
All organizations have a brand or corporate identity and the way in which it is perceived is often vital to the way in which clients and employees respond to that organization. The key to good brand identity design is the simple communication of the client's public image. Brand should reflect the company, and the products or services that company provides. A good brand identity enables a company to position itself visually in the market alongside its competitors.
My overall task is to create such a brand identity and brand identity program - from the logo through appropriate design applications, such as stationery, menus, napkins, uniforms, web home page and signage. I must choose one of the particular culturally-based themes to reflect the bistro's personality - give it a name and design a brand identity (logo) and set of brand guidelines. It is important to have an idea of how the concept of a particular country and culture will work as a space where people will be spending some time eating and drinking. The brand identity for the chosen bistro must reflect this concept. Each of these bistros should also reflect the area they are located in, basing on my demographic and style research.
Of all the options, I chose British Colonial themed bistro of which will be located in the area of Bangsar, Kuala Lumpur. Designed in Adobe InDesign and Adobe Illustrator, this is the brand identity manual for the bistro, showing a set of consistent and flexible guidelines and rules so that future items can be designed using these guidelines and rules and remain part of a growing consistent brand identity.
This presentations highlights the Cisco Security Architecture. For more information Cisco's security products and solutions please visit our website here: http://www.cisco.com/web/CA/products/vpn.html
Presentación - Cisco ASA with FirePOWER ServicesOscar Romano
En la medida que más empresas mueven sus modelos de negocio hacia la movilidad, la nube e Internet de las cosas, sus soluciones de seguridad deben ser más dinámicas y escalables. Sin embargo, hasta la fecha, la mayoría de las soluciones de seguridad no han seguido el ritmo de cambio y no han podido adaptarse a las nuevas amenazas y ataques. Hoy, las soluciones de seguridad están basadas en un modelo binario de “bien vs mal”, el cual carece de la visibilidad necesaria para entender el contexto. El 16 de septiembre, Cisco dio a conocer su más reciente paso en esta dirección.
ASA Firepower NGFW Update and Deployment ScenariosCisco Canada
This session will focus on typical deployment scenarios for the Adaptive Security Appliance family running FirePower Services. Also, a feature overview and comparison of the ASA with Firepower services and the new Firepower Threat Defense (FTD) image will be included with updates on the new Firepower hardware platform. Deployment use cases will include Internet Edge, various segmentation scenarios, and VPN. A configuration walk-through and accepted best practices will be covered. This session is designed for existing ASA customers and targets the security and network engineer. They will learn the benefit of a FirePower NGFW in network edge and Internet use cases
details to dewa dubai
All of the details are copyrighted.
Used for Design Competition
Handle with care
A pDF is attached in case of further details.
Csn also be found on the dewa website.
This doctor dumped US job to build integrated medicine platform Syncremediesvinay vinu
Syncremedies is an integrated medicine service that brings together the best of Allopathy, Ayurveda and Homeopathy to offer the most effective treatment for any chronic ailment.
We are the only provider bringing together 3 forms of medicine for treatment of patients’ health concern. With importance given to overall health and wellness, each treatment plan is customized with recommendations around diet, exercise and medication aspects to improve well-being.
But why is integrated medicine the “right” treatment choice?
Syncremedies was born out of empathy after seeing numerous patients struggle through their illness without knowing how or what would be the best option for their ailment. Patients’ today struggle through their illness without knowing how or what would be the best option for their ailment.
Despite all the existing knowledge and ease of access to information they are often victim to long term ill health. Patients rarely know, what form of medicine might be best suited for them. They most often go with what people advise them on, rather than any objective information. Eventually getting stuck in a circle of medications, therapies and treatments, giving them sub-par relief.
Syncremedies answers all your questions!
– Will the Ayurveda doctor know about my Allopathic medicines?
– Is Allopathy the BEST Option for me?
– Can I take Allopathic & Homeopathy/Ayurveda medicines together?
– Will I have side effects due to the medicines?
– Should I consult Allopathy doctor or try Ayurveda/ Homeopathy?
– Is there anything I can do to maintain my health & wellness?
On the flip-side, the amount of medical knowledge that exists also is paramount. Knowledge based on history, research, wisdom, and years of education – knowledge always intended to heal; however, since the healers came from various backgrounds and different schools of thought, knowledge became limited within their circles.
Each form of medicine, be it Ayurveda, Homeopathy or Allopathy has a “best” we could leverage to our benefit, thereby taking stride in the wonderful world of integrated medicine. We at Syncremedies are here to offer the advantages of “all the good” from various modalities, minimize side effects, use more effective medications and use therapies that have a long term goal.
