This document provides branding guidelines for Sourcefire, including their logo, color palette, typography, icons and styles for various branding elements like their website, presentations, illustrations and collateral. It specifies the correct uses of their logo and secondary mark. The primary colors are Sourcefire red, black and grey. The main fonts are ClanOT for titles and Ultimate for body copy. Website designs feature dynamic graphic elements and a balanced layout. Illustration styles are also outlined.
4. WELLNET TREE
BRAND IDENTITY CREATIVE CONCEPT 1.02
Sourcefire, Inc. (NASDAQ: FIRE), a world leader in
intelligent cybersecurity solutions, is transforming the way
global large- to mid-size organizations and government
agencies manage and minimize network security risks. With
solutions from a next-generation network security platform
to advanced malware protection, Sourcefire provides
customers with Agile Security® that is as dynamic as the
real world it protects and the attackers against which it
defends. Trusted for more than 10 years, Sourcefire has
been consistently recognized for its innovation and industry
leadership with numerous patents, world-class research,
and award-winning technology. Today, the name
Sourcefire has grown synonymous with innovation, security
intelligence and agile end-to-end security protection.
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
5. HEX
#EB0028
RGB
r235 g0 b40
CMYK
c1 m100 y92 k0
PANTONE
PMS 185C
HEX
#000000
RGB
r0 g0 b0
CMYK
c75 m68 y67 k90
PANTONE
Black C
BRAND IDENTITY LOGO 1.03
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Our logo is the most visible and defining
signal of the Sourcefire brand identity.
It is one of our most important assets and
must be used carefully and consistently
to ensure that our brand is effectively
presented and promoted across all
media.
6. BRAND IDENTITY SECONDARY MARK 1.04
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
In addition to our logo we introduce a
secondary mark that we use consistently
throughout all collateral.
Below you will see two examples of how we
have applied this mark to collateral. In one
we place it to the far right of the logo with a
gradient line, and in the other we use it as a
watermark on a business card.
7. The Sourcefire logo can be applied in its
positive form or reversed out on contrasting
background. These two are the preferred
applications of our logo.
PREFERRED POSITIVE LOGO
ALTERNATE REVERSED LOGO
BRAND IDENTITY LOGO APPLICATION 1.05
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
8. The preferred use of the logo are both full
color on white and reversed color on black.
Solid black on white background is
acceptable for black and white applications,
and the logo may also be reversed out in
white on a black background.
POSITIVE ON WHITE
BLACK ON WHITE
REVERSED ON BLACK
REVERSED ON BLACK
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND IDENTITY LOGO VERSIONS 1.06
9. BRAND IDENTITY LOGO CLEAR SPACE AND MINIMUM SIZE 1.07
MINIMUM SIZE: PRINT MINIMUM SIZE: SCREEN
50PX
1 INCH
S
CLEAR SPACE
S
S
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
It is important that the Sourcefire logo
be visible and uncluttered in its context.
A minimum of “S” area around the
logo should be observed. These size
requirements should be followed for all
logo applications. The “S” measurement
represents the height of the “S” in the
Sourcefire logo.
The preferred minimum print size for the
logo is 1” wide. The logo should always
be scaled proportionally width/height.
The preferred minimum pixel size for
the logo is 50px wide. The logo should
always be scaled proportionally width/
height.
10. The Sourcefire logo has been
designed to effectively promote
the brand in its unaltered state
and should not be modified or
corrupted in any manner.
Improper use of the logo
compromises the integrity of our
brand and makes legal
protection more difficult.
These examples represent some
of the possible misuses–careful
consideration should be given to
circumstances that are not
illustrated in these examples.
