SlideShare ist ein Scribd-Unternehmen logo
1 von 39
I
BRAND IDENTITY GUIDELINES
CONTENTS
SOURCEFIRE IDENTITY GUIDELINES 2012
BRAND IDENTITY
1.02 Creative Concept
1.03 Logo
1.04 Secondary Mark
1.05 Logo Application
1.06 Logo Versions
1.07 Logo Clear Space + Minimum Size
1.08 Logo Inccorrect Usage
SOURCEFIRE BRAND ELEMENTS
2.02 Sourcefire
2.03 Primary Palette
2.04 Secondary Palette
2.05 Primary Typography
2.06 - 2.07 Supporting Typography
2.08 Iconography
2.09 - 2.15 Web Site
2.16 Mobile Site
2.17 Email Template
2.18 - 2.19 Powerpoint
2.20 - 2.24 Illustration Style
2.25 Collateral Stationary
2.26 Collateral Data Sheet
2.27 Collateral White Paper
2.28 Collateral Trade Show Pop-Up
1
SOURCEFIRE
BRAND IDENTITY
SOURCEFIRE BRAND IDENTITY GUIDELINES 1.01
WELLNET TREE
BRAND IDENTITY CREATIVE CONCEPT 1.02
Sourcefire, Inc. (NASDAQ: FIRE), a world leader in
intelligent cybersecurity solutions, is transforming the way
global large- to mid-size organizations and government
agencies manage and minimize network security risks. With
solutions from a next-generation network security platform
to advanced malware protection, Sourcefire provides
customers with Agile Security® that is as dynamic as the
real world it protects and the attackers against which it
defends. Trusted for more than 10 years, Sourcefire has
been consistently recognized for its innovation and industry
leadership with numerous patents, world-class research,
and award-winning technology. Today, the name
Sourcefire has grown synonymous with innovation, security
intelligence and agile end-to-end security protection.
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
HEX
#EB0028
RGB
r235 g0 b40
CMYK
c1 m100 y92 k0
PANTONE
PMS 185C
HEX
#000000
RGB
r0 g0 b0
CMYK
c75 m68 y67 k90
PANTONE
Black C
BRAND IDENTITY LOGO 1.03
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Our logo is the most visible and defining
signal of the Sourcefire brand identity.
It is one of our most important assets and
must be used carefully and consistently
to ensure that our brand is effectively
presented and promoted across all
media.
BRAND IDENTITY SECONDARY MARK 1.04
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
In addition to our logo we introduce a
secondary mark that we use consistently
throughout all collateral.
Below you will see two examples of how we
have applied this mark to collateral. In one
we place it to the far right of the logo with a
gradient line, and in the other we use it as a
watermark on a business card.
The Sourcefire logo can be applied in its
positive form or reversed out on contrasting
background. These two are the preferred
applications of our logo.
PREFERRED POSITIVE LOGO
ALTERNATE REVERSED LOGO
BRAND IDENTITY LOGO APPLICATION 1.05
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
The preferred use of the logo are both full
color on white and reversed color on black.
Solid black on white background is
acceptable for black and white applications,
and the logo may also be reversed out in
white on a black background.
POSITIVE ON WHITE
BLACK ON WHITE
REVERSED ON BLACK
REVERSED ON BLACK
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND IDENTITY LOGO VERSIONS 1.06
BRAND IDENTITY LOGO CLEAR SPACE AND MINIMUM SIZE 1.07
MINIMUM SIZE: PRINT MINIMUM SIZE: SCREEN
50PX
1 INCH
S
CLEAR SPACE
S
S
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
It is important that the Sourcefire logo
be visible and uncluttered in its context.
A minimum of “S” area around the
logo should be observed. These size
requirements should be followed for all
logo applications. The “S” measurement
represents the height of the “S” in the
Sourcefire logo.
The preferred minimum print size for the
logo is 1” wide. The logo should always
be scaled proportionally width/height.
The preferred minimum pixel size for
the logo is 50px wide. The logo should
always be scaled proportionally width/
height.
The Sourcefire logo has been
designed to effectively promote
the brand in its unaltered state
and should not be modified or
corrupted in any manner.
Improper use of the logo
compromises the integrity of our
brand and makes legal
protection more difficult.
These examples represent some
of the possible misuses–careful
consideration should be given to
circumstances that are not
illustrated in these examples.
Do not place the logo on complex imagesDo not add elements to the logo
Do not add a drop shadow or filter effect
Do not alter logo colors
Do not place the logo on an angle
Do not recreate elements of the logo Do not distort or change proportions of the logo Do not place the logo on a pattern
Do not place the logo within another shape
BRAND IDENTITY LOGO INCORRECT USAGE 1.08
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
1.03BRAND IDENTITY ELEMENTS
9 HELLOWALLET BRAND IDENTITY GUIDELINES 2012
SOURCEFIRE
BRAND ELEMENTS
SOURCEFIRE BRAND ELEMENTS 2.01
SOURCEFIRE
SOURCEFIRE BRAND ELEMENTS 2.02
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Sourcefire, Inc. (NASDAQ: FIRE), a world leader in intelligent cybersecurity
solutions, is transforming the way global large- to mid-size organizations and
government agencies manage and minimize network security risks. With
solutions from a next-generation network security platform to advanced
malware protection, Sourcefire provides customers with Agile Security® that is
as dynamic as the real world it protects and the attackers against which it
defends. Trusted for more than 10 years, Sourcefire has been consistently
recognized for its innovation and industry leadership with numerous patents,
world-class research, and award-winning technology. Today, the name
Sourcefire has grown synonymous with innovation, security intelligence and
agile end-to-end security protection.
PRIMARY PALETTE
BRAND ELEMENTS COLOR PRIMARY PALETTE 2.03
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
HEX
#ececec
RGB
r118 g118 b118
CMYK
c55 m47 y46 k11
PANTONE
PMS 22% 6C
HEX
#EB0028
RGB
r235 g0 b40
CMYK
c1 m100 y92 k0
PANTONE
PMS 185C
Sourcefire’s brand is also unified by a consistent color standard. The color palette is divided into two categories, primary and secondary. The primary palette should be dominant in
visual expressions. The secondary palette provides flexibility to the system and allows a broader range of color identification.
Consistent usage will enhance the visual presentation of the brand across all expressions.
*Please note that upon receiving the Sourcefire brand guidelines we can adjust all colors in this document accordingly; all color shades have been pulled directly from the
sourcefire logo and website*
HEX
#000000
RGB
r0 g0 b0
CMYK
c75 m68 y67 k90
PANTONE
Black C
1
9770 Patuxent Woods Drive | Columbia, MD 21046 | p. 800.917.4134 | f. 410.290.0024 | www.sourcefire.com
PANTONE
SECONDARY PALETTE
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS COLOR SECONDARY PALETTE 2.04
HEX
#F9E431
RGB
r249 g228 b49
CMYK
c4 m4 y90 k0
PANTONE
PMS 113C
HEX
#1DB24B
RGB
r112 g136 b56
CMYK
c79 m0 y100 k0
PANTONE
PMS 361C
HEX
#E32B25
RGB
r174 g84 b122
CMYK
c32 m79 y32 k3
PANTONE
PMS 485C
HEX
#2F9AA6
RGB
r0 g90 b134
CMYK
c96 m64 y26 k8
PMS 2945C
The colors reflected in a printout of this guide should not be considered an accurate PANTONE color match. Refer to the current
edition of the PANTONE Color Formula Guide for accurate color assessment. PANTONE® is a registered trademark of Pantone, Inc.
PMS refers to Pantone Matching System.
ClanOT
ClanOT Light
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ClanOT Book
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ClanOT Medium
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ClanOT Bold
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
USAGE GUIDELINES
• Large Titling
• Page Titling
BRAND ELEMENTS PRIMARY TYPOGRAPHY 2.05
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
ClanOT Light is the primary font for page titling, and large titling. These
fonts, in concert with Ultimate Light Medium make up the refreshed
Sourcefire brand.
The Nexa family is used for supporting typography. Used primarily for
navigation in the website, its various weights can also be used for sub
navigation or headers.
NEXA
Nexa Light
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
Nexa Regular
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
Nexa Bold
Nexa Black
Nexa Book
USEAGE GUIDELINES
• Large Promo Subtitle
BRAND ELEMENTS SUPPORTING TYPOGRAPHY 2.06
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
A variety of the Ultimate font faces make up the bulk of context. The
combination of Ultimate Light and Medium make up the body copy,
and also are used in side promos and sub navigation.
ULTIMATE
Ultimate Light
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
Ultimate Regular
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
Ultimate Demi Bold
Ultimate Medium Italic
Ultimate Bold
USEAGE GUIDELINES
• Call to action type
• Main body type
• Navigation
• Subheaders on promos
BRAND ELEMENTS SUPPORTING TYPOGRAPHY 2.07
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS ICONOGRAPHY 2.08
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
ICONOGRAPHY
Icons should be simple two-dimensional graphics that are one color and easily
communicate our services. Icons can appear on the homepage and in other collateral.
Any new icons should follow above look and feel.
The website designs all
contain a heavy top
section which is balanced
by a more open, lighter
bottom half. The brand is
reinforced by using the
brand colors, red, black
and grey. Top dynamic
leads use the new
illustration styles to provide
bursts of color that attract
the eye to important
messaging or call to
actions.
Page variety can be
explored by using various
templates and illustration
styles.
This dynamic lead uses
red dot indicators that
show which promo is
currently being viewed.
BRAND ELEMENTS WEB 2.09
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
The drop down navigation
should be styled with
subnavigation links on the
right, and image promo
on the left.
The drop down box
should have some
transparency and subtle
background drop
shadow.
BRAND ELEMENTS WEB 2.10
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS WEB 2.11
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS WEB 2.12
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS WEB 2.13
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Clicking the agile security
button expands the page
to reveal video and type
promos. If the user clicks
the agile security button in
the top right of the home
page it sends the user
down the page and this
section automatically
expands.
BRAND ELEMENTS WEB 2.14
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Landing pages use a
different type of dynamic
lead at the top of the page.
This style uses three thin
line timers that fill with red
as time passes. When the
line is completely red the
next promo will appear
and the next timer will
begin.
BRAND ELEMENTS WEB 2.15
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Generic pages use a static
dynamic lead at the top of
pages. Below the dynamic
lead this template uses a
basic three column grid.
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS MOBILE SITE 2.16
The website features a
responsive design, so it is
optimized for mobile
devices. The design is
slightly different than
desktop on mobile devices
but features many of the
same styles, dynamic
leads, and promos.
BRAND ELEMENTS EMAIL TEMPLATE 2.17
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Email templates also use
custom illustrations in top
