Check Point Corporate Logo Usage Guidelines
1. The Check Point Logo The Check Point logo is the most visible and recognizable symbol of our brand. It should appear on every piece of communication from Check Point from the basic internal memo to the website and everything in between. Use the logo with black text when it is placed on white or light color background The corporate logo should always be placed in an unobstructed area on a clean, clear, solid background that provides maximum clarity and visibility. Use the logo with white text when it is placed on black or medium-to-dark color background 2
2. Corporate Tagline The corporate tagline for Check Point Software Technologies is: We Secure the Internet. Corporate tagline is an important part of the Check Point logo lockup. It should always be used with the logo. Tagline is justified and placed beneath the logo as shown. The tagline should always be used in the exact proportion to the company logo as shown on the right. The typeface is Helvetica 65. It is set in initial caps, and a period should always be used at the end. If Check Point logo is placed multiple times on a multiple page document, use the version with tagline for the document cover; use the version without tagline for the inside pages and back cover. The lockup format of the logo can only be used one time on a single document. When multiple application of the logo needed for a single document, use the version with tagline for the document cover; use the version without tagline for the inside pages and back cover. 3
UTM-1 Edge X, UTM-1 Edge W, UTM-1 Edge X ADSL, UTM-1 Edge W ADSL 1 Test based on real-world traffic blend using the default profile 2 Maximum of 256 VLANs per interface 3 UTM-1 Edge operating environment: Temperature: 0º to 40º C, Humidity: 10% 90% non-condensing, Altitude: 4500m (15,000ft ) 6,873,988, 6,850,943, and 7,165,076 and may be protected by other U.S. Patents, foreign patents, or pending applications. November 10, 2009 Worldwide Headquarters 5 Ha Solelim Street, Tel Aviv 67897, Israel Tel: 972-3-753-4555 Fax: 972-3-624-1100 Email: info@checkpoint.com U.S. Headquarters 800 Bridge Parkway, Redwood City, CA 94065 Tel: 800-429-4391; 650-628-2000 Fax: 650-654-4233 www.checkpoint.com Corporate Logo Usage Guidelines February 2010 3. Logo application samples CHECK POINT TOTAL SECURITY APPLIANCES : Flexible Deployment. Centralized Management. Check Point appliances deliver a powerful turnkey solution for deploying Check Point award-winning software solutions to address virtually any security need. Based on the new Check Point Software Blade architecture, Check Point appliances provide a level of flexibility, scalability, and extensibility unique in the industry. All Check Point appliances are built around a unified security architecture, enabling organizations to perform all aspects of security management via a single, unified console. With Check Point appliances, organizations of all sizes can tailor their network security infrastructure to meet their functional and performance needs with centralized management, simple deployment, and full extensibility. Use logo with tagline for document cover UTM-1 Appliances All inclusive. All secured. UTM-1 appliances offer the ideal combination of proven security technologies and easy-to-use deployment and management features. With a full line of hardware-based solutions, Check Point UTM-1 appliances consolidate key security applications such as firewall, VPN, intrusion prevention, and antivirus and more into a single, easy-to-manage solution. UTM-1 Appliances are based on the Check Point Software Blade architecture that enables flexible and fast deployment of additional security capabilities, such as VoIP protections, without the addition of new hardware. UTM-1 appliances deliver a comprehensive set of security features including firewall, intrusion prevention, antivirus, anti-spyware, anti-spam, Web filtering, Web application security as well as secure site-to-site and remote access connectivity. UTM-1 Edge appliances deliver integrated firewall, intrusion prevention, VPN, and antivirus for branch offices of up to 100 users, ensuring small offices stay as secure as the corporate office. BENEFITS n Industry-leading application- and network-layer firewall n Site-to-site and remote-access VPNs n Gateway antivirus and anti-spyware UTM-1 Edge n Intrusion prevention with type-based protections and security updates n Web security with URL filtering and integrated security for Web applications n Email security and anti-spam, including the Check Point six dimensions of comprehensive messaging security n Software Blade architecture for fast and flexible deployment of new security services UTM-1 130 UTM-1 appliances come in six models and UTM-1 Edge appliances come in four models that let organizations choose the right solution to meet price and performance requirements. UTM-1 3070 For more information: www.checkpoint.com/products/utm. Use the logo without