CHECK POINT IDENTITY GUIDELINES Version 1
Contents 3 Manifesto 4 Logo 9 Colors 10 Typography 11 Photography 17 Design System 18 Design System Usage 19 Design Examples 22 Contact WE SECURE THE FUTURE
The Check Point Manifesto Today, one attack can shut down an entire country s power grid, disrupt transportation systems, or steal the personal information of millions. From large corporations to start-ups, no company is immune. Cyber criminals are nimble, resourceful, and organized. Attacks are constantly evolving and becoming more complex. In the future, driverless cars, smart homes and billions of new smart objects will be connected to the network. Hackers will have access to every part of our work and daily lives how we commute, how we operate, how we feel, what we create, what we seek. We need security today against tomorrow s threats. Security that traces hackers activities through cyber space. Security that delivers the latest defenses and updates from the cloud, protecting millions of devices and networks around the world, every second of every day. One company has the vision and execution to deliver. Check Point. We believe only the best security is acceptable. We built the most comprehensive security architecture with the most advanced management, translating your security strategy into reality. We continue to innovate and build new technologies and protections against the ever-changing threat landscape. We secure over 100,000 organizations, from small leaders to the giants of the world. They trust us to secure their most complex and sensitive environments and we continue to work every day to earn that trust. Check Point is the standard by which all security solutions are measured. We believe in an exciting, continuously changing world of new discoveries and new capabilities beyond the dreams and limitations of today. And it is our singular purpose to make you safe and secure. We are Check Point. We secure the future. 3
Logo The Check Point logo is the most visible and recognizable symbol of our brand. It should appear on every piece of communication from Check Point from the basic internal memo to the website and everything in between. 1 4 The corporate logo should always be placed in an unobstructed area on a clean, clear, solid background that provides maximum clarity and visibility. 2 3 1 Use the logo with black text when it is placed on white or a light-color background. 2 Use the logo with white text when it is placed on black or a medium-to-dark color background. 3 When use of Pantone colors or four-color process is not an option, the alternative is black-and-white line art.
Logo (continued) Our audiences recognize Check Point by our colors as well as the design of our logo. This is why all of our communications must use a consistent color palette. Never change the color of the corporate logo. The color of the logotype should only be black or white. Always use the approved Pantone ( PMS ) color or the equivalent Pantone CMYK or RGB mix to reproduce colors in the logo icon. Logo Color Palette White Pink Pantone 701 Blue Pantone 072 Red Pantone 200 Yellow Process Yellow C Black 5 The chart on the right lists the formulas for the RGB colors for on-screen usage, Hex for web, and the Pantone and process (CMYK) colors for print usage. PANTONE C M Y K R G B Hex Pantone 072 100 88 0 5 28 63 148 1C3F94 Pantone 200 0 100 63 12 211 18 69 D31245 Pantone 701 0 45 20 0 246 162 168 F6A2A8 Process Yellow C 0 0 100 0 255 242 0 FFF200 Process Black 0 0 0 100 0 0 0 000000 Opaque White 255 255 255 FFFFFF
Logo (continued) The size of the Check Point logo, when used in communications and signage, depends on many variables such as environment, emphasis, audience, etc. Minimum Logo Size The minimum size for the horizontal format logo is 1.33 inches wide. 6 Always consider the logo as an integral part of the design, rather than as an element to be added after the design is complete. If there is a question, make the logo larger rather than smaller. 1.33" With visibility and clarity as objectives in the use of the corporate logo, a minimum acceptable size has been established to ensure readability. Size proportion for co-branding When appearing in conjunction with other company logos in an equal relationship, the Check Point corporate logo should be at least the same size and in an equally prominent position in the layout.