headers. These use the lighter
versions of illustration, and like
the website use a balance of
Sourcefire red, black, and grey.
Ultimate Medium 14pt
Ultimate Light 15pt
Ultimate Light 12pt
Ultimate Light 12pt
Ultimate Light 14pt
Ultimate Medium 16pt
Clan OT Medium 18pt
Clan OT Medium 24pt
BRAND ELEMENTS POWERPOINT 2.18
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Powerpoint templates use the
lighter version of this particular
illustration. Other light versions
of illustrations could be
substituted as long as the
illustration feels balanced in the
composition.
Clan OT Light 60pt
Nexa Black 18pt
BRAND ELEMENTS POWERPOINT 2.19
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
The interior Powerpoint template
is light like the cover template.
This keeps the design consistent
and reduces the ink used in
printing.
Clan OT Light 38pt
Ultimate Regular 22pt
Ultimate Light 18pt
BRAND ELEMENTS ILLUSTRATION STYLE 2.20
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Illustrations all have light and
dark versions. These illustrations
use a consistent color palette
and contain the same level of
complexity that reflects the
theme of the illustration. The
complexity is based on an
illustration’s shape, interior
design, outer line work, and icon
work in the background.
Clan OT Light 51pt
Nexa Black 24pt
BRAND ELEMENTS ILLUSTRATION STYLE 2.21
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS ILLUSTRATION STYLE 2.22
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS ILLUSTRATION STYLE 2.23
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS ILLUSTRATION STYLE 2.24
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
The illustrations without words should be used for the website
dynamic leads since the text shown on the website overlays the
image that is uploaded.
BRAND ELEMENTS STATIONARY 2.25
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
1
9770 Patuxent Woods Drive | Columbia, MD 21046 | p. 800.917.4134 | f. 410.290.0024 | www.sourcefire.com
9770 Patuxent Woods Drive
Columbia, MD 21046
www.sourcefire.com
Stationary is kept open and light.
Secondary mark is used in all
pieces of collateral.
Ultimate Light 7pt
Ultimate Light 7pt
Ultimate Regular 8pt
Ultimate Light 7pt
Ultimate Light 7pt
Ultimate Medium 7pt
John Doe
Vice President
9770 Patuxent Woods Drive
Columbia, MD 21046
w. 1 (800) 917-4134
c. 1 (301) 915-9300
jdoe@sourcefire.com
Ultimate Light 10pt
BRAND ELEMENTS DATA SHEET 2.26
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
1
Change is constant.
We all know information technology deployments are com-
plex and chaotic. In the real world, the IT environment changes
unpredictably, and staff is pressured for time, experience and
resources. Threats are, in most cases, unpredictable and un-
knowable. In the real world, you cannot effectively address
security with static defenses. Sourcefire takes a new approach to
security—one that quickly and effectively protects your environ-
ment against rapidly changing attacks. Designed to deliver Agile
Security™, Sourcefire’s solutions, from industry-leading next-
generation network security appliances to advanced malware
protection, are as dynamic as the real world they protect and
the attackers against which they defend.
1AGILE SECURITY TITLIGN HERE LOREM
1
A continuous process,
supported by advanced
technologies, that enables
you to:
• SEE everything in your
environment
• LEARN by applying
security intelligence to
data
• ADAPT defenses
automatically ACT in
real-time
Agile Security
SUB TITLING TO GO HERE LOREM IPSM
Solutions At A Glance
To better protect your unique environment, Sourcefire’s portfolio of intelligent cybersecurity solutions
includes:
Next-Generation Intrusion Prevention System (NGIPS)
Sourcefire NGIPS sets a new standard in advanced threat protection, integrating real-time contextual
awareness, intelligent security automation, and unprecedented performance with industry-leading
threat prevention effectiveness. Optional application control and URL filtering provide greater threat
mitigation over applications, users and suspicious sites.
Next-Generation Firewall (NGFW)
Sourcefire provides the only NGFW to combine control and effective threat protection. NGFW in-
cludes the world’s most powerful NGIPS, integrated application control and firewall functionality in a
universal, high-performance security appliance that, unlike other offerings, requires no compromises.
2
Advanced Malware Protection
Our enterprise-class advanced jmalware analysis and protection solutions are among the first to
use ‘big data’ to provide the visibility and control you need to discover, understand and stop threats
missed by other security layers. A version to protect against mobile malware is also available.
Security Innovation At Work For You
Sourcefire’s portfolio of cybersecurity solutions incorporate innovative and patented technologies
designed to fuel your advantage against attackers.
2AGILE SECURITY TITLIGN HERE LOREM
FirePOWER™ Network Security Appliances – our purpose-built network
security appliances feature unique hardware acceleration technology that de-
livers industry-best threat protection with unmatched performance, scalability
and energy efficiency
FireSIGHT® Defense Center – the central management console for all
Sourcefire security solutions featuring patented real-time awareness tech-
nology for next-generation solutions that provides full stack visibility, event
correlation and security automation to respond to changing conditions and
new attacks
FireAMP™ Advanced Malware Protection – an intelligent malware pro-
tection solution that leverages cloud computing and large-scale data mining
to deliver a uniquely effective approach to detection, analysis and remedia-
tion of advanced malware outbreaks
FireCLOUD™ Security Intelligence Services – collective intelligence deliv-
ered from our cloud-based, big data analytics system designed to discover,
analyze and store information on network threats, advanced malware, file
reputation and other security data
Key Capabilities
Providing continuous protection in a world of continuous change, Sourcefire solutions stand apart
with the following key capabilities:
Advanced Threat Protection – FirePOWER next-generation network security appliances deliver
the best threat prevention that money can buy—period. Our industry-leading security protection and
effectiveness is validated by independent third-party testing and thousands of satisfied customers
around the world. FireAMP provides additional protection, stopping malware at the point of entry.
Data sheet templates also use custom illustrations in top headers. These
use the lighter versions of illustration, and like the website use a balance of
Sourcefire red, black, and grey.
Ultimate Light 10pt Ultimate Light 8pt
Ultimate Demi 8pt
Ultimate Light 22pt
Ultimate Light 12pt
Ultimate Demi 12pt
Ultimate Demi 10pt
Ultimate Light 11pt
BRAND ELEMENTS WHITE PAPER 2.27
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
White paper templates use the secondary mark on the title page.
Throughout they also use a balance of Sourcefire red, black, and grey.
1
SNORT® THREAT
PREVENTION
COMPONENTS
2
1TITLIGN HERE LOREM
INTRODUCTION
Snort’s threat detection and prevention components work to-
gether to reassemble traffic, prevent evasions, detect threats,
and output information about these threats without creating
false positives or missing legitimate threats.
The threat prevention process in Snort consists
of multiple components which work together to reassemble
traffic as a target host would see it, identify traffic areas that
may contain threats, and match Snort rules against these
traffic areas to recognize attacks. Together, these components
efficiently detect threats and reduce or eliminate false alarms.
The threat prevention components of Snort include
a packet classifier, which decides which packets are inspect-
ed; an IP defragmenter and aTCP reassembler, which ensure
Snort inspects IP fragments andTCP segments in the proper
order; a portscan processor, which watches for portscans,
and a detection engine, which performs protocol normaliza-
tion, rule matching, and many other detection functions.
Snort’s detection components reside at the core of the threat
prevention capabilities of Sourcefire Intrusion Sensors.They
ensure that threats are detected, false positives and nega-
tives are avoided, and detection performance is high.
BENEFITS
The threat prevention components of Snort:
• Select traffic to be inspected, ensuring that only traffic that
could be vulnerable is inspected. Looking at only relevant
traffic helps Snort’s performance and limits the potential for
false positives.
• Normalize traffic to ensure that it is in a consistent format
and in the proper order prior to inspection. By putting traffic
in a consistent format and in
the order that the target sees it, Snort avoids the potential for
evasion.
• Match traffic against one of the industry’s largest rulesets
using a number of different detection methods. By using
multiple detection methods and using a large ruleset, Snort
ensures that
a wide variety of threats is detected and false negatives are
avoided.and security automation to respond to changing
THREAT PREVENTION COMPONENTS
PACKET CLASSIFIER
Snort begins processing the traffic it sees by classifying it at
a high level.The classifier decides whether a packet is:
• Token Ring/Ethernet/etc. • VLAN/NotVLAN
• IP/Not IP
• TCP/UDP/ICMP
IP DEFRAGMENTER
Once packet classification is complete, Snort defragments IP
packets.
IP fragmentation is the splitting of an IP datagram into two
or more smaller IP datagrams.Typically IP datagrams are
fragmented when the maximum size of a frame (MTU)
is exceeded, although they can be fragmented for other
reasons. IP fragments can arrive in any order at the destina-
tion system, and can reach the destination using different
paths.The destination system buffers IP fragments until all
the fragments of a datagram are received, following which it
processes the datagram.
Effective IPS implementations must handle: • IP fragments
arriving out of order
• IP datagrams that never complete
• Incorrect IP options
With certain IPS implementations, attackers can
take advantage of IP fragmentation by exploiting
the fact that different operating systems and IP implemen-
tations reassemble IP fragments differently under unusual
circumstances.These circumstances can include:
• Overlapping IP fragments
• Retransmitted fragments
Snort has a module called frag3 that serves as its IP de-
fragmenter. In order to detect attacks effectively, frag3 must
reassemble IP datagrams in the same way that the destina-
tion system for the attack would.Target- based analysis is a
relatively new concept in network- based intrusion preven-
tion.The idea of a target-based system is to model the actual
targets on the network instead of merely modeling the
protocols and looking for attacks within them.
In an environment where the attacker can determine what
Clan OT Light 28pt
Ultimate Demi 12pt
Ultimate Light 10pt
Ultimate Demi 10pt
Ultimate Light 10pt
BRAND ELEMENTS EVENT POP UP 2.28
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
20% dead space
Event pop up templates can use
both versions of a particular
illustration. All illustrations can be
used as long as the illustration
feels balanced in the
composition.
Clan OT Thin 190pt
Nexa Black 90pt
Ultimate Light 178pt
SOURCEFIRE.COM
DECEMBER 2012
9770 Patuxent Woods Drive
Columbia, MD 21046, United States

