Research In Motion

Page 1

[BRAND BOOK]

1

RESEARCH IN RIM BRANDING BOOK


RESEARCH IN RIM BRANDING BOOK

2


3

RESEARCH IN RIM BRANDING BOOK


Copyright Š 2015 by Research In Motion 965 Sutter street, San Francisco, CA 94909 www.thisisthinkink.com info@thisisthinkink.com All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law. All images in this book have been reproduced with the knowledge and prior consent of the designers and the clients concerned, and every effort has been made to ensure that credits accurately comply with information applied. No responsibility is acceted by producer, publisher, or printer for any infringement of copyright or otherwise arising from the contents of this publication. Printed in the United States of America


5

RESEARCH IN RIM BRANDING BOOK


RESEARCH IN RIM BRANDING BOOK

6


7

RESEARCH IN RIM BRANDING BOOK


CONTENT

RESEARCH

P11

IDENTITY

P38

EXTENSION

P58



RESEARCH IN RIM BRANDING BOOK

This is where our story begins.

SEARCH

10


11

RESEARCH IN RIM BRANDING BOOK

RESEARCH

RESE


RESEARCH IN RIM BRANDING BOOK

EARCH

12


13

RESEARCH IN RIM BRANDING BOOK

ABOUT RIM BlackBerry is a line of wireless handheld devices and services designed and marketed by BlackBerry Limited, formerly known as Research In Motion Limited (RIM).

BlackBerry is a line of wireless handheld devices (commonly called smartphones) and services designed and marketed by BlackBerry Limited, formerly known as Research In Motion Limited (RIM). The very first RIM device was the Inter@ctive Pager 900, a clamshell-type device that allowed two-way paging, announced on September 18, 1996. After the success of the 900, the Inter@ctive Pager 800 was created for IBM, which bought US$10 million worth of them on February 4, 1998. The next device to be released was the Inter@ctive Pager 950, on August 26, 1998. The very first device to carry the BlackBerry name was the BlackBerry 850, an email pager, released January 19, 1999. Although identical in appearance to the 950, the 850 was the first device to integrate email and the name Inter@ctive Pager was no longer used to brand the device. Blackberry is considered one of the major smartphone vendors in the world, specializing in secure communications and mobile productivity. For use on devices made prior to the new Blackberry 10 Operating System (BBOS 7 and earlier), the consumer BlackBerry Internet Service is available in 91 countries worldwide on over 500 mobile service operators using various mobile technologies. As of September 2013, there were 85 million BlackBerry subscribers worldwide. That number has dropped steadily, down to 46 million in September 2014. Starting in November 2013, BlackBerry Messenger could be run on multiple platforms including Android, iOS and Windows Phone, and up to June 2015 got 260 million new users. In September 2015, Blackberry announced it would launch a new smartphone called Priv on the Android platform. The Priv is expected to work with many of the world's carriers, and the four major carriers in the US.


14

RESEARCH IN RIM BRANDING BOOK

The first BlackBerry device, the 850, was introduced in 1999 as a two-way pager in Munich, Germany. The name BlackBerry was coined by the marketing company Lexicon Branding. The name was chosen due to resemblance of the keyboard's buttons to that of the drupelets that compose the blackberry fruit. The original BlackBerry devices, the RIM 850 and 857, used the DataTAC network. In 2003, the more commonly known convergent smartphone BlackBerry was released, which supports push email, mobile telephone, text messaging, Internet faxing, Web browsing and other wireless information services. BlackBerry gained market share in the mobile industry by concentrating on email. BlackBerry began to offer email service on non-BlackBerry devices, such as the Palm Treo, through the proprietary BlackBerry Connect software. The original BlackBerry device had a monochrome display while newer models installed color displays. All newer models have been optimized for "thumbing", the use of only the thumbs to type on a keyboard. The Storm 1 and Storm 2 include a SureType keypad for typing. Originally, system navigation was achieved with the use of a scroll wheel mounted on the right side of device models prior to the 8700. The trackwheel was replaced by the