We are here to help you take your path to better health!
When I worked for CBS Interactive, I created some simple style guides for ZDNet to help me and future designers create the same branding for the company.
You could be a professional graphic designer and still make mistakes. There is always the possibility of human error. On the other hand if you’re not a designer, the chances of making some common graphic design mistakes are even higher. Because you don’t know what you don’t know. That’s where this blog comes in. To make your job easier and help you create better designs, we have put together a list of common graphic design mistakes that you need to avoid.
Transforming Brand Perception and Boosting Profitabilityaaryangarg12
In today's digital era, the dynamics of brand perception, consumer behavior, and profitability have been profoundly reshaped by the synergy of branding, social media, and website design. This research paper investigates the transformative power of these elements in influencing how individuals perceive brands and products and how this transformation can be harnessed to drive sales and profitability for businesses.
Through an exploration of brand psychology and consumer behavior, this study sheds light on the intricate ways in which effective branding strategies, strategic social media engagement, and user-centric website design contribute to altering consumers' perceptions. We delve into the principles that underlie successful brand transformations, examining how visual identity, messaging, and storytelling can captivate and resonate with target audiences.
Methodologically, this research employs a comprehensive approach, combining qualitative and quantitative analyses. Real-world case studies illustrate the impact of branding, social media campaigns, and website redesigns on consumer perception, sales figures, and profitability. We assess the various metrics, including brand awareness, customer engagement, conversion rates, and revenue growth, to measure the effectiveness of these strategies.
The results underscore the pivotal role of cohesive branding, social media influence, and website usability in shaping positive brand perceptions, influencing consumer decisions, and ultimately bolstering sales and profitability. This paper provides actionable insights and strategic recommendations for businesses seeking to leverage branding, social media, and website design as potent tools to enhance their market position and financial success.
White wonder, Work developed by Eva TschoppMansi Shah
White Wonder by Eva Tschopp
A tale about our culture around the use of fertilizers and pesticides visiting small farms around Ahmedabad in Matar and Shilaj.
Expert Accessory Dwelling Unit (ADU) Drafting ServicesResDraft
Whether you’re looking to create a guest house, a rental unit, or a private retreat, our experienced team will design a space that complements your existing home and maximizes your investment. We provide personalized, comprehensive expert accessory dwelling unit (ADU)drafting solutions tailored to your needs, ensuring a seamless process from concept to completion.
Hello everyone! I am thrilled to present my latest portfolio on LinkedIn, marking the culmination of my architectural journey thus far. Over the span of five years, I've been fortunate to acquire a wealth of knowledge under the guidance of esteemed professors and industry mentors. From rigorous academic pursuits to practical engagements, each experience has contributed to my growth and refinement as an architecture student. This portfolio not only showcases my projects but also underscores my attention to detail and to innovative architecture as a profession.
4. WELLNET TREE
BRAND IDENTITY CREATIVE CONCEPT 1.02
Sourcefire, Inc. (NASDAQ: FIRE), a world leader in
intelligent cybersecurity solutions, is transforming the way
global large- to mid-size organizations and government
agencies manage and minimize network security risks. With
solutions from a next-generation network security platform
to advanced malware protection, Sourcefire provides
customers with Agile Security® that is as dynamic as the
real world it protects and the attackers against which it
defends. Trusted for more than 10 years, Sourcefire has
been consistently recognized for its innovation and industry
leadership with numerous patents, world-class research,
and award-winning technology. Today, the name
Sourcefire has grown synonymous with innovation, security
intelligence and agile end-to-end security protection.
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
5. HEX
#EB0028
RGB
r235 g0 b40
CMYK
c1 m100 y92 k0
PANTONE
PMS 185C
HEX
#000000
RGB
r0 g0 b0
CMYK
c75 m68 y67 k90
PANTONE
Black C
BRAND IDENTITY LOGO 1.03
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Our logo is the most visible and defining
signal of the Sourcefire brand identity.
It is one of our most important assets and
must be used carefully and consistently
to ensure that our brand is effectively
presented and promoted across all
media.
6. BRAND IDENTITY SECONDARY MARK 1.04
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
In addition to our logo we introduce a
secondary mark that we use consistently
throughout all collateral.
Below you will see two examples of how we
have applied this mark to collateral. In one
we place it to the far right of the logo with a
gradient line, and in the other we use it as a
watermark on a business card.