Weitere ähnliche Inhalte

Was ist angesagt?

Design Squid - Brandbook
Design Squid - Brandbook Design Squid - Brandbook
Design Squid - Brandbook Design Squid
 
Foursquare brandbook
Foursquare brandbookFoursquare brandbook
Foursquare brandbookchamberlinksp
 
1 brand guidelines
1 brand guidelines1 brand guidelines
1 brand guidelinesELF MACHINE
 
150211 FA ACC Brand Guideline
150211 FA ACC Brand Guideline150211 FA ACC Brand Guideline
150211 FA ACC Brand Guidelinearyan adia
 
anyclip_brand_guide
anyclip_brand_guideanyclip_brand_guide
anyclip_brand_guideDaryl McNutt
 
Lightstone-Visual-ID-guidelines-1.1
Lightstone-Visual-ID-guidelines-1.1Lightstone-Visual-ID-guidelines-1.1
Lightstone-Visual-ID-guidelines-1.1Chris Duffill
 
Branding for small business 2019
Branding for small business 2019Branding for small business 2019
Branding for small business 2019Paul Brammer
 
Countingup style guide - brand guidelines
Countingup style guide - brand guidelinesCountingup style guide - brand guidelines
Countingup style guide - brand guidelinesCountingup
 
Newark Office of Film + Television Brand Manual & Guide
Newark Office of Film + Television Brand Manual & GuideNewark Office of Film + Television Brand Manual & Guide
Newark Office of Film + Television Brand Manual & GuideIgor Alves
 
Brand Guideline for Empirico
Brand Guideline for EmpiricoBrand Guideline for Empirico
Brand Guideline for Empiricobrendayin
 
KFC Brand Standards Manual
KFC Brand Standards ManualKFC Brand Standards Manual
KFC Brand Standards ManualBill Smith
 
RTC brand guidelines
RTC brand guidelinesRTC brand guidelines
RTC brand guidelinesAndy Thornley
 

Was ist angesagt? (16)

Design Squid - Brandbook
Design Squid - Brandbook Design Squid - Brandbook
Design Squid - Brandbook
 
Foursquare brandbook
Foursquare brandbookFoursquare brandbook
Foursquare brandbook
 
1 brand guidelines
1 brand guidelines1 brand guidelines
1 brand guidelines
 
150211 FA ACC Brand Guideline
150211 FA ACC Brand Guideline150211 FA ACC Brand Guideline
150211 FA ACC Brand Guideline
 
Circles - Brandbook
Circles - BrandbookCircles - Brandbook
Circles - Brandbook
 
anyclip_brand_guide
anyclip_brand_guideanyclip_brand_guide
anyclip_brand_guide
 
Beyondsoft Brand Identity
Beyondsoft Brand IdentityBeyondsoft Brand Identity
Beyondsoft Brand Identity
 
Lightstone-Visual-ID-guidelines-1.1
Lightstone-Visual-ID-guidelines-1.1Lightstone-Visual-ID-guidelines-1.1
Lightstone-Visual-ID-guidelines-1.1
 
Branding for small business 2019
Branding for small business 2019Branding for small business 2019
Branding for small business 2019
 
Countingup style guide - brand guidelines
Countingup style guide - brand guidelinesCountingup style guide - brand guidelines
Countingup style guide - brand guidelines
 