Do not place the logo on complex imagesDo not add elements to the logo
Do not add a drop shadow or filter effect
Do not alter logo colors
Do not place the logo on an angle
Do not recreate elements of the logo Do not distort or change proportions of the logo Do not place the logo on a pattern
Do not place the logo within another shape
BRAND IDENTITY LOGO INCORRECT USAGE 1.08
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
11. 1.03BRAND IDENTITY ELEMENTS
9 HELLOWALLET BRAND IDENTITY GUIDELINES 2012
SOURCEFIRE
BRAND ELEMENTS
SOURCEFIRE BRAND ELEMENTS 2.01
12. SOURCEFIRE
SOURCEFIRE BRAND ELEMENTS 2.02
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Sourcefire, Inc. (NASDAQ: FIRE), a world leader in intelligent cybersecurity
solutions, is transforming the way global large- to mid-size organizations and
government agencies manage and minimize network security risks. With
solutions from a next-generation network security platform to advanced
malware protection, Sourcefire provides customers with Agile Security® that is
as dynamic as the real world it protects and the attackers against which it
defends. Trusted for more than 10 years, Sourcefire has been consistently
recognized for its innovation and industry leadership with numerous patents,
world-class research, and award-winning technology. Today, the name
Sourcefire has grown synonymous with innovation, security intelligence and
agile end-to-end security protection.
13. PRIMARY PALETTE
BRAND ELEMENTS COLOR PRIMARY PALETTE 2.03
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
HEX
#ececec
RGB
r118 g118 b118
CMYK
c55 m47 y46 k11
PANTONE
PMS 22% 6C
HEX
#EB0028
RGB
r235 g0 b40
CMYK
c1 m100 y92 k0
PANTONE
PMS 185C
Sourcefire’s brand is also unified by a consistent color standard. The color palette is divided into two categories, primary and secondary. The primary palette should be dominant in
visual expressions. The secondary palette provides flexibility to the system and allows a broader range of color identification.
Consistent usage will enhance the visual presentation of the brand across all expressions.
*Please note that upon receiving the Sourcefire brand guidelines we can adjust all colors in this document accordingly; all color shades have been pulled directly from the
sourcefire logo and website*
HEX
#000000
RGB
r0 g0 b0
CMYK
c75 m68 y67 k90
PANTONE
Black C
1
9770 Patuxent Woods Drive | Columbia, MD 21046 | p. 800.917.4134 | f. 410.290.0024 | www.sourcefire.com
14. PANTONE
SECONDARY PALETTE
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS COLOR SECONDARY PALETTE 2.04
HEX
#F9E431
RGB
r249 g228 b49
CMYK
c4 m4 y90 k0
PANTONE
PMS 113C
HEX
#1DB24B
RGB
r112 g136 b56
CMYK
c79 m0 y100 k0
PANTONE
PMS 361C
HEX
#E32B25
RGB
r174 g84 b122
CMYK
c32 m79 y32 k3
PANTONE
PMS 485C
HEX
#2F9AA6
RGB
r0 g90 b134
CMYK
c96 m64 y26 k8
PMS 2945C
The colors reflected in a printout of this guide should not be considered an accurate PANTONE color match. Refer to the current
edition of the PANTONE Color Formula Guide for accurate color assessment. PANTONE® is a registered trademark of Pantone, Inc.
PMS refers to Pantone Matching System.
16. The Nexa family is used for supporting typography. Used primarily for
navigation in the website, its various weights can also be used for sub
navigation or headers.
NEXA
Nexa Light
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
Nexa Regular
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
Nexa Bold
Nexa Black
Nexa Book
USEAGE GUIDELINES
• Large Promo Subtitle
BRAND ELEMENTS SUPPORTING TYPOGRAPHY 2.06
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
17. A variety of the Ultimate font faces make up the bulk of context. The
combination of Ultimate Light and Medium make up the body copy,
and also are used in side promos and sub navigation.
ULTIMATE
Ultimate Light
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
Ultimate Regular
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789
Ultimate Demi Bold
Ultimate Medium Italic
Ultimate Bold
USEAGE GUIDELINES
• Call to action type
• Main body type
• Navigation
• Subheaders on promos
BRAND ELEMENTS SUPPORTING TYPOGRAPHY 2.07
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
18. BRAND ELEMENTS ICONOGRAPHY 2.08
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
ICONOGRAPHY
Icons should be simple two-dimensional graphics that are one color and easily
communicate our services. Icons can appear on the homepage and in other collateral.
