creative guidelines · creative elements iconography icon examples f5 icon set the style of f5...
TRANSCRIPT
SHAPE CREATIVE GUIDELINES / 08.2020 / 1
CREATIVE GUIDELINES08.2020
SHAPE CREATIVE GUIDELINES / 08.2020 / 2
Shape Creative Guidelines CREATIVE ELEMENTS
4 Logo
9 Color
12 Typography
13 Imagery
15 Iconography
CREATIVE APPLICATIONS
17 Business Cards
18 Digital
19 Collateral
22 Presentations
23 Events
INTRODUCTION CONTENTS
Shape defends web and mobile applications from both
malicious bot-driven automation attacks and human fraudsters
that otherwise can drive in large scale fraud. Shape also helps
application owners deliver friction-free and secure experiences
for their customers.
Shape solutions leverage artificial intelligence and machine
learning, among other technologies, to accurately answer three
key security, fraud and identity questions: Are you human? Is
your intent good or bad? And are you who you claim to be?
This document presents the Shape creative guidelines that will
allow our employees, marketing partners, and external partners
to keep our identity and creative expressions in alignment—and
apply our design styles consistently—to create unified and
relevant experiences that resonate with our customers.
CREATIVE ELEMENTS
SHAPE CREATIVE GUIDELINES / 08.2020 / 4
CREATIVE ELEMENTS LOGO
SHAPE LOGO
The Shape logo is the key building block of our
identity and the primary visual element that
identifies us. To maintain its integrity, the logo
should be used consistently according to
these guidelines.
The “Part of F5” endorsement line is part of the
Shape logo and should not be removed under
any circumstances.
Consult with the Shape Design team
([email protected]) if you
have questions about logo usage.
The Shape logos are available to download here.
SHAPE CREATIVE GUIDELINES / 08.2020 / 5
PRIMARY LOGO SECONDARY LOGO
CREATIVE ELEMENTS LOGO
LOGO OPTIONS
There are three versions of the Shape logo, as
shown at the right. The primary logos are white
with a gray endorsement line and black with a
gray endorsement line. The primary logo options
will be the dominant expression.
The secondary version of the logo is all white. This
version should be used more sparingly, when the
background color would compete with the gray
endorsement line in the primary logo. Choose this
logo when contrast and legibility are difficult to
achieve otherwise.
Do not tint the logo, or use it with complex
backgrounds or patterns that limit readability.
More details on this are covered on page 7.
The Shape logos are available to download here.
White logo for use on dark backgrounds Black logo for use on light backgrounds Full white logo for use on backgrounds that compete with
the gray endorsement line
SHAPE CREATIVE GUIDELINES / 08.2020 / 6
MINIMUM LOGO SIZES
Using the appropriate size of logo ensures that it will
be legible and maintains its consistency and integrity.
The minimum logo size is detailed at the right.
CREATIVE ELEMENTS LOGO
DIGITAL MEDIAPRINT MEDIA
0.26”
Minimum logo size for print is 0.26” or 18 px in
height. The logo should not be used at a size
smaller than this.
19 px
Minimum logo size for digital media is 0.26” or
19 px in height. The logo should not be used at
a size smaller than this.
SHAPE CREATIVE GUIDELINES / 08.2020 / 7
CREATIVE ELEMENTS LOGO
LOGO DOS AND DON’TS
The primary logo can be used in any instance except
when the background image or color competes with
the logo (e.g., low contrast or complex image).
Secondary logos can be used to “knockout” the logo
from a background, or to present the logo in a
lower-contrast expression.
Legacy, tinted, stretched, stylized, animated, hand-
drawn, or other versions of the logo are not permitted.
This undermines the integrity of the Shape logo and
negatively impacts brand consistency.
Please consult with the Shape Design team
([email protected]) if you have any
questions about logo usage.
DO DON’T
SHAPE CREATIVE GUIDELINES / 08.2020 / 8
CLEAR SPACE FOR PRINT AND DIGITAL MEDIA PARTNER LOGO LOCKUPS
CREATIVE ELEMENTS LOGO
LOGO CLEAR SPACE
To preserve the visual impact and integrity of the logo,
always maintain a buffer of space around it.