Newark Office of Film + Television Brand Manual & Guide
Newark Office of Film + Television Brand Manual & GuideNewark Office of Film + Television Brand Manual & Guide
Newark Office of Film + Television Brand Manual & Guide
 
Brand Guideline for Empirico
Brand Guideline for EmpiricoBrand Guideline for Empirico
Brand Guideline for Empirico
 
Brand Manual Book
Brand Manual BookBrand Manual Book
Brand Manual Book
 
SFC Brand Guidelines
SFC Brand GuidelinesSFC Brand Guidelines
SFC Brand Guidelines
 
KFC Brand Standards Manual
KFC Brand Standards ManualKFC Brand Standards Manual
KFC Brand Standards Manual
 
RTC brand guidelines
RTC brand guidelinesRTC brand guidelines
RTC brand guidelines
 

Andere mochten auch

Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security ArchitectureCisco Canada
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web securityxKinAnx
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA FirepowerAnwesh Dixit
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER ServicesOscar Romano
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosCisco Canada
 

Andere mochten auch (6)

Gvl3 styleguide v1
Gvl3 styleguide v1Gvl3 styleguide v1
Gvl3 styleguide v1
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web security
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
 

Ähnlich wie Source Fire Corporate Style Guide

Menerey Design_Manual_A4
Menerey Design_Manual_A4Menerey Design_Manual_A4
Menerey Design_Manual_A4Julie Jones
 
Dewa branding guidelines copy
Dewa branding guidelines copyDewa branding guidelines copy
Dewa branding guidelines copySaugaat Allabadi
 
Playtech people Powerpoint Template
Playtech people Powerpoint TemplatePlaytech people Powerpoint Template
Playtech people Powerpoint TemplateLancBishop
 
Sunbit Brand Guidelines
Sunbit Brand GuidelinesSunbit Brand Guidelines
Sunbit Brand Guidelinesjustinhuerter1
 
DIY_Internal_Logo_Template.pptx
DIY_Internal_Logo_Template.pptxDIY_Internal_Logo_Template.pptx
DIY_Internal_Logo_Template.pptxst92360
 
TikTok_guidelines (1).pdf
TikTok_guidelines (1).pdfTikTok_guidelines (1).pdf
TikTok_guidelines (1).pdfNiacakeekarir
 
Houston Health Department Brand Manual
Houston Health Department Brand ManualHouston Health Department Brand Manual
Houston Health Department Brand ManualStephanie Coleman
 
This doctor dumped US job to build integrated medicine platform Syncremedies
This doctor dumped US job to build integrated medicine platform SyncremediesThis doctor dumped US job to build integrated medicine platform Syncremedies
This doctor dumped US job to build integrated medicine platform Syncremediesvinay vinu
 
Coinsecure Brand Book
Coinsecure Brand BookCoinsecure Brand Book
Coinsecure Brand BookVishnulal CR
 
Brand Guidelines | managerslides
Brand Guidelines | managerslidesBrand Guidelines | managerslides
Brand Guidelines | managerslidesmanagerslides
 
CARE Brand Standards Guide v3
CARE Brand Standards Guide v3CARE Brand Standards Guide v3
CARE Brand Standards Guide v3Stacy McNeiland
 
WD_Portfolio_Low
WD_Portfolio_LowWD_Portfolio_Low
WD_Portfolio_LowWD Agency
 

Ähnlich wie Source Fire Corporate Style Guide (20)

Menerey Design_Manual_A4
Menerey Design_Manual_A4Menerey Design_Manual_A4
Menerey Design_Manual_A4
 
Dewa branding guidelines copy
Dewa branding guidelines copyDewa branding guidelines copy
Dewa branding guidelines copy
 
Playtech people Powerpoint Template
Playtech people Powerpoint TemplatePlaytech people Powerpoint Template
Playtech people Powerpoint Template
 
Sunbit Brand Guidelines
Sunbit Brand GuidelinesSunbit Brand Guidelines
Sunbit Brand Guidelines
 
2 wire
2 wire2 wire
2 wire
 
DIY_Internal_Logo_Template.pptx
DIY_Internal_Logo_Template.pptxDIY_Internal_Logo_Template.pptx
DIY_Internal_Logo_Template.pptx
 
TikTok_guidelines (1).pdf
TikTok_guidelines (1).pdfTikTok_guidelines (1).pdf
TikTok_guidelines (1).pdf
 
Houston Health Department Brand Manual
Houston Health Department Brand ManualHouston Health Department Brand Manual
Houston Health Department Brand Manual
 
HomeStay Brand Book
HomeStay Brand BookHomeStay Brand Book
HomeStay Brand Book
 
This doctor dumped US job to build integrated medicine platform Syncremedies
This doctor dumped US job to build integrated medicine platform SyncremediesThis doctor dumped US job to build integrated medicine platform Syncremedies
This doctor dumped US job to build integrated medicine platform Syncremedies
 
Coinsecure Brand Book
Coinsecure Brand BookCoinsecure Brand Book
Coinsecure Brand Book
 
Brand Guidelines | managerslides
Brand Guidelines | managerslidesBrand Guidelines | managerslides
Brand Guidelines | managerslides
 
ZDNet Style Guide
ZDNet Style GuideZDNet Style Guide
ZDNet Style Guide
 
Sample identity style guide
Sample identity style guideSample identity style guide
Sample identity style guide
 
how we look A4
how we look A4how we look A4
how we look A4
 
CARE Brand Standards Guide v3
CARE Brand Standards Guide v3CARE Brand Standards Guide v3
CARE Brand Standards Guide v3
 
Identity manual
Identity manualIdentity manual
Identity manual
 
WD_Portfolio_Low2
WD_Portfolio_Low2WD_Portfolio_Low2
WD_Portfolio_Low2
 
WD Agency Portfolio
WD Agency PortfolioWD Agency Portfolio
WD Agency Portfolio
 
WD_Portfolio_Low
WD_Portfolio_LowWD_Portfolio_Low
WD_Portfolio_Low
 

Mehr von Bluetext

5 New Rules of Social Media Infused Event Digital Marketing
5 New Rules of Social Media Infused Event Digital Marketing5 New Rules of Social Media Infused Event Digital Marketing
5 New Rules of Social Media Infused Event Digital MarketingBluetext
 
Presidio: Health IT Campaign
Presidio: Health IT CampaignPresidio: Health IT Campaign
Presidio: Health IT CampaignBluetext
 
Google Transformers
Google TransformersGoogle Transformers
Google TransformersBluetext
 
Bluetext labs mobility infographic
Bluetext labs  mobility infographicBluetext labs  mobility infographic
Bluetext labs mobility infographicBluetext
 
Alcatel-Lucent eZine
Alcatel-Lucent eZineAlcatel-Lucent eZine
Alcatel-Lucent eZineBluetext
 
Acentia Branding
Acentia BrandingAcentia Branding
Acentia BrandingBluetext
 
Acentia: Advertising Campaign
Acentia: Advertising CampaignAcentia: Advertising Campaign
Acentia: Advertising CampaignBluetext
 
Sportsmen Vote Branding
Sportsmen Vote BrandingSportsmen Vote Branding
Sportsmen Vote BrandingBluetext
 
Source Fire Rebranding and Responsive Digital Platform
Source Fire Rebranding and Responsive Digital PlatformSource Fire Rebranding and Responsive Digital Platform
Source Fire Rebranding and Responsive Digital PlatformBluetext
 
Riverbed: Conundrum Campaign
Riverbed: Conundrum CampaignRiverbed: Conundrum Campaign
Riverbed: Conundrum CampaignBluetext
 
PrimeGlobal Branding - Accountants.org Digital Platform
PrimeGlobal Branding - Accountants.org Digital PlatformPrimeGlobal Branding - Accountants.org Digital Platform
PrimeGlobal Branding - Accountants.org Digital PlatformBluetext
 
Future Agency - A McAfee + Intel Campaign
Future Agency - A McAfee + Intel CampaignFuture Agency - A McAfee + Intel Campaign
Future Agency - A McAfee + Intel CampaignBluetext
 