Any new icons should follow above look and feel.
19. The website designs all
contain a heavy top
section which is balanced
by a more open, lighter
bottom half. The brand is
reinforced by using the
brand colors, red, black
and grey. Top dynamic
leads use the new
illustration styles to provide
bursts of color that attract
the eye to important
messaging or call to
actions.
Page variety can be
explored by using various
templates and illustration
styles.
This dynamic lead uses
red dot indicators that
show which promo is
currently being viewed.
BRAND ELEMENTS WEB 2.09
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
20. The drop down navigation
should be styled with
subnavigation links on the
right, and image promo
on the left.
The drop down box
should have some
transparency and subtle
background drop
shadow.
BRAND ELEMENTS WEB 2.10
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
23. BRAND ELEMENTS WEB 2.13
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Clicking the agile security
button expands the page
to reveal video and type
promos. If the user clicks
the agile security button in
the top right of the home
page it sends the user
down the page and this
section automatically
expands.
24. BRAND ELEMENTS WEB 2.14
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Landing pages use a
different type of dynamic
lead at the top of the page.
This style uses three thin
line timers that fill with red
as time passes. When the
line is completely red the
next promo will appear
and the next timer will
begin.
25. BRAND ELEMENTS WEB 2.15
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Generic pages use a static
dynamic lead at the top of
pages. Below the dynamic
lead this template uses a
basic three column grid.
26. SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
BRAND ELEMENTS MOBILE SITE 2.16
The website features a
responsive design, so it is
optimized for mobile
devices. The design is
slightly different than
desktop on mobile devices
but features many of the
same styles, dynamic
leads, and promos.
27. BRAND ELEMENTS EMAIL TEMPLATE 2.17
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Email templates also use
custom illustrations in top
headers. These use the lighter
versions of illustration, and like
the website use a balance of
Sourcefire red, black, and grey.
Ultimate Medium 14pt
Ultimate Light 15pt
Ultimate Light 12pt
Ultimate Light 12pt
Ultimate Light 14pt
Ultimate Medium 16pt
Clan OT Medium 18pt
Clan OT Medium 24pt
28. BRAND ELEMENTS POWERPOINT 2.18
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Powerpoint templates use the
lighter version of this particular
illustration. Other light versions
of illustrations could be
substituted as long as the
illustration feels balanced in the
composition.
Clan OT Light 60pt
Nexa Black 18pt
29. BRAND ELEMENTS POWERPOINT 2.19
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
The interior Powerpoint template
is light like the cover template.
This keeps the design consistent
and reduces the ink used in
printing.
Clan OT Light 38pt
Ultimate Regular 22pt
Ultimate Light 18pt
30. BRAND ELEMENTS ILLUSTRATION STYLE 2.20
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
Illustrations all have light and
dark versions. These illustrations
use a consistent color palette
and contain the same level of
complexity that reflects the
theme of the illustration. The
complexity is based on an
illustration’s shape, interior
design, outer line work, and icon
work in the background.
Clan OT Light 51pt
Nexa Black 24pt
34. BRAND ELEMENTS ILLUSTRATION STYLE 2.24
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
The illustrations without words should be used for the website
dynamic leads since the text shown on the website overlays the
image that is uploaded.
35. BRAND ELEMENTS STATIONARY 2.25
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
1
9770 Patuxent Woods Drive | Columbia, MD 21046 | p. 800.917.4134 | f. 410.290.0024 | www.sourcefire.com
9770 Patuxent Woods Drive
Columbia, MD 21046
www.sourcefire.com
Stationary is kept open and light.
Secondary mark is used in all
pieces of collateral.
Ultimate Light 7pt
Ultimate Light 7pt
Ultimate Regular 8pt
Ultimate Light 7pt
Ultimate Light 7pt
Ultimate Medium 7pt
John Doe
Vice President
9770 Patuxent Woods Drive
Columbia, MD 21046
w. 1 (800) 917-4134
c. 1 (301) 915-9300
jdoe@sourcefire.com
Ultimate Light 10pt
36. BRAND ELEMENTS DATA SHEET 2.26
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
1
Change is constant.