7. The Sourcefire logo can be applied in its
positive form or reversed out on contrasting
background. These two are the preferred
applications of our logo.
PREFERRED POSITIVE LOGO
ALTERNATE REVERSED LOGO
BRAND IDENTITY LOGO APPLICATION 1.05
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
8. The preferred use of the logo are both full
color on white and reversed color on black.
Solid black on white background is
acceptable for black and white applications,
and the logo may also be reversed out in
white on a black background.
POSITIVE ON WHITE
BLACK ON WHITE
REVERSED ON BLACK
REVERSED ON BLACK
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND IDENTITY LOGO VERSIONS 1.06
9. BRAND IDENTITY LOGO CLEAR SPACE AND MINIMUM SIZE 1.07
MINIMUM SIZE: PRINT MINIMUM SIZE: SCREEN
50PX
1 INCH
S
CLEAR SPACE
S
S
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
It is important that the Sourcefire logo
be visible and uncluttered in its context.
A minimum of “S” area around the
logo should be observed. These size
requirements should be followed for all
logo applications. The “S” measurement
represents the height of the “S” in the
Sourcefire logo.
The preferred minimum print size for the
logo is 1” wide. The logo should always
be scaled proportionally width/height.
The preferred minimum pixel size for
the logo is 50px wide. The logo should
always be scaled proportionally width/
height.
10. The Sourcefire logo has been
designed to effectively promote
the brand in its unaltered state
and should not be modified or
corrupted in any manner.
Improper use of the logo
compromises the integrity of our
brand and makes legal
protection more difficult.
These examples represent some
of the possible misuses–careful
consideration should be given to
circumstances that are not
illustrated in these examples.
Do not place the logo on complex imagesDo not add elements to the logo
Do not add a drop shadow or filter effect
Do not alter logo colors
Do not place the logo on an angle
Do not recreate elements of the logo Do not distort or change proportions of the logo Do not place the logo on a pattern
Do not place the logo within another shape
BRAND IDENTITY LOGO INCORRECT USAGE 1.08
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
11. 1.03BRAND IDENTITY ELEMENTS
9 HELLOWALLET BRAND IDENTITY GUIDELINES 2012
SOURCEFIRE
BRAND ELEMENTS
SOURCEFIRE BRAND ELEMENTS 2.01
12. SOURCEFIRE
SOURCEFIRE BRAND ELEMENTS 2.02
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Sourcefire, Inc. (NASDAQ: FIRE), a world leader in intelligent cybersecurity
solutions, is transforming the way global large- to mid-size organizations and
government agencies manage and minimize network security risks. With
solutions from a next-generation network security platform to advanced
malware protection, Sourcefire provides customers with Agile Security® that is
as dynamic as the real world it protects and the attackers against which it
defends. Trusted for more than 10 years, Sourcefire has been consistently
recognized for its innovation and industry leadership with numerous patents,
world-class research, and award-winning technology. Today, the name
Sourcefire has grown synonymous with innovation, security intelligence and
agile end-to-end security protection.
13. PRIMARY PALETTE
BRAND ELEMENTS COLOR PRIMARY PALETTE 2.03
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
HEX
#ececec
RGB
r118 g118 b118
CMYK
c55 m47 y46 k11
PANTONE
PMS 22% 6C
HEX
#EB0028
RGB
r235 g0 b40
CMYK
c1 m100 y92 k0
PANTONE
PMS 185C
Sourcefire’s brand is also unified by a consistent color standard. The color palette is divided into two categories, primary and secondary. The primary palette should be dominant in
visual expressions. The secondary palette provides flexibility to the system and allows a broader range of color identification.
Consistent usage will enhance the visual presentation of the brand across all expressions.
*Please note that upon receiving the Sourcefire brand guidelines we can adjust all colors in this document accordingly; all color shades have been pulled directly from the
sourcefire logo and website*
HEX
#000000
RGB
r0 g0 b0
CMYK
c75 m68 y67 k90
PANTONE
Black C
1
9770 Patuxent Woods Drive | Columbia, MD 21046 | p. 800.917.4134 | f. 410.290.0024 | www.sourcefire.com
14. PANTONE
SECONDARY PALETTE
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS COLOR SECONDARY PALETTE 2.04
HEX
#F9E431
RGB
r249 g228 b49
CMYK
c4 m4 y90 k0
PANTONE
PMS 113C
HEX
#1DB24B
RGB
r112 g136 b56
CMYK
c79 m0 y100 k0
PANTONE
PMS 361C
HEX
#E32B25
RGB
r174 g84 b122
CMYK
c32 m79 y32 k3
PANTONE
PMS 485C
HEX
#2F9AA6
RGB
r0 g90 b134
CMYK
c96 m64 y26 k8
PMS 2945C
The colors reflected in a printout of this guide should not be considered an accurate PANTONE color match. Refer to the current
edition of the PANTONE Color Formula Guide for accurate color assessment. PANTONE® is a registered trademark of Pantone, Inc.