CohnReznick
CohnReznickCohnReznick
CohnReznickBluetext
 
Citrix: Rumble Campaign
Citrix: Rumble CampaignCitrix: Rumble Campaign
Citrix: Rumble CampaignBluetext
 
Intel & Cisco - Round Peg In a Round Hole
Intel & Cisco - Round Peg In a Round HoleIntel & Cisco - Round Peg In a Round Hole
Intel & Cisco - Round Peg In a Round HoleBluetext
 

Mehr von Bluetext (20)

5 New Rules of Social Media Infused Event Digital Marketing
5 New Rules of Social Media Infused Event Digital Marketing5 New Rules of Social Media Infused Event Digital Marketing
5 New Rules of Social Media Infused Event Digital Marketing
 
Presidio: Health IT Campaign
Presidio: Health IT CampaignPresidio: Health IT Campaign
Presidio: Health IT Campaign
 
Google Transformers
Google TransformersGoogle Transformers
Google Transformers
 
Bluetext labs mobility infographic
Bluetext labs  mobility infographicBluetext labs  mobility infographic
Bluetext labs mobility infographic
 
Plasan
PlasanPlasan
Plasan
 
Symantec
SymantecSymantec
Symantec
 
Alcatel-Lucent eZine
Alcatel-Lucent eZineAlcatel-Lucent eZine
Alcatel-Lucent eZine
 
Lithium
LithiumLithium
Lithium
 
Acentia Branding
Acentia BrandingAcentia Branding
Acentia Branding
 
Citrix
CitrixCitrix
Citrix
 
Acentia: Advertising Campaign
Acentia: Advertising CampaignAcentia: Advertising Campaign
Acentia: Advertising Campaign
 
Sportsmen Vote Branding
Sportsmen Vote BrandingSportsmen Vote Branding
Sportsmen Vote Branding
 
Source Fire Rebranding and Responsive Digital Platform
Source Fire Rebranding and Responsive Digital PlatformSource Fire Rebranding and Responsive Digital Platform
Source Fire Rebranding and Responsive Digital Platform
 
Riverbed: Conundrum Campaign
Riverbed: Conundrum CampaignRiverbed: Conundrum Campaign
Riverbed: Conundrum Campaign
 
PrimeGlobal Branding - Accountants.org Digital Platform
PrimeGlobal Branding - Accountants.org Digital PlatformPrimeGlobal Branding - Accountants.org Digital Platform
PrimeGlobal Branding - Accountants.org Digital Platform
 
Google
GoogleGoogle
Google
 
Future Agency - A McAfee + Intel Campaign
Future Agency - A McAfee + Intel CampaignFuture Agency - A McAfee + Intel Campaign
Future Agency - A McAfee + Intel Campaign
 
CohnReznick
CohnReznickCohnReznick
CohnReznick
 
Citrix: Rumble Campaign
Citrix: Rumble CampaignCitrix: Rumble Campaign
Citrix: Rumble Campaign
 
Intel & Cisco - Round Peg In a Round Hole
Intel & Cisco - Round Peg In a Round HoleIntel & Cisco - Round Peg In a Round Hole
Intel & Cisco - Round Peg In a Round Hole
 

Kürzlich hochgeladen

定制(RMIT毕业证书)澳洲墨尔本皇家理工大学毕业证成绩单原版一比一
定制(RMIT毕业证书)澳洲墨尔本皇家理工大学毕业证成绩单原版一比一定制(RMIT毕业证书)澳洲墨尔本皇家理工大学毕业证成绩单原版一比一
定制(RMIT毕业证书)澳洲墨尔本皇家理工大学毕业证成绩单原版一比一lvtagr7
 
Pharmaceutical Packaging for the elderly.pdf
Pharmaceutical Packaging for the elderly.pdfPharmaceutical Packaging for the elderly.pdf
Pharmaceutical Packaging for the elderly.pdfAayushChavan5
 
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
Passbook project document_april_21__.pdf
Passbook project document_april_21__.pdfPassbook project document_april_21__.pdf
Passbook project document_april_21__.pdfvaibhavkanaujia
 
group_15_empirya_p1projectIndustrial.pdf
group_15_empirya_p1projectIndustrial.pdfgroup_15_empirya_p1projectIndustrial.pdf
group_15_empirya_p1projectIndustrial.pdfneelspinoy
 
Dubai Calls Girl Tapes O525547819 Real Tapes Escort Services Dubai
Dubai Calls Girl Tapes O525547819 Real Tapes Escort Services DubaiDubai Calls Girl Tapes O525547819 Real Tapes Escort Services Dubai
Dubai Calls Girl Tapes O525547819 Real Tapes Escort Services Dubaikojalkojal131
 
Design Portfolio - 2024 - William Vickery
Design Portfolio - 2024 - William VickeryDesign Portfolio - 2024 - William Vickery
Design Portfolio - 2024 - William VickeryWilliamVickery6
 
办理(USYD毕业证书)澳洲悉尼大学毕业证成绩单原版一比一
办理(USYD毕业证书)澳洲悉尼大学毕业证成绩单原版一比一办理(USYD毕业证书)澳洲悉尼大学毕业证成绩单原版一比一
办理(USYD毕业证书)澳洲悉尼大学毕业证成绩单原版一比一diploma 1
 
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree 毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree ttt fff
 
(办理学位证)埃迪斯科文大学毕业证成绩单原版一比一
(办理学位证)埃迪斯科文大学毕业证成绩单原版一比一(办理学位证)埃迪斯科文大学毕业证成绩单原版一比一
(办理学位证)埃迪斯科文大学毕业证成绩单原版一比一Fi sss
 
8377877756 Full Enjoy @24/7 Call Girls in Nirman Vihar Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Nirman Vihar Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Nirman Vihar Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Nirman Vihar Delhi NCRdollysharma2066
 
Call Girls in Ashok Nagar Delhi ✡️9711147426✡️ Escorts Service
Call Girls in Ashok Nagar Delhi ✡️9711147426✡️ Escorts ServiceCall Girls in Ashok Nagar Delhi ✡️9711147426✡️ Escorts Service
Call Girls in Ashok Nagar Delhi ✡️9711147426✡️ Escorts Servicejennyeacort
 
西北大学毕业证学位证成绩单-怎么样办伪造
西北大学毕业证学位证成绩单-怎么样办伪造西北大学毕业证学位证成绩单-怎么样办伪造
西北大学毕业证学位证成绩单-怎么样办伪造kbdhl05e
 
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
FiveHypotheses_UIDMasterclass_18April2024.pdf
FiveHypotheses_UIDMasterclass_18April2024.pdfFiveHypotheses_UIDMasterclass_18April2024.pdf
FiveHypotheses_UIDMasterclass_18April2024.pdfShivakumar Viswanathan
 
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书zdzoqco
 
ARt app | UX Case Study
ARt app | UX Case StudyARt app | UX Case Study
ARt app | UX Case StudySophia Viganò
 
How to Empower the future of UX Design with Gen AI
How to Empower the future of UX Design with Gen AIHow to Empower the future of UX Design with Gen AI
How to Empower the future of UX Design with Gen AIyuj
 
Untitled presedddddddddddddddddntation (1).pptx
Untitled presedddddddddddddddddntation (1).pptxUntitled presedddddddddddddddddntation (1).pptx
Untitled presedddddddddddddddddntation (1).pptxmapanig881
 

Kürzlich hochgeladen (20)

定制(RMIT毕业证书)澳洲墨尔本皇家理工大学毕业证成绩单原版一比一
定制(RMIT毕业证书)澳洲墨尔本皇家理工大学毕业证成绩单原版一比一定制(RMIT毕业证书)澳洲墨尔本皇家理工大学毕业证成绩单原版一比一
定制(RMIT毕业证书)澳洲墨尔本皇家理工大学毕业证成绩单原版一比一
 
Pharmaceutical Packaging for the elderly.pdf
Pharmaceutical Packaging for the elderly.pdfPharmaceutical Packaging for the elderly.pdf
Pharmaceutical Packaging for the elderly.pdf
 