trackball with the introduction of the Pearl series, which allowed four-way scrolling. The trackball was replaced by the optical trackpad with the introduction of the Curve 8500 series. Models made to use iDEN networks, such as Nextel, SouthernLINC, and Mike also incorporate a push-to-talk (PTT) feature, similar to a two-way radio. On January 30, 2013, BlackBerry announced the release of the Z10 and Q10 smartphones. Both models consist of touch screens: the Z10 features an all-touch design and the Q10 combines a QWERTY keyboard with touchscreen features. On August 12, 2013, BlackBerry announced the intention to sell the company due to their increasingly unfavourable financial position and competition in the mobile industry. Largely due to lower than expected sales on the Z10, BlackBerry announced on September 20, 2013 that 4,500 full- and parttime positions (an estimated 40% of its operating staff) have been terminated and its product line has been reduced from six to four models. On September 23, 2013, Fairfax Financial, which owns a 10% equity stake in BlackBerry, made an offer to acquire BlackBerry for $4.7 billion (at $9.00 per share). Following the announcement, BlackBerry announced an acceptance of the offer provisionally but it would continue to seek other offers until November 4, 2013.


DURING THE SECOND FINANCIAL QUARTER OF 2013, BLACKBERRY SOLD 6.8 MILLION HANDSETS.


16

BLACKBERRY LIMITED STOCK CHART Last 10 years

Volume

246.15 M

205.13

164.10

123.08

82.05

41.03

06 A J O 07 A J O 08 A J O 09 A J O 10 A J O 11

In June 2011, RIM stock fell to its lowest point since 2006. On December 16, 2011, RIM shares fell to their lowest price since January 2004. Overall in 2011, the share price tumbled 80 percent from January to December, causing its market capitalization to fall below book value. By March 2012, shares were worth less than $14, from a high of over $140 in 2008. From June 2008 to June 2011, RIM's shareholders lost almost $70 billion, or 82 percent, as the company's market capitalization dropped from $83 billion to $13.6 billion, the biggest decline among communications-equipment providers. Shares price fell further on July 16, closing at $7.09 on the Toronto Stock Exchange, the lowest level since September 8, 2003, after a jury in California said RIM must pay $147.2 million as a result of a patent infringement judgement that was subsequently overturned.

A J O 12 A J O 13 A J O 14 A J O 15 A J O

On November 22, 2012, shares of RIM/BlackBerry surged 18%, the largest gain of the stock in over three years. This was due to National Bank of Canada analyst Kris Thompson's announcement that the new BB10 devices were expected to sell better than anticipated; along with raising the target stock price. On June 28, 2013, after BlackBerry announced net losses of approximately $84 million, its shares plunged 28%.


17

160.00

150.00

140.00

130.00

M 120.00

110.00

100.00

90.00

80.00

70.00

60.00

50.00

40.00

30.00

20.00

10.00

06 A J O 07 A J O 08 A J O 09 A J O 10 A J O 11

A J O 12 A J O 13 A J O 14 A J O 15 A J O


RESEARCH IN RIM BRANDING BOOK

18


19

On November 4, 2013, BlackBerry replaced Thorsten Heins with new interim CEO John S. Chen, the former CEO of Sybase. On November 8, the BlackBerry board rejected proposals from several technology companies for various BlackBerry assets on grounds that a break-up did not serve the interest of all stakeholders, which include employees, customers and suppliers in addition to shareholders, said the sources, who did not want to be identified as the discussions were confidential. On November 13, 2013, Chen released an open message: "We are committed to reclaiming our success." In early July 2014, the TechCrunch online publication published an article titled "BlackBerry Is One Of The Hottest Stocks Of 2014", following a 50 percent rise in the company's stock, an increase that was greater than peer companies such as Apple and Google; however, an analysis of BlackBerry's financial results showed that neither revenue or profit margin were improved, but, instead, costs were markedly reduced. During the same period, BlackBerry also introduced the new Passport handset, consisting of a 4.5 inches (11 cm) square screen

RESEARCH IN RIM BRANDING BOOK

with "Full HD Class" (1,440 x 1,440) resolution and marketed to professional fields such as healthcare and architecture, promoted its Messenger app and released minor updates for the BB10 mobile operating system. On December 17, 2014, the BlackBerry Classic was introduced, with a keyboard that many consumers preferred over the touchscreen BlackBerry models (Z10 and Z30) introduced two years earlier.