PMS refers to Pantone Matching System.
16. The Nexa family is used for supporting typography. Used primarily for
navigation in the website, its various weights can also be used for sub
navigation or headers.
NEXA
Nexa Light
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
Nexa Regular
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
Nexa Bold
Nexa Black
Nexa Book
USEAGE GUIDELINES
• Large Promo Subtitle
BRAND ELEMENTS SUPPORTING TYPOGRAPHY 2.06
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
17. A variety of the Ultimate font faces make up the bulk of context. The
combination of Ultimate Light and Medium make up the body copy,
and also are used in side promos and sub navigation.
ULTIMATE
Ultimate Light
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
Ultimate Regular
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
Ultimate Demi Bold
Ultimate Medium Italic
Ultimate Bold
USEAGE GUIDELINES
• Call to action type
• Main body type
• Navigation
• Subheaders on promos
BRAND ELEMENTS SUPPORTING TYPOGRAPHY 2.07
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
18. BRAND ELEMENTS ICONOGRAPHY 2.08
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
ICONOGRAPHY
Icons should be simple two-dimensional graphics that are one color and easily
communicate our services. Icons can appear on the homepage and in other collateral.
Any new icons should follow above look and feel.
19. The website designs all
contain a heavy top
section which is balanced
by a more open, lighter
bottom half. The brand is
reinforced by using the
brand colors, red, black
and grey. Top dynamic
leads use the new
illustration styles to provide
bursts of color that attract
the eye to important
messaging or call to
actions.
Page variety can be
explored by using various
templates and illustration
styles.
This dynamic lead uses
red dot indicators that
show which promo is
currently being viewed.
BRAND ELEMENTS WEB 2.09
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
20. The drop down navigation
should be styled with
subnavigation links on the
right, and image promo
on the left.
The drop down box
should have some
transparency and subtle
background drop
shadow.
BRAND ELEMENTS WEB 2.10
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
23. BRAND ELEMENTS WEB 2.13
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Clicking the agile security
button expands the page
to reveal video and type
promos. If the user clicks
the agile security button in
the top right of the home
page it sends the user
down the page and this
section automatically
expands.
24. BRAND ELEMENTS WEB 2.14
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Landing pages use a
different type of dynamic
lead at the top of the page.
This style uses three thin
line timers that fill with red
as time passes. When the
line is completely red the
next promo will appear
and the next timer will
begin.
25. BRAND ELEMENTS WEB 2.15
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Generic pages use a static
dynamic lead at the top of
pages. Below the dynamic
lead this template uses a
basic three column grid.
26. SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS MOBILE SITE 2.16
The website features a
responsive design, so it is
optimized for mobile
devices. The design is
slightly different than
desktop on mobile devices
but features many of the
same styles, dynamic
leads, and promos.
27. BRAND ELEMENTS EMAIL TEMPLATE 2.17
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Email templates also use
custom illustrations in top
headers. These use the lighter
versions of illustration, and like
the website use a balance of
Sourcefire red, black, and grey.
Ultimate Medium 14pt
Ultimate Light 15pt
Ultimate Light 12pt
Ultimate Light 12pt
Ultimate Light 14pt
Ultimate Medium 16pt
Clan OT Medium 18pt
Clan OT Medium 24pt
28. BRAND ELEMENTS POWERPOINT 2.18
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Powerpoint templates use the
lighter version of this particular
illustration. Other light versions
of illustrations could be
substituted as long as the
illustration feels balanced in the
composition.
Clan OT Light 60pt
Nexa Black 18pt
29. BRAND ELEMENTS POWERPOINT 2.19
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
The interior Powerpoint template
is light like the cover template.
This keeps the design consistent
and reduces the ink used in
printing.
Clan OT Light 38pt
Ultimate Regular 22pt
Ultimate Light 18pt
30. BRAND ELEMENTS ILLUSTRATION STYLE 2.20
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Illustrations all have light and
dark versions. These illustrations
use a consistent color palette
and contain the same level of
complexity that reflects the
theme of the illustration. The
complexity is based on an
illustration’s shape, interior
design, outer line work, and icon
work in the background.