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
 
Passbook project document_april_21__.pdf
Passbook project document_april_21__.pdfPassbook project document_april_21__.pdf
Passbook project document_april_21__.pdf
 
group_15_empirya_p1projectIndustrial.pdf
group_15_empirya_p1projectIndustrial.pdfgroup_15_empirya_p1projectIndustrial.pdf
group_15_empirya_p1projectIndustrial.pdf
 
Dubai Calls Girl Tapes O525547819 Real Tapes Escort Services Dubai
Dubai Calls Girl Tapes O525547819 Real Tapes Escort Services DubaiDubai Calls Girl Tapes O525547819 Real Tapes Escort Services Dubai
Dubai Calls Girl Tapes O525547819 Real Tapes Escort Services Dubai
 
Design Portfolio - 2024 - William Vickery
Design Portfolio - 2024 - William VickeryDesign Portfolio - 2024 - William Vickery
Design Portfolio - 2024 - William Vickery
 
办理(USYD毕业证书)澳洲悉尼大学毕业证成绩单原版一比一
办理(USYD毕业证书)澳洲悉尼大学毕业证成绩单原版一比一办理(USYD毕业证书)澳洲悉尼大学毕业证成绩单原版一比一
办理(USYD毕业证书)澳洲悉尼大学毕业证成绩单原版一比一
 
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree 毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
(办理学位证)埃迪斯科文大学毕业证成绩单原版一比一
(办理学位证)埃迪斯科文大学毕业证成绩单原版一比一(办理学位证)埃迪斯科文大学毕业证成绩单原版一比一
(办理学位证)埃迪斯科文大学毕业证成绩单原版一比一
 
8377877756 Full Enjoy @24/7 Call Girls in Nirman Vihar Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Nirman Vihar Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Nirman Vihar Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Nirman Vihar Delhi NCR
 
Call Girls in Ashok Nagar Delhi ✡️9711147426✡️ Escorts Service
Call Girls in Ashok Nagar Delhi ✡️9711147426✡️ Escorts ServiceCall Girls in Ashok Nagar Delhi ✡️9711147426✡️ Escorts Service
Call Girls in Ashok Nagar Delhi ✡️9711147426✡️ Escorts Service
 
西北大学毕业证学位证成绩单-怎么样办伪造
西北大学毕业证学位证成绩单-怎么样办伪造西北大学毕业证学位证成绩单-怎么样办伪造
西北大学毕业证学位证成绩单-怎么样办伪造
 
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
 
FiveHypotheses_UIDMasterclass_18April2024.pdf
FiveHypotheses_UIDMasterclass_18April2024.pdfFiveHypotheses_UIDMasterclass_18April2024.pdf
FiveHypotheses_UIDMasterclass_18April2024.pdf
 
Call Girls in Pratap Nagar, 9953056974 Escort Service
Call Girls in Pratap Nagar,  9953056974 Escort ServiceCall Girls in Pratap Nagar,  9953056974 Escort Service
Call Girls in Pratap Nagar, 9953056974 Escort Service
 
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
 
ARt app | UX Case Study
ARt app | UX Case StudyARt app | UX Case Study
ARt app | UX Case Study
 
How to Empower the future of UX Design with Gen AI
How to Empower the future of UX Design with Gen AIHow to Empower the future of UX Design with Gen AI
How to Empower the future of UX Design with Gen AI
 
Untitled presedddddddddddddddddntation (1).pptx
Untitled presedddddddddddddddddntation (1).pptxUntitled presedddddddddddddddddntation (1).pptx
Untitled presedddddddddddddddddntation (1).pptx
 