We all know information technology deployments are com-
plex and chaotic. In the real world, the IT environment changes
unpredictably, and staff is pressured for time, experience and
resources. Threats are, in most cases, unpredictable and un-
knowable. In the real world, you cannot effectively address
security with static defenses. Sourcefire takes a new approach to
security—one that quickly and effectively protects your environ-
ment against rapidly changing attacks. Designed to deliver Agile
Security™, Sourcefire’s solutions, from industry-leading next-
generation network security appliances to advanced malware
protection, are as dynamic as the real world they protect and
the attackers against which they defend.
1AGILE SECURITY TITLIGN HERE LOREM
1
A continuous process,
supported by advanced
technologies, that enables
you to:
• SEE everything in your
environment
• LEARN by applying
security intelligence to
data
• ADAPT defenses
automatically ACT in
real-time
Agile Security
SUB TITLING TO GO HERE LOREM IPSM
Solutions At A Glance
To better protect your unique environment, Sourcefire’s portfolio of intelligent cybersecurity solutions
includes:
Next-Generation Intrusion Prevention System (NGIPS)
Sourcefire NGIPS sets a new standard in advanced threat protection, integrating real-time contextual
awareness, intelligent security automation, and unprecedented performance with industry-leading
threat prevention effectiveness. Optional application control and URL filtering provide greater threat
mitigation over applications, users and suspicious sites.
Next-Generation Firewall (NGFW)
Sourcefire provides the only NGFW to combine control and effective threat protection. NGFW in-
cludes the world’s most powerful NGIPS, integrated application control and firewall functionality in a
universal, high-performance security appliance that, unlike other offerings, requires no compromises.
2
Advanced Malware Protection
Our enterprise-class advanced jmalware analysis and protection solutions are among the first to
use ‘big data’ to provide the visibility and control you need to discover, understand and stop threats
missed by other security layers. A version to protect against mobile malware is also available.
Security Innovation At Work For You
Sourcefire’s portfolio of cybersecurity solutions incorporate innovative and patented technologies
designed to fuel your advantage against attackers.
2AGILE SECURITY TITLIGN HERE LOREM
FirePOWER™ Network Security Appliances – our purpose-built network
security appliances feature unique hardware acceleration technology that de-
livers industry-best threat protection with unmatched performance, scalability
and energy efficiency
FireSIGHT® Defense Center – the central management console for all
Sourcefire security solutions featuring patented real-time awareness tech-
nology for next-generation solutions that provides full stack visibility, event
correlation and security automation to respond to changing conditions and
new attacks
FireAMP™ Advanced Malware Protection – an intelligent malware pro-
tection solution that leverages cloud computing and large-scale data mining
to deliver a uniquely effective approach to detection, analysis and remedia-
tion of advanced malware outbreaks
FireCLOUD™ Security Intelligence Services – collective intelligence deliv-
ered from our cloud-based, big data analytics system designed to discover,
analyze and store information on network threats, advanced malware, file
reputation and other security data
Key Capabilities
Providing continuous protection in a world of continuous change, Sourcefire solutions stand apart
with the following key capabilities:
Advanced Threat Protection – FirePOWER next-generation network security appliances deliver
the best threat prevention that money can buy—period. Our industry-leading security protection and
effectiveness is validated by independent third-party testing and thousands of satisfied customers
around the world. FireAMP provides additional protection, stopping malware at the point of entry.
Data sheet templates also use custom illustrations in top headers. These
use the lighter versions of illustration, and like the website use a balance of
Sourcefire red, black, and grey.
Ultimate Light 10pt Ultimate Light 8pt
Ultimate Demi 8pt
Ultimate Light 22pt
Ultimate Light 12pt
Ultimate Demi 12pt
Ultimate Demi 10pt
Ultimate Light 11pt
37. BRAND ELEMENTS WHITE PAPER 2.27
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
White paper templates use the secondary mark on the title page.