tagline for inside pages and back cover. Check Point Integrated Appliance Solutions Appliance Specifications Integrated software and hardware from Check Point and IBM Check Point Integrated Appliance Solutions (IAS) provide organizations with the ultimate choice in appliances integrated software and hardware bundles customized to their exact specifications. These customized platforms enable them to provision security services based on exact corporate needs. Organizations can choose from Check Point Software Blades such as firewall, IPSec VPN, and intrusion prevention, and additional blades including UTM functionality. They can also chose to deploy Check Point s virtualized security gateway, VPN-1 Power VSX, as well as Provider-1 for management of large deployments with separate security domains. Check Point integrates the selected software onto an IBM System x server or IBM BladeCenter to provide a comprehensive solution that includes direct technical support from Check Point. BENEFITS n Provides a software/hardware combination trusted by the largest organizations in the world n Reduces complexity by ensuring compatibility of the latest certified components and servers n Increases flexibility for security services provisioning by allowing customers to choose from multiple Check Point solutions n Delivers scalable performance and port density based on customer needs : n Protects against emerging threats with service-based Check Point Software Blades including IPS, Antivirus, Anti-Malware, and URL Filtering M series Integrated Appliance Solutions are predefined models that can be customized to meet specific needs. The M2 model delivers UTM functionality. The M6 and M8 models both provide maximum security for high-performance environments with integrated firewall, VPN, and intrusion prevention. UTM-1 Edge UTM-1 130 UTM-1 270 UTM-1 570 UTM-1 1070 UTM-1 2070 UTM-1 3070 UTM-1 132 UTM-1 272 UTM-1 572 UTM-1 1073 UTM-1 2073 UTM-1 3073 Models UTM-1 136 UTM-1 276 UTM-1 576 UTM-1 1076 UTM-1 2076 UTM-1 3076 Embedded Software Edition R65, R70 R65, R70 R65, R70 R65, R70 R65, R70 R65, R70 NGX 10/100 Ports 6 1 - - - - - 10/100/1000 Ports - 4 4 6 6 8 10 Firewall Throughput 190 Mbps 400 Mbps 600 Mbps 1.1 Gbps 2 Gbps 3 Gbps 4.5 Gbps VPN Throughput 35 Mbps 100 Mbps 100 Mbps 250 Mbps 250 Mbps 280 Mbps 1.1 Gbps Concurrent Sessions 8,000 300,000 600,000 800,000 1.1 million 1.1 million 1.1 million 1 IPS Throughput - 300 Mbps 380 Mbps1 700 Mbps1 900 Mbps1 1 Gbps1 4 Gbps1 Licensed Users 8/16/32/U Unlimited Unlimited Unlimited Unlimited Unlimited Unlimited 2 VLANs 32 1024 10242 10242 10242 10242 10242 UTM Out of the Box Yes Yes Yes Yes Yes Yes Yes Security Acceleration No No No No No No Yes Multisite Management No Standalone Yes Yes Yes Yes Yes Storage - 80 GB 160 GB 160 GB 160 GB 160 GB 160 GB Enclosure Desktop Desktop 1U 1U 1U 1U 1U Dimensions 1.2 x 8 10.6 x 5.7 16.8 x 10 16.8 x 10 16.8 x 10 17.4 x 15 17.4 x 15 (standard) x 4.8 in. x 1.6 in. x 1.73 in. x 1.73 in. x 1.73 in. x 1.73 in. x 1.73 in. 30 x 203 270 x 145 429 x 255 429 x 255 429 x 255 443 x 381 443 x 381 Dimensions (metric) x 122mm x 40mm x 44mm x 44mm x 44mm x 44mm x 44mm Weight 0.7kg (1.6lbs) 1.6kg (3.52lbs) 3.7kg (8.1lbs) 3.7kg (8.1lbs) 3.7kg (8.1lbs) 6.5kg (14.3lbs) 6.5kg (14.3lbs) Operating Environment Temperature: 5 to 40 C, Humidity: 10%-85% non-condensing, Altitude: 2,500m 3 IAS M8 Power Input 100/240V, 50/60Hz Power Supply Spec 18W 60W 65W 65W 65W 250W 250W (Max) Power 46.9W 26.2W 41.1W 40.1W 63.1W 77.5W Contact Consumption (Max) Check Point now to discuss your Total Security appliances: For more information: www.checkpoint.com/products/ias. www.checkpoint.com/contactus By phone in the US: 1-800-429-4391 option 5 or 1-650-628-2000 CONTACT CHECK POINT 2009 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point Endpoint Security, Check Point Endpoint Security On Demand, Check Point Express, Check Point Express CI, the Check Point logo, ClusterXL, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoreXL, CoSa, DefenseNet, Dynamic Shielding Architecture, Eventia, Eventia Analyzer, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Full Disk Encryption, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IPS-1, IQ Engine, MailSafe, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Pointsec PC, Pointsec Protector, Policy Lifecycle Management,Power-1, Provider-1, PureAdvantage, PURE Security, the puresecurity logo, Safe@Home, Safe@Office, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Security Management Portal, Sentivist, SiteManager-1, Smart-1, SmartCenter, SmartCenter Express, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartProvisioning, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartView Tracker, SMP, SMP On-Demand, SofaWare, SSL Network Extender, Stateful Clustering, Total Security, the totalsecurity logo, TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, UTM-1, UTM-1 Edge, UTM-1 Edge Industrial, UTM-1 Total Security, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Express, VPN-1 Express CI, VPN-1 Power, VPN-1 Power Multi-core, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VSX, VSX-1, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm ForceField, ZoneAlarm Internet Security Suite, ZoneAlarm Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 4