Source Fire Corporate Style Guide

  • 2. CONTENTS SOURCEFIRE IDENTITY GUIDELINES 2012 BRAND IDENTITY 1.02 Creative Concept 1.03 Logo 1.04 Secondary Mark 1.05 Logo Application 1.06 Logo Versions 1.07 Logo Clear Space + Minimum Size 1.08 Logo Inccorrect Usage SOURCEFIRE BRAND ELEMENTS 2.02 Sourcefire 2.03 Primary Palette 2.04 Secondary Palette 2.05 Primary Typography 2.06 - 2.07 Supporting Typography 2.08 Iconography 2.09 - 2.15 Web Site 2.16 Mobile Site 2.17 Email Template 2.18 - 2.19 Powerpoint 2.20 - 2.24 Illustration Style 2.25 Collateral Stationary 2.26 Collateral Data Sheet 2.27 Collateral White Paper 2.28 Collateral Trade Show Pop-Up
  • 4. WELLNET TREE BRAND IDENTITY CREATIVE CONCEPT 1.02 Sourcefire, Inc. (NASDAQ: FIRE), a world leader in intelligent cybersecurity solutions, is transforming the way global large- to mid-size organizations and government agencies manage and minimize network security risks. With solutions from a next-generation network security platform to advanced malware protection, Sourcefire provides customers with Agile Security® that is as dynamic as the real world it protects and the attackers against which it defends. Trusted for more than 10 years, Sourcefire has been consistently recognized for its innovation and industry leadership with numerous patents, world-class research, and award-winning technology. Today, the name Sourcefire has grown synonymous with innovation, security intelligence and agile end-to-end security protection. SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
  • 5. HEX #EB0028 RGB r235 g0 b40 CMYK c1 m100 y92 k0 PANTONE PMS 185C HEX #000000 RGB r0 g0 b0 CMYK c75 m68 y67 k90 PANTONE Black C BRAND IDENTITY LOGO 1.03 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 Our logo is the most visible and defining signal of the Sourcefire brand identity. It is one of our most important assets and must be used carefully and consistently to ensure that our brand is effectively presented and promoted across all media.
  • 6. BRAND IDENTITY SECONDARY MARK 1.04 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 In addition to our logo we introduce a secondary mark that we use consistently throughout all collateral. Below you will see two examples of how we have applied this mark to collateral. In one we place it to the far right of the logo with a gradient line, and in the other we use it as a watermark on a business card.
  • 7. The Sourcefire logo can be applied in its positive form or reversed out on contrasting background. These two are the preferred applications of our logo. PREFERRED POSITIVE LOGO ALTERNATE REVERSED LOGO BRAND IDENTITY LOGO APPLICATION 1.05 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
  • 8. The preferred use of the logo are both full color on white and reversed color on black. Solid black on white background is acceptable for black and white applications, and the logo may also be reversed out in white on a black background. POSITIVE ON WHITE BLACK ON WHITE REVERSED ON BLACK REVERSED ON BLACK SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 BRAND IDENTITY LOGO VERSIONS 1.06
  • 9. BRAND IDENTITY LOGO CLEAR SPACE AND MINIMUM SIZE 1.07 MINIMUM SIZE: PRINT MINIMUM SIZE: SCREEN 50PX 1 INCH S CLEAR SPACE S S SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 It is important that the Sourcefire logo be visible and uncluttered in its context. A minimum of “S” area around the logo should be observed. These size requirements should be followed for all logo applications. The “S” measurement represents the height of the “S” in the Sourcefire logo. The preferred minimum print size for the logo is 1” wide. The logo should always be scaled proportionally width/height. The preferred minimum pixel size for the logo is 50px wide. The logo should always be scaled proportionally width/ height.
  • 10. The Sourcefire logo has been designed to effectively promote the brand in its unaltered state and should not be modified or corrupted in any manner. Improper use of the logo compromises the integrity of our brand and makes legal protection more difficult. These examples represent some of the possible misuses–careful consideration should be given to circumstances that are not illustrated in these examples. Do not place the logo on complex imagesDo not add elements to the logo Do not add a drop shadow or filter effect Do not alter logo colors Do not place the logo on an angle Do not recreate elements of the logo Do not distort or change proportions of the logo Do not place the logo on a pattern Do not place the logo within another shape BRAND IDENTITY LOGO INCORRECT USAGE 1.08 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
  • 11. 1.03BRAND IDENTITY ELEMENTS 9 HELLOWALLET BRAND IDENTITY GUIDELINES 2012 SOURCEFIRE BRAND ELEMENTS SOURCEFIRE BRAND ELEMENTS 2.01
  • 12. SOURCEFIRE SOURCEFIRE BRAND ELEMENTS 2.02 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 Sourcefire, Inc. (NASDAQ: FIRE), a world leader in intelligent cybersecurity solutions, is transforming the way global large- to mid-size organizations and government agencies manage and minimize network security risks. With solutions from a next-generation network security platform to advanced malware protection, Sourcefire provides customers with Agile Security® that is as dynamic as the real world it protects and the attackers against which it defends. Trusted for more than 10 years, Sourcefire has been consistently recognized for its innovation and industry leadership with numerous patents, world-class research, and award-winning technology. Today, the name Sourcefire has grown synonymous with innovation, security intelligence and agile end-to-end security protection.
  • 13. PRIMARY PALETTE BRAND ELEMENTS COLOR PRIMARY PALETTE 2.03 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 HEX #ececec RGB r118 g118 b118 CMYK c55 m47 y46 k11 PANTONE PMS 22% 6C HEX #EB0028 RGB r235 g0 b40 CMYK c1 m100 y92 k0 PANTONE PMS 185C Sourcefire’s brand is also unified by a consistent color standard. The color palette is divided into two categories, primary and secondary. The primary palette should be dominant in visual expressions. The secondary palette provides flexibility to the system and allows a broader range of color identification. Consistent usage will enhance the visual presentation of the brand across all expressions. *Please note that upon receiving the Sourcefire brand guidelines we can adjust all colors in this document accordingly; all color shades have been pulled directly from the sourcefire logo and website* HEX #000000 RGB r0 g0 b0 CMYK c75 m68 y67 k90 PANTONE Black C 1 9770 Patuxent Woods Drive | Columbia, MD 21046 | p. 800.917.4134 | f. 410.290.0024 | www.sourcefire.com
  • 14. PANTONE SECONDARY PALETTE SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 BRAND ELEMENTS COLOR SECONDARY PALETTE 2.04 HEX #F9E431 RGB r249 g228 b49 CMYK c4 m4 y90 k0 PANTONE PMS 113C HEX #1DB24B RGB r112 g136 b56 CMYK c79 m0 y100 k0 PANTONE PMS 361C HEX #E32B25 RGB r174 g84 b122 CMYK c32 m79 y32 k3 PANTONE PMS 485C HEX #2F9AA6 RGB r0 g90 b134 CMYK c96 m64 y26 k8 PMS 2945C The colors reflected in a printout of this guide should not be considered an accurate PANTONE color match. Refer to the current edition of the PANTONE Color Formula Guide for accurate color assessment. PANTONE® is a registered trademark of Pantone, Inc. PMS refers to Pantone Matching System.
  • 15. ClanOT ClanOT Light ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 0123456789 ClanOT Book ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 0123456789 ClanOT Medium ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 0123456789 ClanOT Bold ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 0123456789 USAGE GUIDELINES • Large Titling • Page Titling BRAND ELEMENTS PRIMARY TYPOGRAPHY 2.05 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 ClanOT Light is the primary font for page titling, and large titling. These fonts, in concert with Ultimate Light Medium make up the refreshed Sourcefire brand.
  • 16. The Nexa family is used for supporting typography. Used primarily for navigation in the website, its various weights can also be used for sub navigation or headers. NEXA Nexa Light ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 0123456789 Nexa Regular ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 0123456789 ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 0123456789 ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 0123456789 ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 0123456789 Nexa Bold Nexa Black Nexa Book USEAGE GUIDELINES • Large Promo Subtitle BRAND ELEMENTS SUPPORTING TYPOGRAPHY 2.06 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
  • 17. A variety of the Ultimate font faces make up the bulk of context. The combination of Ultimate Light and Medium make up the body copy, and also are used in side promos and sub navigation. ULTIMATE Ultimate Light ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 0123456789 Ultimate Regular ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 0123456789 ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 0123456789 ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 0123456789 ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 0123456789 Ultimate Demi Bold Ultimate Medium Italic Ultimate Bold USEAGE GUIDELINES • Call to action type • Main body type • Navigation • Subheaders on promos BRAND ELEMENTS SUPPORTING TYPOGRAPHY 2.07 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
  • 18. BRAND ELEMENTS ICONOGRAPHY 2.08 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 ICONOGRAPHY Icons should be simple two-dimensional graphics that are one color and easily communicate our services. Icons can appear on the homepage and in other collateral. Any new icons should follow above look and feel.
  • 19. The website designs all contain a heavy top section which is balanced by a more open, lighter bottom half. The brand is reinforced by using the brand colors, red, black and grey. Top dynamic leads use the new illustration styles to provide bursts of color that attract the eye to important messaging or call to actions. Page variety can be explored by using various templates and illustration styles. This dynamic lead uses red dot indicators that show which promo is currently being viewed. BRAND ELEMENTS WEB 2.09 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
  • 20. The drop down navigation should be styled with subnavigation links on the right, and image promo on the left. The drop down box should have some transparency and subtle background drop shadow. BRAND ELEMENTS WEB 2.10 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
  • 21. BRAND ELEMENTS WEB 2.11 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
  • 22. BRAND ELEMENTS WEB 2.12 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
  • 23. BRAND ELEMENTS WEB 2.13 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 Clicking the agile security button expands the page to reveal video and type promos. If the user clicks the agile security button in the top right of the home page it sends the user down the page and this section automatically expands.
  • 24. BRAND ELEMENTS WEB 2.14 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 Landing pages use a different type of dynamic lead at the top of the page. This style uses three thin line timers that fill with red as time passes. When the line is completely red the next promo will appear and the next timer will begin.
  • 25. BRAND ELEMENTS WEB 2.15 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 Generic pages use a static dynamic lead at the top of pages. Below the dynamic lead this template uses a basic three column grid.
  • 26. SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 BRAND ELEMENTS MOBILE SITE 2.16 The website features a responsive design, so it is optimized for mobile devices. The design is slightly different than desktop on mobile devices but features many of the same styles, dynamic leads, and promos.