Logo Always give the Check Point logo enough clear space to garner presence on the page. A proper amount of clear space ensures that the logo will not be crowded by other elements and can be identified immediately. Illustrations, photography or type should not enter the clear space area around the logo. Clear Space Guidelines Mandatory clear space around corporate logo. Full logo icon height Full logo icon height 7 Full logo icon height Full logo icon height
Logo (continued) These graphic standards have been created to protect our brand and our trademarks. They help define both authorized and unauthorized uses of the corporate logo. Graphic treatments such as blurs and speed lines dilute the Check Point brand and lessen the value of our logo as a recognizable visual identity. Unacceptable Uses of the Corporate Logo Do not enclose the logo in a box or any other shape. Do not alter or substitute any colors of the corporate logo. 8 Using digital artwork downloaded from CP Image Library is the best way to ensure proper use of the Check Point logo. Do not use typefaces other than the approved standard for the logotype. When you use the logo in a layout, do not alter the proportions, colors or angles; such deviations weaken our brand and negatively impact our identity. Do not place the logo on a busy background or any solid background that does not provide strong contrast with the logo colors. Do not replace the graphical elements within the screen with other graphics. Do not alter the proportions of the logotype or the graphic symbol in any way. Do not transpose the logotype and the graphic symbol in any way.
Colors Color plays a vital role in the Check Point brand, and when used properly provides dynamic visual expression. The brand colors appear on a variety of materials and communications and should be used consistently and appropriately. Primary Colors Pink Black 9 The primary color is pink and is often accompanied by heavy uses of black. The secondary palette is to be used sparingly with the purpose to add visual differentiation within infographics, charts, and digital materials. The use of secondary colors should always be less prominent than the use of the primary colors, using less than 10% overall. Pantone spot color equivalents are provided for use in special applications where a solid ink color is desirable or required for reproduction purposes. Written communications, e.g. letters or any internal/external forms, should use black text exclusively. Color PANTONE PANTONE C M Y K R G B Hex Coated Uncoated Pink 7423 C 213 U 05 81 23 0 228 87 133 E45785 Black Black 6 C Black 6 U 0 0 0 100 0 0 0 000000 Dark Gray 0 0 0 70 109 110 113 6D6E71 Light Gray 0 0 0 70 188 190 192 BCBEC0 White 0 0 0 0 255 255 255 FFFFFF Secondary Color Yellow Note: The colors shown on this page have not been evaluated by PANTONE, Inc. for accuracy and may not match the PANTONE color standards. For accurate reproduction, refer to the current edition of the PANTONE Color Bridge Guide. Color PANTONE PANTONE C M Y K R G B Hex Coated Uncoated Yellow 109 C 109 U 0 5 100 0 255 230 0 FFE600 The colors on this printed page should not be used for color matching purposes. Always use the formulas provided in the chart above. PANTONE and Color Bridge are registered trademarks of PA
Typography Printed and online communications are an essential element of the brand. Typography plays a significant role in projecting Check Point s visual style. DIN is the primary typeface of the brand design system. Flush left typography is preferred. For headlines use upper case. For titles and headings, upper and lower case are preferable to sentence case. For designed general communications, use DIN Light. DIN Regular and Bold may be used for display situations or text emphasis. Arial is a Windows and Macintosh system typeface. Arial should be used for written communications only or whenever the use of DIN is not feasible. DIN Light ABCDEFGHIJKLM NOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 0123456789 DIN Regular ABCDEFGHIJKLM NOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 0123456789 10 DIN Bold ABCDEFGHIJKLM NOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 0123456789 Arial (System) ABCDEFGHIJKLM NOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz 0123456789
Photography Photography can be a powerful asset in promoting the brand as well as Check Point s specific security features. Subject matter should focus on one of three categories: environmental images, threat interpretations, and futuristic images of people. 11
Photography (continued) Environmental 12 The environmental style of photography should feature abstractions with sharp angles of architecture to emphasize light and shadow. A strong contrast between light and dark areas provides the setting for portraying secure and unsecure areas. Images should be grayscale or highly desaturated.
Photography (continued) 13 Environmental The environmental style of photography should feature abstractions with sharp angles of architecture to emphasize light and shadow. A strong contrast between light and dark areas provides the setting for portraying secure and unsecure areas. Images should be grayscale or highly desaturated.
Photography (continued) People 14 Photographs including people should be futuristic and dynamic images of everyday people (non-executive) interacting with a bright source of light. The images should demonstrate a powerful sense of scale with high contrast between light and dark areas. Images should be grayscale or highly desaturated.
Photography (continued) 15 People Photographs including people should be futuristic and dynamic images of everyday people (non-executive) interacting with a bright source of light. The images should demonstrate a powerful sense of scale with high contrast between light and dark areas. Images should be grayscale or highly desaturated.