Clan OT Light 51pt
Nexa Black 24pt
34. BRAND ELEMENTS ILLUSTRATION STYLE 2.24
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
The illustrations without words should be used for the website
dynamic leads since the text shown on the website overlays the
image that is uploaded.
35. BRAND ELEMENTS STATIONARY 2.25
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
1
9770 Patuxent Woods Drive | Columbia, MD 21046 | p. 800.917.4134 | f. 410.290.0024 | www.sourcefire.com
9770 Patuxent Woods Drive
Columbia, MD 21046
www.sourcefire.com
Stationary is kept open and light.
Secondary mark is used in all
pieces of collateral.
Ultimate Light 7pt
Ultimate Light 7pt
Ultimate Regular 8pt
Ultimate Light 7pt
Ultimate Light 7pt
Ultimate Medium 7pt
John Doe
Vice President
9770 Patuxent Woods Drive
Columbia, MD 21046
w. 1 (800) 917-4134
c. 1 (301) 915-9300
jdoe@sourcefire.com
Ultimate Light 10pt
36. BRAND ELEMENTS DATA SHEET 2.26
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
1
Change is constant.
We all know information technology deployments are com-
plex and chaotic. In the real world, the IT environment changes
unpredictably, and staff is pressured for time, experience and
resources. Threats are, in most cases, unpredictable and un-
knowable. In the real world, you cannot effectively address
security with static defenses. Sourcefire takes a new approach to
security—one that quickly and effectively protects your environ-
ment against rapidly changing attacks. Designed to deliver Agile
Security™, Sourcefire’s solutions, from industry-leading next-
generation network security appliances to advanced malware
protection, are as dynamic as the real world they protect and
the attackers against which they defend.
1AGILE SECURITY TITLIGN HERE LOREM
1
A continuous process,
supported by advanced
technologies, that enables
you to:
• SEE everything in your
environment
• LEARN by applying
security intelligence to
data
• ADAPT defenses
automatically ACT in
real-time
Agile Security
SUB TITLING TO GO HERE LOREM IPSM
Solutions At A Glance
To better protect your unique environment, Sourcefire’s portfolio of intelligent cybersecurity solutions
includes:
Next-Generation Intrusion Prevention System (NGIPS)
Sourcefire NGIPS sets a new standard in advanced threat protection, integrating real-time contextual
awareness, intelligent security automation, and unprecedented performance with industry-leading
threat prevention effectiveness. Optional application control and URL filtering provide greater threat
mitigation over applications, users and suspicious sites.
Next-Generation Firewall (NGFW)
Sourcefire provides the only NGFW to combine control and effective threat protection. NGFW in-
cludes the world’s most powerful NGIPS, integrated application control and firewall functionality in a
universal, high-performance security appliance that, unlike other offerings, requires no compromises.
2
Advanced Malware Protection
Our enterprise-class advanced jmalware analysis and protection solutions are among the first to
use ‘big data’ to provide the visibility and control you need to discover, understand and stop threats
missed by other security layers. A version to protect against mobile malware is also available.
Security Innovation At Work For You
Sourcefire’s portfolio of cybersecurity solutions incorporate innovative and patented technologies
designed to fuel your advantage against attackers.
2AGILE SECURITY TITLIGN HERE LOREM
FirePOWER™ Network Security Appliances – our purpose-built network
security appliances feature unique hardware acceleration technology that de-
livers industry-best threat protection with unmatched performance, scalability
and energy efficiency
FireSIGHT® Defense Center – the central management console for all
Sourcefire security solutions featuring patented real-time awareness tech-
nology for next-generation solutions that provides full stack visibility, event
correlation and security automation to respond to changing conditions and
new attacks
FireAMP™ Advanced Malware Protection – an intelligent malware pro-
tection solution that leverages cloud computing and large-scale data mining
to deliver a uniquely effective approach to detection, analysis and remedia-
tion of advanced malware outbreaks
FireCLOUD™ Security Intelligence Services – collective intelligence deliv-
ered from our cloud-based, big data analytics system designed to discover,
analyze and store information on network threats, advanced malware, file
reputation and other security data
Key Capabilities
Providing continuous protection in a world of continuous change, Sourcefire solutions stand apart
with the following key capabilities:
Advanced Threat Protection – FirePOWER next-generation network security appliances deliver
the best threat prevention that money can buy—period. Our industry-leading security protection and
effectiveness is validated by independent third-party testing and thousands of satisfied customers
around the world. FireAMP provides additional protection, stopping malware at the point of entry.