  • 27. BRAND ELEMENTS EMAIL TEMPLATE 2.17 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 Email templates also use custom illustrations in top headers. These use the lighter versions of illustration, and like the website use a balance of Sourcefire red, black, and grey. Ultimate Medium 14pt Ultimate Light 15pt Ultimate Light 12pt Ultimate Light 12pt Ultimate Light 14pt Ultimate Medium 16pt Clan OT Medium 18pt Clan OT Medium 24pt
  • 28. BRAND ELEMENTS POWERPOINT 2.18 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 Powerpoint templates use the lighter version of this particular illustration. Other light versions of illustrations could be substituted as long as the illustration feels balanced in the composition. Clan OT Light 60pt Nexa Black 18pt
  • 29. BRAND ELEMENTS POWERPOINT 2.19 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 The interior Powerpoint template is light like the cover template. This keeps the design consistent and reduces the ink used in printing. Clan OT Light 38pt Ultimate Regular 22pt Ultimate Light 18pt
  • 30. BRAND ELEMENTS ILLUSTRATION STYLE 2.20 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 Illustrations all have light and dark versions. These illustrations use a consistent color palette and contain the same level of complexity that reflects the theme of the illustration. The complexity is based on an illustration’s shape, interior design, outer line work, and icon work in the background. Clan OT Light 51pt Nexa Black 24pt
  • 31. BRAND ELEMENTS ILLUSTRATION STYLE 2.21 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
  • 32. BRAND ELEMENTS ILLUSTRATION STYLE 2.22 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
  • 33. BRAND ELEMENTS ILLUSTRATION STYLE 2.23 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
  • 34. BRAND ELEMENTS ILLUSTRATION STYLE 2.24 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 The illustrations without words should be used for the website dynamic leads since the text shown on the website overlays the image that is uploaded.
  • 35. BRAND ELEMENTS STATIONARY 2.25 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 1 9770 Patuxent Woods Drive | Columbia, MD 21046 | p. 800.917.4134 | f. 410.290.0024 | www.sourcefire.com 9770 Patuxent Woods Drive Columbia, MD 21046 www.sourcefire.com Stationary is kept open and light. Secondary mark is used in all pieces of collateral. Ultimate Light 7pt Ultimate Light 7pt Ultimate Regular 8pt Ultimate Light 7pt Ultimate Light 7pt Ultimate Medium 7pt John Doe Vice President 9770 Patuxent Woods Drive Columbia, MD 21046 w. 1 (800) 917-4134 c. 1 (301) 915-9300 jdoe@sourcefire.com Ultimate Light 10pt
  • 36. BRAND ELEMENTS DATA SHEET 2.26 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 1 Change is constant. We all know information technology deployments are com- plex and chaotic. In the real world, the IT environment changes unpredictably, and staff is pressured for time, experience and resources. Threats are, in most cases, unpredictable and un- knowable. In the real world, you cannot effectively address security with static defenses. Sourcefire takes a new approach to security—one that quickly and effectively protects your environ- ment against rapidly changing attacks. Designed to deliver Agile Security™, Sourcefire’s solutions, from industry-leading next- generation network security appliances to advanced malware protection, are as dynamic as the real world they protect and the attackers against which they defend. 1AGILE SECURITY TITLIGN HERE LOREM 1 A continuous process, supported by advanced technologies, that enables you to: • SEE everything in your environment • LEARN by applying security intelligence to data • ADAPT defenses automatically ACT in real-time Agile Security SUB TITLING TO GO HERE LOREM IPSM Solutions At A Glance To better protect your unique environment, Sourcefire’s portfolio of intelligent cybersecurity solutions includes: Next-Generation Intrusion Prevention System (NGIPS) Sourcefire NGIPS sets a new standard in advanced threat protection, integrating real-time contextual awareness, intelligent security automation, and unprecedented performance with industry-leading threat prevention effectiveness. Optional application control and URL filtering provide greater threat mitigation over applications, users and suspicious sites. Next-Generation Firewall (NGFW) Sourcefire provides the only NGFW to combine control and effective threat protection. NGFW in- cludes the world’s most powerful NGIPS, integrated application control and firewall functionality in a universal, high-performance security appliance that, unlike other offerings, requires no compromises. 2 Advanced Malware Protection Our enterprise-class advanced jmalware analysis and protection solutions are among the first to use ‘big data’ to provide the visibility and control you need to discover, understand and stop threats missed by other security layers. A version to protect against mobile malware is also available. Security Innovation At Work For You Sourcefire’s portfolio of cybersecurity solutions incorporate innovative and patented technologies designed to fuel your advantage against attackers. 2AGILE SECURITY TITLIGN HERE LOREM FirePOWER™ Network Security Appliances – our purpose-built network security appliances feature unique hardware acceleration technology that de- livers industry-best threat protection with unmatched performance, scalability and energy efficiency FireSIGHT® Defense Center – the central management console for all Sourcefire security solutions featuring patented real-time awareness tech- nology for next-generation solutions that provides full stack visibility, event correlation and security automation to respond to changing conditions and new attacks FireAMP™ Advanced Malware Protection – an intelligent malware pro- tection solution that leverages cloud computing and large-scale data mining to deliver a uniquely effective approach to detection, analysis and remedia- tion of advanced malware outbreaks FireCLOUD™ Security Intelligence Services – collective intelligence deliv- ered from our cloud-based, big data analytics system designed to discover, analyze and store information on network threats, advanced malware, file reputation and other security data Key Capabilities Providing continuous protection in a world of continuous change, Sourcefire solutions stand apart with the following key capabilities: Advanced Threat Protection – FirePOWER next-generation network security appliances deliver the best threat prevention that money can buy—period. Our industry-leading security protection and effectiveness is validated by independent third-party testing and thousands of satisfied customers around the world. FireAMP provides additional protection, stopping malware at the point of entry. Data sheet templates also use custom illustrations in top headers. These use the lighter versions of illustration, and like the website use a balance of Sourcefire red, black, and grey. Ultimate Light 10pt Ultimate Light 8pt Ultimate Demi 8pt Ultimate Light 22pt Ultimate Light 12pt Ultimate Demi 12pt Ultimate Demi 10pt Ultimate Light 11pt
  • 37. BRAND ELEMENTS WHITE PAPER 2.27 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 White paper templates use the secondary mark on the title page. Throughout they also use a balance of Sourcefire red, black, and grey. 1 SNORT® THREAT PREVENTION COMPONENTS 2 1TITLIGN HERE LOREM INTRODUCTION Snort’s threat detection and prevention components work to- gether to reassemble traffic, prevent evasions, detect threats, and output information about these threats without creating false positives or missing legitimate threats. The threat prevention process in Snort consists of multiple components which work together to reassemble traffic as a target host would see it, identify traffic areas that may contain threats, and match Snort rules against these traffic areas to recognize attacks. Together, these components efficiently detect threats and reduce or eliminate false alarms. The threat prevention components of Snort include a packet classifier, which decides which packets are inspect- ed; an IP defragmenter and aTCP reassembler, which ensure Snort inspects IP fragments andTCP segments in the proper order; a portscan processor, which watches for portscans, and a detection engine, which performs protocol normaliza- tion, rule matching, and many other detection functions. Snort’s detection components reside at the core of the threat prevention capabilities of Sourcefire Intrusion Sensors.They ensure that threats are detected, false positives and nega- tives are avoided, and detection performance is high. BENEFITS The threat prevention components of Snort: • Select traffic to be inspected, ensuring that only traffic that could be vulnerable is inspected. Looking at only relevant traffic helps Snort’s performance and limits the potential for false positives. • Normalize traffic to ensure that it is in a consistent format and in the proper order prior to inspection. By putting traffic in a consistent format and in the order that the target sees it, Snort avoids the potential for evasion. • Match traffic against one of the industry’s largest rulesets using a number of different detection methods. By using multiple detection methods and using a large ruleset, Snort ensures that a wide variety of threats is detected and false negatives are avoided.and security automation to respond to changing THREAT PREVENTION COMPONENTS PACKET CLASSIFIER Snort begins processing the traffic it sees by classifying it at a high level.The classifier decides whether a packet is: • Token Ring/Ethernet/etc. • VLAN/NotVLAN • IP/Not IP • TCP/UDP/ICMP IP DEFRAGMENTER Once packet classification is complete, Snort defragments IP packets. IP fragmentation is the splitting of an IP datagram into two or more smaller IP datagrams.Typically IP datagrams are fragmented when the maximum size of a frame (MTU) is exceeded, although they can be fragmented for other reasons. IP fragments can arrive in any order at the destina- tion system, and can reach the destination using different paths.The destination system buffers IP fragments until all the fragments of a datagram are received, following which it processes the datagram. Effective IPS implementations must handle: • IP fragments arriving out of order • IP datagrams that never complete • Incorrect IP options With certain IPS implementations, attackers can take advantage of IP fragmentation by exploiting the fact that different operating systems and IP implemen- tations reassemble IP fragments differently under unusual circumstances.These circumstances can include: • Overlapping IP fragments • Retransmitted fragments Snort has a module called frag3 that serves as its IP de- fragmenter. In order to detect attacks effectively, frag3 must reassemble IP datagrams in the same way that the destina- tion system for the attack would.Target- based analysis is a relatively new concept in network- based intrusion preven- tion.The idea of a target-based system is to model the actual targets on the network instead of merely modeling the protocols and looking for attacks within them. In an environment where the attacker can determine what Clan OT Light 28pt Ultimate Demi 12pt Ultimate Light 10pt Ultimate Demi 10pt Ultimate Light 10pt
  • 38. BRAND ELEMENTS EVENT POP UP 2.28 SOURCEFIRE BRAND IDENTITY GUIDELINES 2012 20% dead space Event pop up templates can use both versions of a particular illustration. All illustrations can be used as long as the illustration feels balanced in the composition. Clan OT Thin 190pt Nexa Black 90pt Ultimate Light 178pt
  • 39. SOURCEFIRE.COM DECEMBER 2012 9770 Patuxent Woods Drive Columbia, MD 21046, United States