In all applications, the logo should be surrounded by
clear space equal to half the height of the Shape logo
(x = the logo height in the illustrations to the right).
PARTNER LOGO LOCKUPS
Partner logos should be positioned to the right of
the Shape logo with a thin rule separating the two
logos. The space on both sides of the rule should be
1/4 of the width of the Shape logo. The visual sizes of
the two logos should be equal. The Shape logo should
also be visually centered vertically to the partner logo.
0.5x
0.5x
x
SHAPE CREATIVE GUIDELINES / 08.2020 / 9
CREATIVE ELEMENTS COLOR
PRIMARY SECONDARYCOLOR RATIOS
Shape’s brand colors include Black, F5 Red, Surf, Ash,
and White. The flexible color system allows for dynamic
visual expressions with different color combinations
depending on the message and/or audience.
The main color expressions are Black and F5 Red as
represented in the color ratio visual to the right. Security
messages fall within this ratio and tend toward a
narrower palette dominated by black with red highlights.
Surf acts as a complimentary color and is used for visual
storytelling in diagrams and infographics.
These examples show the proportion and
relationships between primary and complimentary
colors and how they should be used together.
BLACK
F5 RED
SURF
ASH
WHITE
SHAPE CREATIVE GUIDELINES / 08.2020 / 10
THE F5 COLOR SYSTEM
F5’s comprehensive color system is a rich mix
drawing from the company’s tech heritage and its
Pacific Northwest roots. Its flexibility allows us to
craft modern, bright, and optimistic visual
expressions with different color combinations.
Each base color in the palette is complimented
by a lighter and darker accent, creating freedom
for visual storytelling while maintaining a strong
connection to the brand.
Though Shape’s main color palette is as shown
on the previous page, this palette provides a
range of options and is available to pull from
to add richness and to help craft dynamic
color stories.
COLOR
F5 REDPantone® 185228 0 43e4002b
IRIS78 67 164 4e43a4
FERN98 192 38 62c026
TULIP237 78 181 ee4db5
LAGOON29 156 2111d9cd3
LIME151 206 1 97ce01
AMBER245 195 30 f5c31e
LILAC139 91 1658b5ba5
NGINX GREENPantone® 355 0 150 57 009639
SURF 78 196 206 4ec4ce
BUMBLEBEE255 242 0fff200
TANGERINE242 154 54 f29a36
CORAL243 112 75f3704b
STRAWBERRY240 105 112 f06970
GRAPE 120 108 205 786ccd
MOSS164 225 113 a4e171
CARNATION253 127 211 fd7fd3
SKY124 192 235 7cc0eb
SPRING195 237 81 c3ed51
AUTUMN255 214 81 ffd651
ASTER170 142 191 aa8ebf
JADE31 191 811fbf51
SEA FOAM144 211 20890d3d0
LEMON255 254 132 fffe84
PUMPKIN255 180 96 ffb460
PEACH248 166 143 f8a68f
POPPY194 0 37c20025
COBALT51 32 140 33208c
EVERGREEN67 140 21 438c15
ROSE213 49 150 d53196
LAKE12 92 1410c5c8d
PEA133 166 0 85a600
MUSTARD192 150 14 c0960e
VIOLET105 67 133694385
PINE28 99 511c6333
OCEAN42 122 1292a7a81
HONEY225 200 0e1c800
RUST189 116 33 bd7421
CLAY190 90 60be5a3c
CREATIVE ELEMENTS
SHAPE CREATIVE GUIDELINES / 08.2020 / 11
THE F5 COLOR SYSTEM
The full color spectrum is also complimented by a
robust grouping of monochromatic values, allowing for
a variety of brand and digital expressions, ensuring
broad flexibility and consistency of color within the
design system. These options help with allowing for
appropriate contrast.
COLOR
BLACK0 0 0000000
LEAD102 102 102 666666
STONE230 230 230 e6e6e6
CARBON34 34 34 222222
STEEL153 153 153 999999
ASH241 241 241f1f1f1
CHARCOAL52 52 52343434
SILVER204 204 204 cccccc
WHITE255 255 255ffffff
CREATIVE ELEMENTS
SHAPE CREATIVE GUIDELINES / 08.2020 / 12
TYPOGRAPHY
F5 TYPOGRAPHIC STYLE
Shape’s typography, already very close to F5, merges
with F5’s existing typography style guides, blending
two fonts inspired by Swiss design. Neusa Next,
inspired by type treatments from early space
exploration, adds a human and expressive character to
headlines and subheads, while Proxima Nova brings
openness and geometric styling to harder working
moments, and occasional feature appearances.