Photography (continued) Bots 16 This photography style is the representation of the threats Check Point protects against. These images should contain menacing, sharp shapes or bots on a black background.
Design System Unique design elements are an essential visual tool of the Check Point brand. These graphic shapes represent the diverse and flexible security platforms we offer. Security Layer Transparencies 100% Pink 17 The main design elements that make up the system are comprised of four pink bars representing Check Point s security zone. One is solid and the remaining three are of increasing transparency. The solid bar is always closest to the secure area in a visual composition. 85% Pink 60% Pink These elements can be used in a variety of shapes and angles, as shown below. They can be the primary element in a design or a basic visual accent. 45% Pink Graphic Shapes
Design System Usage 18 Example 1 (with images) Example 2 (with images) Example 3 (with images) A B B A B A A - threat imagery / outside world B - secure area A - threat imagery / outside world B - secure area A - threat imagery / outside world B - secure area Example 4 (no images) Example 5 (no images) Example 6 (no images) Headline Text Goes Here Aquae sequatur aut et, optam quis ma nam experio. Natur, consequatium acercimodi aut re nihil et in pa porum est aut alique ea ducil intor audipsapis rehenim harchic iusandi ciasincte re idebistotatem que pero tenem ulparum endio tem nos a inverum eatet fugitia Aquae sequatur aut et, optam quis ma nam experio. Natur, consequatium acercimodi aut re nihil et in pa porum est aut alique ea ducil intor audipsapis rehenim harchic iusandi ciasincte re idebis Headline Text Goes Here B A B A B Aquae sequatur aut et, optam quis ma nam experio. Natur, consequatium acercimodi aut re nihil et in pa porum est aut alique ea ducil intor audipsapis rehenim harchic iusandi ciasincte re idebistotatem que pero tenem ulparum endio tem nos a inverum eatet fugitia Subheadline Text Aquae sequatur aut et, optam quis ma nam experio. Natur, consequatium acercimodi aut re nihil et in pa porum est aut alique ea ducil intor audipsapis rehenim harchic iusandi ciasincte re idebistotatem que pero tenem ulparum endio tem nos a inverum eatet fugitia Aquae sequatur aut et, optam quis ma nam experio. Natur, consequatium acercimodi aut re nihil et in pa porum est aut alique ea A Headline Text Goes Here Aquae sequatur aut et, optam quis ma nam experio. Natur, consequatium acercimodi aut re nihil et in pa porum est aut alique ea ducil intor audipsapis rehenim harchic iusandi ciasincte re idebistotatem que pero tenem ulparum endio tem nos a inverum eatet fugitia A - protective brand lines B - content area A - protective brand lines and secure area B - content area A - protective brand lines B - content area
Design Examples These examples demonstrate how the Check Point design system translates to multiple applications. 19 1 2 3 4 5 Note: The examples and colors shown on this page are intended for illustrative purposes only. Always use the approved colors on page 4. 1 Brochure cover 2 Brochure spread 3 PowerPoint cover slide 4 Video still 5 Website content page
Design Examples These examples demonstrate how the Check Point design system translates to multiple applications. 20 6 7 8 9 10 Note: The examples and colors shown on this page are intended for illustrative purposes only. Always use the approved colors on page 4. 6 Solution Brief 7 Video still 8 PowerPoint presentation slide 9 Data sheet 10 Sales Collateral
Design Examples These examples demonstrate how the Check Point design system translates to multiple applications. 21 11 12 13 14 SELLING CHECK POINT THREAT PREVENTION SELLING CHECK POINT SECURITY MANAGEMENT SELLING CHECK POINT MOBILE SECURITY Note: The examples and colors shown on this page are intended for illustrative purposes only. Always use the approved colors on page 4. 11 Brochure cover 12 Brochure spread 13 Signage 14 Sales Guides
Contact For any brand identity design questions please contact the brand identity team: 22 bsi@michael.checkpoint.com Johnny Thompson Creative Director jthompso@checkpoint.com Steven Clark Design Manager stevec@checkpoint.com Chunming Jia Design Manager cjia@checkpoint.com Carole Leung Design Manager cleung@checkpoint.com Jacques Rambonnet Design Manager jrambonn@checkpoint.com Check Point Software Technologies, Ltd. 959 Skyway Road Suite 300 San Carlos, CA 94070