Data sheet templates also use custom illustrations in top headers. These
use the lighter versions of illustration, and like the website use a balance of
Sourcefire red, black, and grey.
Ultimate Light 10pt Ultimate Light 8pt
Ultimate Demi 8pt
Ultimate Light 22pt
Ultimate Light 12pt
Ultimate Demi 12pt
Ultimate Demi 10pt
Ultimate Light 11pt
37. BRAND ELEMENTS WHITE PAPER 2.27
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
White paper templates use the secondary mark on the title page.
Throughout they also use a balance of Sourcefire red, black, and grey.
1
SNORT® THREAT
PREVENTION
COMPONENTS
2
1TITLIGN HERE LOREM
INTRODUCTION
Snort’s threat detection and prevention components work to-
gether to reassemble traffic, prevent evasions, detect threats,
and output information about these threats without creating
false positives or missing legitimate threats.
The threat prevention process in Snort consists
of multiple components which work together to reassemble
traffic as a target host would see it, identify traffic areas that
may contain threats, and match Snort rules against these
traffic areas to recognize attacks. Together, these components
efficiently detect threats and reduce or eliminate false alarms.
The threat prevention components of Snort include
a packet classifier, which decides which packets are inspect-
ed; an IP defragmenter and aTCP reassembler, which ensure
Snort inspects IP fragments andTCP segments in the proper
order; a portscan processor, which watches for portscans,
and a detection engine, which performs protocol normaliza-
tion, rule matching, and many other detection functions.
Snort’s detection components reside at the core of the threat
prevention capabilities of Sourcefire Intrusion Sensors.They
ensure that threats are detected, false positives and nega-
tives are avoided, and detection performance is high.
BENEFITS
The threat prevention components of Snort:
• Select traffic to be inspected, ensuring that only traffic that
could be vulnerable is inspected. Looking at only relevant
traffic helps Snort’s performance and limits the potential for
false positives.
• Normalize traffic to ensure that it is in a consistent format
and in the proper order prior to inspection. By putting traffic
in a consistent format and in
the order that the target sees it, Snort avoids the potential for
evasion.
• Match traffic against one of the industry’s largest rulesets
using a number of different detection methods. By using
multiple detection methods and using a large ruleset, Snort
ensures that
a wide variety of threats is detected and false negatives are
avoided.and security automation to respond to changing
THREAT PREVENTION COMPONENTS
PACKET CLASSIFIER
Snort begins processing the traffic it sees by classifying it at
a high level.The classifier decides whether a packet is:
• Token Ring/Ethernet/etc. • VLAN/NotVLAN
• IP/Not IP
• TCP/UDP/ICMP
IP DEFRAGMENTER
Once packet classification is complete, Snort defragments IP
packets.
IP fragmentation is the splitting of an IP datagram into two
or more smaller IP datagrams.Typically IP datagrams are
fragmented when the maximum size of a frame (MTU)
is exceeded, although they can be fragmented for other
reasons. IP fragments can arrive in any order at the destina-
tion system, and can reach the destination using different
paths.The destination system buffers IP fragments until all
the fragments of a datagram are received, following which it
processes the datagram.
Effective IPS implementations must handle: • IP fragments
arriving out of order
• IP datagrams that never complete
• Incorrect IP options
With certain IPS implementations, attackers can
take advantage of IP fragmentation by exploiting
the fact that different operating systems and IP implemen-
tations reassemble IP fragments differently under unusual
circumstances.These circumstances can include:
• Overlapping IP fragments
• Retransmitted fragments
Snort has a module called frag3 that serves as its IP de-
fragmenter. In order to detect attacks effectively, frag3 must
reassemble IP datagrams in the same way that the destina-
tion system for the attack would.Target- based analysis is a
relatively new concept in network- based intrusion preven-
tion.The idea of a target-based system is to model the actual
targets on the network instead of merely modeling the
protocols and looking for attacks within them.
In an environment where the attacker can determine what
Clan OT Light 28pt
Ultimate Demi 12pt
Ultimate Light 10pt
Ultimate Demi 10pt
Ultimate Light 10pt
38. BRAND ELEMENTS EVENT POP UP 2.28
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
20% dead space
Event pop up templates can use
both versions of a particular
illustration. All illustrations can be
used as long as the illustration
feels balanced in the
composition.
Clan OT Thin 190pt
Nexa Black 90pt
Ultimate Light 178pt