You’ll need access to our fonts via Adobe Creative
Cloud or through multiple online foundries. Please
reach out to the Shape Design team
([email protected]) for help in
gaining access and downloading fonts.
CREATIVE ELEMENTS
SHAPE CREATIVE GUIDELINES / 08.2020 / 13
CREATIVE ELEMENTS
REPRESENTING SHAPE - PHOTOGRAPHY
The use of full color photography helps Shape’s
creative align more closely with F5. We apply an
overall photo treatment which gives it a unique yet
unified look and feel. Dynamic contrast gives the
images richness and depth.
There are two types of photography; Human/
Optimistic and Serious/Pragmatic. Due to the
nature of Shape’s business and customer base,
Serious/Pragmatic may predominantly be the
subject matter type that is used. Please refer to the
photography section of F5’s Creative Guidelines for
more information on subject matter, photography
styling, and usage.
Various techniques will be used to allow for type to
have appropriate contrast on images. Extending
areas of negative space, layering textual elements,
and using overlays, will help us to achieve this visual
contrast (see examples on page 18).
IMAGERY
HUMAN / OPTIMISTIC SERIOUS / PRAGMATIC
Images that display the seriousness and impact of the message being communicated.
Images that show empathy, capture a situation or pain point, and tell a story about our customers and their business challenges.
SHAPE CREATIVE GUIDELINES / 08.2020 / 14
STOCK PHOTOGRAPHY GUIDELINES
Stock photography is used for a majority of our
marketing communications. Because many
competitors use the same stock photography,
following these guidelines can help differentiate
the F5 brand.
Stock photography with people should feel genuine
and natural (not staged or posed). Photos that
show technology should be original, current, and
cutting edge.
• Never use images with firearms, inappropriate
innuendo, references to war or the military,
or sexual or sexist content.
• Never use imagery that could be considered
culturally insensitive or offensive.
• Never use imagery that is threatening or related
to death.
• Avoid imagery that specifically references
Christmas, Chanukah, Kwanzaa, Ramadan,
or any other holidays that are tied to religious
beliefs or specific cultures.
Poor image quality
CREATIVE ELEMENTS
Threatening
IMAGERY
Cliché War referenceInappropriate innuendo Religious implicationsOverly staged/posed Dated technology
Ethnic stereotypesCultural insensitivity Threatening
AVOID THESE EXAMPLES
SHAPE CREATIVE GUIDELINES / 08.2020 / 15
ICONOGRAPHYCREATIVE ELEMENTS
ICON EXAMPLESF5 ICON SET
The style of F5 brand icons is simple, straightforward,
and two-dimensional. Lines are single weight and black
by default, but can be reversed to white over a dark
background or changed to a single color from the
brand palette if necessary.
Shape icons will move toward full alignment with F5
icons, however, there will be a visual transition period
between the existing icons and these. In effort to keep
the customer top of mind, the intentional transition
period will ensure that the customers’ experience is
smooth, familiar, and uninterrupted.
CREATIVE APPLICATIONS
SHAPE CREATIVE GUIDELINES / 08.2020 / 17
Jane Doe Program Manager
[email protected] 123.456.7891M 123.456.7891F 123.456.7891
801 FIFTH AVESEATTLE, WA 98104
簡多伊項目經理アジア太平洋地域、中国、日本
[email protected] +65.6533.6103M +12.34567.8910F +12.34567.8910
F5 ネットワークスジャパン合同会社〒107-0052東京都港区赤坂4-15-1赤坂ガーデンシティー19階
Jane DoeProgram ManagerAsia Pacific, China, and Japan
[email protected] +65.6533.6103M +12.34567.8910F +12.34567.8910
JAPAN GKAKASAKA GARDEN CITY 19F4-15-1 AKASAKA, MINATO-KUTOKYO 107-0052 JAPAN
BUSINESS CARDS
Shape’s signature business card design is distinctive
and boldly minimal. Meant for sharing with top-tier
customers, the card features a black tone-on-tone
aesthetic with the logo and card stock and yellow type
for limited contact information.