4. Corporate Logo Colors Our audiences recognize Check Point by our colors as well as the design of our logo. This is why all of our communications must use a consistent color palette. Never change the color of the corporate logo. White Pink Pantone 701 Blue Pantone 072 Red Pantone 200 Yellow Process Yellow C Black The color of the logotype should only be black or white. Always use the approved Pantone ( PMS ) color or the equivalent Pantone CMYK or RGB mix to reproduce colors in the logo icon. (Please see chart on the following page for exact color formula percentages.) Full-color version: Pantone Color Specifications 5
4. Corporate Logo Colors (continued) The Check Point Software logo color palette consists of six colors, including black and white. When printing on a nonwhite background, white must be used as an extra color for the computer screen. The chart on the right lists the formulas for the RGB colors for onscreen usage and the Pantone and process (CMYK) colors for print usage. Check Point Software Logo Color Palette PANTONE CMYK RGB Pantone 072 cyan 100 red 28 magenta 88 green 63 yellow 0 blue 148 black 5 Pantone 200 cyan 0 red 211 magenta 100 green 18 yellow 63 blue 69 black 12 Pantone 701 cyan 0 red 246 magenta 45 green 162 yellow 20 blue 168 black 0 Process Yellow C cyan 0 red 255 magenta 0 green 242 yellow 100 blue 0 black 0 Process Black cyan 0 red 0 magenta 0 green 0 yellow 0 blue 0 black 100 Opaque white for logo monitor when red 255 reproducing on solid green 255 dark background blue 255 6
4. Corporate Logo Colors (continued) When use of Pantone colors or four-color process is not an option, the alternatives is Black and white line art Black and White line art version 7
5. Corporate Logo Sizing The size of the Check Point Software logo, when used in communications and signage, depends on many variables such as environment, emphasis, audience, etc. Always consider the logo as an integral part of the design, rather than as an element to be added after the design is complete. If there is a question, make the logo larger rather than smaller. With visibility and clarity as objectives in the use of the corporate logo, a minimum acceptable size has been established to ensure readability. The minimum size for the horizontal format logo is 1.33 inches wide. 1.33 Logo with tagline 1.33 Logo without tagline When appearing in conjunction with other company logos in an equal relationship, the Check Point corporate logo should be at least the same size and in an equally prominent position in the layout. Example of logo size proportion for co-branding 8
6. Corporate Logo Clear Space Requirements Always give the Check Point logo enough clear space to garner presence on the page. A proper amount of clear space ensures that the logo will not be crowded by other elements and can be identified immediately. Mandatory clear space around corporate logo Full logo icon height Full logo icon height Illustrations, photography or type should not enter the clear space area around the logo. Full logo icon height Logo with tagline Full logo height Full logo height Full logo height Full logo height Logo without tagline 9
7. Unacceptable Uses of the Corporate Logo These graphic standards have been created to protect our brand and our trademarks. They help define both authorized and unauthorized uses of the corporate logo. Graphic treatments such as blurs and speed lines dilute the Check Point brand and lessen the value of our logo as a recognizable visual identity. Do not enclose the logo in a box or any other shape. Do not alter or substitute any colors of the corporate logo. Using digital artwork downloaded from CP Image Library is the best way to ensure proper use of the Check Point logo. When you use the logo in a layout, do not alter the proportions, colors or angles; such deviations weaken our brand and negatively impact our identity. Do not replace the graphical elements within the screen with other graphics. Do not use typefaces other than the approved standard for the logotype. Do not alter the proportions of the logotype or the graphic symbol in any way. Do not transpose the logotype and the graphic symbol in any way. Do not place the logo on a busy background or any solid background that does not provide strong contrast with the logo colors. 10
w w w. c h e c k p o i n t. c o m Worldwide Headquarters Check Point Software Technologies, Ltd. 5 Ha Solelim Street Tel Aviv 67897, Israel Tel: 972-3-753-4555 Fax: 972-3-624-1100 email: info@checkpoint.com U.S. Headquarters Check Point Software Technologies, Inc. 800 Bridge Parkway Redwood City, CA 94065 Tel: 800-429-4391; 650-628-2000 Fax: 650-654-4233