Throughout they also use a balance of Sourcefire red, black, and grey.
1
SNORT® THREAT
PREVENTION
COMPONENTS
2
1TITLIGN HERE LOREM
INTRODUCTION
Snort’s threat detection and prevention components work to-
gether to reassemble traffic, prevent evasions, detect threats,
and output information about these threats without creating
false positives or missing legitimate threats.
The threat prevention process in Snort consists
of multiple components which work together to reassemble
traffic as a target host would see it, identify traffic areas that
may contain threats, and match Snort rules against these
traffic areas to recognize attacks. Together, these components
efficiently detect threats and reduce or eliminate false alarms.
The threat prevention components of Snort include
a packet classifier, which decides which packets are inspect-
ed; an IP defragmenter and aTCP reassembler, which ensure
Snort inspects IP fragments andTCP segments in the proper
order; a portscan processor, which watches for portscans,
and a detection engine, which performs protocol normaliza-
tion, rule matching, and many other detection functions.
Snort’s detection components reside at the core of the threat
prevention capabilities of Sourcefire Intrusion Sensors.They
ensure that threats are detected, false positives and nega-
tives are avoided, and detection performance is high.
BENEFITS
The threat prevention components of Snort:
• Select traffic to be inspected, ensuring that only traffic that
could be vulnerable is inspected. Looking at only relevant
traffic helps Snort’s performance and limits the potential for
false positives.
• Normalize traffic to ensure that it is in a consistent format
and in the proper order prior to inspection. By putting traffic
in a consistent format and in
the order that the target sees it, Snort avoids the potential for
evasion.
• Match traffic against one of the industry’s largest rulesets
using a number of different detection methods. By using
multiple detection methods and using a large ruleset, Snort
ensures that
a wide variety of threats is detected and false negatives are
avoided.and security automation to respond to changing
THREAT PREVENTION COMPONENTS
PACKET CLASSIFIER
Snort begins processing the traffic it sees by classifying it at
a high level.The classifier decides whether a packet is:
• Token Ring/Ethernet/etc. • VLAN/NotVLAN
• IP/Not IP
• TCP/UDP/ICMP
IP DEFRAGMENTER
Once packet classification is complete, Snort defragments IP
packets.
IP fragmentation is the splitting of an IP datagram into two
or more smaller IP datagrams.Typically IP datagrams are
fragmented when the maximum size of a frame (MTU)
is exceeded, although they can be fragmented for other
reasons. IP fragments can arrive in any order at the destina-
tion system, and can reach the destination using different
paths.The destination system buffers IP fragments until all
the fragments of a datagram are received, following which it
processes the datagram.
Effective IPS implementations must handle: • IP fragments
arriving out of order
• IP datagrams that never complete
• Incorrect IP options
With certain IPS implementations, attackers can
take advantage of IP fragmentation by exploiting
the fact that different operating systems and IP implemen-
tations reassemble IP fragments differently under unusual
circumstances.These circumstances can include:
• Overlapping IP fragments
• Retransmitted fragments
Snort has a module called frag3 that serves as its IP de-
fragmenter. In order to detect attacks effectively, frag3 must
reassemble IP datagrams in the same way that the destina-
tion system for the attack would.Target- based analysis is a
relatively new concept in network- based intrusion preven-
tion.The idea of a target-based system is to model the actual
targets on the network instead of merely modeling the
protocols and looking for attacks within them.
In an environment where the attacker can determine what
Clan OT Light 28pt
Ultimate Demi 12pt
Ultimate Light 10pt
Ultimate Demi 10pt
Ultimate Light 10pt
38. BRAND ELEMENTS EVENT POP UP 2.28
SOURCEFIRE BRAND IDENTITY GUIDELINES 2012
20% dead space
Event pop up templates can use
both versions of a particular
illustration. All illustrations can be
used as long as the illustration
feels balanced in the
composition.
Clan OT Thin 190pt
Nexa Black 90pt
Ultimate Light 178pt