The standard business card design is more utilitarian
and accessible, and available to order through the
online fulfillment system here. It visually aligns with
the standard F5 and NGINX business cards.
CREATIVE APPLICATIONS BUSINESS CARDS
SIGNATURE BUSINESS CARD STANDARD BUSINESS CARD
SHAPE CREATIVE GUIDELINES / 08.2020 / 18
DIGITAL
BLOG PROMOTION
CREATIVE APPLICATIONS
SOCIAL MEDIA WEBINAR THUMBNAILDIGITAL MEDIA ASSETS
The Shape Marketing team manages Shape’s official
social media channels with a mix of paid and organic
posts. Additionally, the F5 Global Demand Center and
Center of Excellence teams drive paid social media
campaigns through media agencies.
For brand alignment and visual consistency, we have
a creative framework for social assets linking to blogs
and events. Social assets, that are part of campaigns,
specific programs, or sponsored events, draw visual
styles from their respective design systems. They are
visually tied together throughout various digital
channels creating a consistent customer experience.
Dark overlays are used to create contrast between
image and type. The opacity of the overlay will vary
depending on the lightness or darkness of the base
image (examples to the right).
Social media and webinar thumbnail templates are
available to download here. Please consult with the
Shape Design team ([email protected])
if you have questions about template access or usage.
SHAPE CREATIVE GUIDELINES / 08.2020 / 19
COLLATERAL
REPORT / CASE STUDY
CREATIVE APPLICATIONS
MARKETING COLLATERAL
To maintain creative alignment and apply design
styles consistently, we often use templates. Reports,
guides, overviews, data sheets, white papers, and
other marketing collateral are examples of where the
templates are leveraged.
Our collateral templates include different options for
different types of content—cover layouts, interior
pages, charts, tables, etc. (some examples are shown
at the right)—as well as paragraph styles and a brand
color palette. You’ll need our brand fonts, which are
available via Adobe Creative Cloud or through
multiple online foundries. Please reach out to the
Shape Design team ([email protected])
for help in gaining access and downloading fonts.
Shape marketing collateral templates are available
for download here.
Credential Stuffing Attacks UsingPrivate KeeperEARLY ACCESS DRAFT REPORTMay 2020
CREDENTIAL STUFFING ATTACKS WITH PRIVATE KEEPER / EARLY ACCESS DRAFT REPORT 5
LICENSING AND DISTRIBUTIONThe Private Keeper software is distributed under a license agreement, which states that the
software developer is only responsible for the software and its functionality. If the software doesn’t
work, the customer’s money will be refunded. Under this agreement, the software is provided
“as is,” and the author is not responsible for how the software will be used. If the user tries to hack,
reverse engineer, or harm the Private Keeper infrastructure, the author has the right to recall the
license key.
Private Keeper’s main point of official distribution is the developer’s site at https[:]//deival909[ru/.
There, a 30-day license can be purchased for US$3 using a Telegram bot channel. The
underground market also offers configurations of Private Keeper designed to attack specific
endpoints on the web applications of select financial services institutions. These target-specific
configurations are available for a one-time payment that ranges from $50 to $500, depending
on the target. Private Keeper has an official discussion thread on BHF (or Best Hacker Forum,
BHF.IO / .BZ), an underground Russian-language hacker discussion board.
PACKAGE CONTENTSThe Private Keeper software package contains:
• Libeay32.dll [OpenSSL Library DLL]
• Ssleay32.dll [OpenSSL Library DLL]
• Private Keeper.exe [binary executable]
• Чейнджлог.txt, or literally “Changelog.txt,” a text file of Private Keeper’s version
history; represented by the link inside the file http://deival909.ru/description.
php?itemID=OCrYQkCXuXSpFMwEItVPyRLsI
• Решение проблем.txt, or “ProblemSolutions.txt,” a text file with troubleshooting tips,
including descriptions of common problems operating Private Keeper, and solutions to
address them)
• Modules/СПИСОК IMAP СЕРВЕРОВ.txt, or “ListofIMAPServers.txt,” a list of IMAP servers
that can be used in brute-force credential stuffing attacks
THE UNDERGROUND
MARKET OFFERS PRIVATE
KEEPER CONFIGURATIONS
DESIGNED TO ATTACK
SPECIFIC ENDPOINTS ON
THE WEB APPLICATIONS
OF SELECT FINANCIAL
SERVICES INSTITUTIONS
FOR A ONE-TIME PAYMENT
THAT RANGES FROM $50
TO $500 DEPENDING ON
THE TARGET.
