Professional Documents
Culture Documents
04 09 13
Introduction Logo Usage Typography
05 10 14
Core Values Incorrect Logo Usage Tagline & Emblem
06 11 15
Copy & Tone of Voice Color Palette Graphic Elements
03
Introduction
Luminate is a unique security platform, designed to access to key cloud resources, without exposing the
provide organizations with an easy and safe access to entire network. It uses software defined perimeter
network applications on any device or infrastructure principles to allow authorised users to get on-demand
known today. It allows CISOs, CIOs and CTOs to secure access, while giving insight and securing each action
an access to all corporate resources to their employees performed by users inside corporate applications
from anywhere in the world, while preventing any risk and services.
of network-based attacks. Luminate’s software-as-a-
service agentless solution delivers a hassle-free access IT network and security executives to embrace the
on any data center - on-premises, private or public digital transformation and focus on the job at task.
cloud. It takes Google BeyondCorp philosophy and Luminate helps process data and make amendments
transforms security within corporate IT networks. without worrying about information fraud or transition
costs, while letting businesses scale, exercise more
With the rise of the cloud, complex hybrid environments predictable budgeting and protect their assets.
and workforce mobility, remote users are becoming
more and more dependant on instant access to network
applications. This creates security complications and Luminate introduces the next generation of security,
presents a serious challenge for both IT and security turning a complex service into a highly scalable and
professionals. Luminate provides a broad and quick distributed one-click practice.
04
Core Values
05
Enablement Innovativeness Reliability
& Flexability & Simplification
Luminate provides companies with full confidence to Luminate disrupts the way enterprises provide access to The technology is designed to deliver the highest quality
operate and control their data, eliminating the need for any corporate applications and services. of service, one that is guaranteed to be monitored and
VPN network connections. It enables companies to move It strikes to deliver a distinctively new and advanced governed. Operating in the infrastructure and security
quicker and focus on the task at hand. Luminate seeks experience with the technology that confronts all ecosystem, one have reliable products, services and
to empower businesses by facilitating multiple network known processes by introducing a simple solution to a people. Luminate’s culture demands uncompromising
operations, rather than complicate the existing processes. complicated endeavour. honesty, truthful conduct, task ownership and timely
The IT teams no longer slow down the business but on One cannot keep using yesterday's tools to address the escalation. All access to corporate resources must be
the contrary they aid it in adapting to new applications threats and challenges of today, but must always evolve to monitored and governed at all times.
and supporting migration to the cloud. Luminate supports meet the needs of a changing landscape. Luminate does It is important to promote this degree of trustworthiness
infrastructure as a code, implementing new applications in not require deployment nor maintenance of any security and practical workability when referring to the brand. It is
minutes. One must project these two values in all brand gateway or endpoint agent nor changes to the existing important to promote this degree of trustworthiness and
materials, including imagery and text. security configuration. practical workability when referring to the brand.
06
Copy & Tone of Voice
Luminate technology is developed through extensive possibilities and benefits of the technology. Change to
research and development, bringing the highest quality existing methods should be promoted throughout all
product for today’s IT and security senior executives and copy, thus reflecting the dynamic nature of the platform.
their teams. The tone of voice, therefore, must project The voice must project transparency and integrity by
expertise, credibility, and reliability throughout keeping text topic related and backing up data with
all marketing channels. academic or industry related statistics. The copy should
also reflect the intuitiveness of the platform, describe the
This needs to be translated to copy through structured UX-oriented values and emphasize security and freedom
phrasing and clear wording. One must use inspiring aspects of the usage. One must inject professionalism,
statements and challenge the status quo, with an keep the copy crisp and definitive, while recognisable to
intention of igniting one’s imagination about countless IT related functions of the company.
07
Advert Example
08
Logo Usage
09
Incorrect Logo Usage
DON'T
1. Change the logo's orientation. 1. 3. 5.
10
Colors
Primary colors
Supporting colors
SUPPORTING COLORS
The supporting colors are white and light grey, chosen to
contrast the primary pallette. they will be used mostly for
backgrounds or as a text color in a negative design. they
will almost always have a significant presence compared to
the primary colors, to bring them out.
11
Additional Colors
12
Typography
Typography is a key element to communicating a unified
Helvetica Neue - Bold
Aa
personality for Luminate.
Aa
sentence case. Usually, title font size needs to be two
times the size of the body font size.
Aa Bb Cc Dd Ee Ff Gg Hh Ii Jj Kk Ll Mm
Nn Oo Pp Qq Rr Ss Tt Uu Vv Ww Xx Yy Zz
1234567890
13
Tagline & Emblem
14
Graphic Elements
15