SHAPE CREATIVE GUIDELINES / 08.2020 / 20
COLLATERAL
E-BOOK
CREATIVE APPLICATIONS
STRATEGIES TO HELP YOUR ORGANIZATION BATTLE SOPHISTICATED
ATTACKS THAT RETOOL AGAINST COUNTERMEASURES
Credential Stuffing 2020: The Latest Attack Trends and Tools
MARKETING COLLATERAL
To maintain creative alignment and apply design
styles consistently, we often use templates. Reports,
guides, overviews, data sheets, white papers, and
other marketing collateral are examples of where the
templates are leveraged.
Our collateral templates include different options for
different types of content—cover layouts, interior
pages, charts, tables, etc. (some examples are shown
at the right)—as well as paragraph styles and a brand
color palette. You’ll need our brand fonts, which are
available via Adobe Creative Cloud or through
multiple online foundries. Please reach out to the
Shape Design team ([email protected])
for help in gaining access and downloading fonts.
Shape marketing collateral templates are available
for download here.
3
ATTACKER ECONOMICS: UNDERSTANDING COST VS. VALUE
THE ATTACKER EQUATION
To determine the rate of return, multiply the value of
the attack by the chance of success, and divide by
the cost. Then subtract the initial investment (100%).
If an attacker targets just one person, there’s a
low chance of success. If the cost is nominal and
the initial investment is also low, the rate of return
may be 0%. That won’t necessarily deter attackers,
because they can boost the ROI by attacking more
targets or increasing the value of each target, even if
the success rate remains low.
The classic Las Vegas penny slots worked on the
same principle. Players would happily keep feeding
the machine with pennies, even if the potential
payout was minimal. A penny was a low-cost, low-
investment way to target even a small cash prize; the
value easily outpaced the cost.
As attackers increase their targets, the rate of return
becomes far more attractive—especially if the cost
and initial investment remain static. This is one
reason why credential stuffing attacks have become
increasingly common. Ten years ago, the industry
didn’t even have a term for this practice, which
involves testing stolen consumer credentials against
multiple e-commerce sites to gain account access
or large-scale account takeover. Today, the U.S.
consumer banking industry loses nearly $50 million
per day due to credential stuffing. Online retail loses
about $6 billion annually.
Credential stuffing success rates typically hover
between 0.2 and 2%—and attackers don’t need
a high success rate if the attack is cheap to run.2
And if infiltrating your web application has a high
probability for success, you just gave attackers a
golden ticket. They’ll continue to target your web
properties until there’s nothing left to drain.
On the flip side, if the chance of success drops, or
the cost to run an attack or the cost of entry goes
up, this can severely affect the rate of return. The
attacker may decide it’s not worth the effort and
target another company.
MILLION50DOLLARS PER DAY LOST BY U.S. CONSUMER BANKING INDUSTRY DUE TO CREDENTIAL STUFFING. 1
1. https://blog.shapesecurity.com/2018/07/30/the-2018-credential-spill-report/
2. https://blog.shapesecurity.com/2019/04/23/what-your-login-success-rate-says-about-your-threat-surface/
3
SHAPE CREATIVE GUIDELINES / 08.2020 / 21
COLLATERAL
ONE SHEET
CREATIVE APPLICATIONS
MARKETING COLLATERAL
To maintain creative alignment and apply design
styles consistently, we often use templates. Reports,
guides, overviews, data sheets, white papers, and
other marketing collateral are examples of where the
templates are leveraged.
Our collateral templates include different options for
different types of content—cover layouts, interior
pages, charts, tables, etc. (some examples are shown
at the right)—as well as paragraph styles and a brand
color palette. You’ll need our brand fonts, which are
available via Adobe Creative Cloud or through
multiple online foundries. Please reach out to the
Shape Design team ([email protected])
for help in gaining access and downloading fonts.
Shape marketing collateral templates are available
for download here.
ONE SHEET
BLACKFISH
BLACKFISH PROTECTS YOUR LOGIN APPLICATIONS FROM STOLEN CREDENTIALS
The average person uses the same password across four different accounts. So even if your
organization hasn’t been breached, chances are many of your users’ credentialshave been
spilled elsewhere. Now, instead of waiting for attackers to try those breached credentials on your
login applications, you can proactively safeguard your users from the risk of account takeover.
Blackfish alerts your company in real-time when criminals actively use your customers’ credentials
elsewhere on the web.
HOW IS BLACKFISH DIFFERENT?
Cresential spilled on the dark web are stale Why are credentials on dark web marketplaces sold for mere pennies? Because criminals have already made their money from them. Criminals weaponize credentialsfirst, and sell them last. When criminals first steal new usernames and passwords, they use the credentials against the highest value targets – the largest web and mobile apps in the world. It usually takes 6-12 months, or longer, for stolen credentials to end up on the dark web.
Blackfish knows when stolen credentials are first used When a criminal commits a credential stuffing attack on any Shape customer, Blackfish captures the usernames and passwords that are being used and marks them as compromised. Blackfish then immediately alerts any customers for which thosecredentials are valid. Shape sees over 30M credential stuffing attacks per day and protects over 100M real human logins per day. In other words, Blackfish knows which credentials have been stolen even before criminals begin trading them on the dark web.
Blackfish provides a collective defense against criminal networks An entire criminal ecosystem has emerged to enable information sharing and allow attackers to operate at scale. Now the security and fraud industry can fight back. The Shape network already includes the world’s highest-value organizations, who are also the world’s mosttargeted organizations. Given this unique visibility Blackfish has the power to identify criminals’ very first attempts to weaponize credentials. The more organizations that use Blackfish, the sooner we can all cure the account takeover epidemic.
Blackfish doesn't store passwords The security of the Blackfish system itself was the most important design consideration. Shape’s patented design uses a Bloom filter, enabling Blackfish to perform lookups of your user’s credentials without maintaining a database of compromised passwords.
AT-A-GLANCE
Blackfish is an enterprise credential security solution that helps organizations protect their websites and mobile applications from criminals who use stolen credentials to take over customer accounts.
AVANTAGES
• Closes gap between breach and discovery
• Alerts when stolen credentials are actually used elsewhere
• Leverages unique collective defense network to identify stolen credentials
• Doesn’t require storage of compromised passwords
BECAUSE BLACKFISH CAN SEE
ALL AUTOMATED LOGINS IN
REAL TIME, [IT] CAN CAPTURE
COMPROMISED USERNAMES
AND PASSWORDS, INSTEAD OF
BUYING THEM. -Sarah Squire Co-author oF NIST Digital Identity Guidelines
©2020 F5, Inc. All rights reserved. F5, and the F5 logo are trademarks of F5, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, expressed or implied, claimed by F5, Inc. DC0420 | JOB-CODE-123456789
PROTECT YOUR BUSINESS ONLINE TODAY
Protect your online applications from credential stuffing, account takeover, unwanted scraping,
carding and other sophisticated online attacks and automation traffic that would otherwise result
in large scale fraud, inflated operational costs, and additional friction for your users.
[email protected]+1 (650) 399-0400
SHAPE CREATIVE GUIDELINES / 08.2020 / 22
| ©2020 F519
Duis libero dui, mollis eu lorem dictum, tempus imperdiet lectus
Vestibulum dignissim dignissim enim, nec pretium elit lobortis ac
Nunc blandit lobortis massa nec sodales
Ut non risus ullamcorper, finibus odio ac, dignissim dui
OPTIONAL SUBHEAD PLACEHOLDERTitle and content layout
PRESENTATIONS
F5 CORPORATE TEMPLATE
The F5 corporate PowerPoint template has been
designed to create consistent presentation
experiences across the organization. It can be used
for day-to-day internal communications, sales
engagements, and as a tool for quickly
communicating ideas with your colleagues.
It should not be used, however, to craft cinematic
keynotes for external audiences. If you need to
create that kind of presentation, please contact
[email protected] for additional resources.
The template is extremely versatile, featuring the
F5 color palette, 19 different master layouts, F5
iconography, and a clear text hierarchy. This template
also includes a Shape title, section and text pages for
use when Shape needs representation. The template
uses Ariel, which is accessible to everyone. Whenever
possible, start with a fresh template rather than
copying and pasting legacy content into the
new presentation.
For internal F5 users the template can be downloaded
here. Image and icon libraries, FAQs, and a video
tutorial can be found here. For the Shape SIC slide
deck, please find it here.
PRESENTATION SLIDES
CREATIVE APPLICATIONS
Section header
| ©2020 F523
Nunc blandit lobortis massanec sodalesULLAMCORPER, FINIBUS ODIO AC
Nullam ac bibendum sem quisque in dictum est duis libero dui, mollis eu lorem dictum, tempus imperdiet lectus vestibulum dignissim dignissim enim, nec pretium elitlobortis ac
• Blandit lobortis massa nec sodales• Ut non risus ullamcorper, finibus odio ac,
dignissim dui • Nullam ac bibendum sem
− Quisque
Duis libero dui, mollis eu lorem dictum, tempus imperdiet lectusvestibulum dignissim dignissimenim, nec pretium elit lobortis ac
4.3
2.4
2
2.5
3.5
4.5
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
5
Category 1
Series 1 Series 2 Series 3Series 4 Series 5 Series 6
Three contentOPTIONAL SUBHEAD PLACEHOLDER
SOURCE: INFORMATION EXAMPLE
Title layoutOPTIONAL PLACEHOLDER EXAMPLEPresenter NamePosition example
July 20, 2020 (Optional date example)
SHAPE INTELLIGENCE CENTER (SIC) SLIDES
SHAPE CREATIVE GUIDELINES / 08.2020 / 23
EVENTSCREATIVE APPLICATIONS
EVENT BOOTHS
How we present ourselves at events should be
determined by who our primary audience is at that
event. We should always approach with a customer-
first mindset. For example, if the event is focused on
security customers, it is likely best to headline with
Shape. Because the determining factor is situational,
you should contact [email protected] for discussion and
guidance if you are planning an event.
SHAPE CREATIVE GUIDELINES / 08.2020 / 24
EVENTSCREATIVE APPLICATIONS
VIRTUAL EVENT BOOTHS
How we present ourselves at events should be
determined by who our primary audience is at that
event. We should always approach with a customer-
first mindset. For example, if the event is focused on
security customers, it is likely best to headline with
Shape. Because the determining factor is situational,
you should contact [email protected] for discussion and
guidance if you are planning an event.
Virtual events use web-based platforms to connect
attendees from across the globe. These are a good,
and at times, essential options when a physical event
is not possible. The example at the right displays how
a Shape virtual event booth could look. Please reach
out to the Shape Design team (CreativeStudio-
[email protected]) for questions or inquiries about
virtual events.
SHAPE CREATIVE GUIDELINES / 08.2020 / 25
EVENTS
PULL-UP BANNERS
The freestanding, vertical pull-up banner—typically
used at smaller field events, HR/recruiting activities,
charity events, and promotions—is typically paired
with a table skirt.
How we present ourselves at these smaller events
should be determined by who our primary audience
is. We should always approach with a customer-first
mindset. For example, if the event is focused on
existing Shape customers, it is likely best to headline
with Shape. Because the determining factor is
situational, you should contact [email protected] for
discussion and guidance if you are planning an event.
In the case of partnerships, representation of Shape
and F5 should be represented as shown, with
co-branding lock-ups following the layout and
clear-space approach as outlined on page 8.
Shape pull-up banner templates are available
for download here.
CREATIVE APPLICATIONS
Lorem ipsum dolor sit amet consecteturSed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut.
shapesecurity.com
BRANDED
Lorem ipsum dolor sit amet consecteturSed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut.
shapesecurity.com
CO-BRANDED
Lorem ipsum dolor sit amet consecteturSed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut.
shapesecurity.com
Lorem ipsum dolor sit amet consecteturSed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut.
shapesecurity.com