However, an analysis of Black Berry’s financial results showed that neither revenue or profit margin were improved, but, instead, company’s stock costs were markedly reduced.


RESEARCH IN RIM BRANDING BOOK

20


21

IT IS A GREAT TIME TO REBRAND RIM

RESEARCH IN RIM BRANDING BOOK


22

RESEARCH IN RIM BRANDING BOOK

TIMELINE

1988: RIM begins developing products for Mobitex wireless packet-switched data communications networks, often used by military and

1996: RIM releases the Inter@ctive Pager, also known as the RIM 900, its first keyboard-based device.

police forces, firefighters and ambulance services.

1999: The stock symbol RIMM is added to Nasdaq. RIM announces it has received FCC approval in the U.S. to begin selling its first BlackBerry device, the 850, with mobile email.

1984: Research In Motion

1992: Jim Balsillie

1997: RIM goes public on the

2005: RIM hits four million

is founded by University of

joins RIM. He would

Toronto Stock Exchange.

subscribers, Balsillie and

Waterloo engineering student

become co-CEO along with

Lazaridis are named among

Mike Lazaridis and University

Lazaridis.

Time magazine’s 100 most

of Windsor engineering student Douglas Fregin.

influential people.


23

RESEARCH IN RIM BRANDING BOOK

2007: RIM becomes the

2010: RIM surpasses 40

2013: Heins finally unveils

most valuable company

million users and announces

BlackBerry 10 and the first

on the TSX with a market

it has shipped its 100

two smartphones to use the

capitalization surpassing

millionth smartphone. It buys

operating system, the Z10 and

$67 billion. The company

Ottawa-based QNX Software

Q10. The company purchases

has 10 million subscribers

Systems, which would help

a Super Bowl ad to build hype

and introduces the first of its

reshape its operating system

for the new company, which

Curve BlackBerrys. But RIM

software going forward.

officially changes its name to BlackBerry.

is caught flat-footed by the overwhelming response to Apple’s new iPhone.

2008: RIM stock hits a high

2012: Lazaridis and Balsillie

2020: RIM rebrand itself to

of $149.90 in June but the

step down as co-CEOs and are

find another business market.

euphoria is short lived.

replaced by Thorsten Heins.

The stock market crash in

Balsillie also resigns from

September takes its shares

the board of directors. Within

below $50.

months Heins announces 5,000 layoffs and a delay to the critical BlackBerry 10 software update.


RESEARCH IN RIM BRANDING BOOK

24

OUR MISSION IS TO BE A PROVIDER OF SECURITY AND INFORMATION FOR INDIVIDUALS AND COMPANIES.


25

RESEARCH IN RIM BRANDING BOOK


RESEARCH IN RIM BRANDING BOOK

AUDIENCE

26


27

Daniel Lawyer 35 years old

RESEARCH IN RIM BRANDING BOOK

Daniel

1. Has a lot of confidential cases. 2. He is familiar with underground deals. 3. He will do anything to win the case. 4. Amulance chaser 5. He has a lot of friends who have power. 6. He is cheating on his wife. 7. Owns a big house, and he is a president of PTA.

Daniel is a lawyer that care about privacy and information security because in his carrer and life, he faces a lot of cases about information security. In his mind, information security is very important to everyone when digital world is coming. He also care about his security because he doesn’t want anyone stolen his information and identity.

“It used to be expensive to make things public and cheap to make them private. Now it’s expensive to make things private and cheap to make them public.”


28

RESEARCH IN RIM BRANDING BOOK

William CEO 40 years old

William

1. Wants to protect his company and work from other corporate spies. 2. Wants to make sure the company holdings are secure. 3. He does not sleep well because he was worried about enemies. 4. He has a lot of bank accounts. 5. He likes to buy expensive car. 6. Global travel a lot 7. He had taken confidential information to build his business in the past.

William is a company CEO. Information security for him is so important because in his company and life, he need keep his personal and company information in high safety. He doesn’t want his information shared or stolen by other people.

“Once you’ve lost your privacy, you realize you’ve lost an extremely valuable thing.”


29

Rachel Celebrities 25 years old

1. She goes to parties every night. 2. She has a lot of boyfriends. 3. Loves fashion and labels. 4. Wants her personal life privacy. 5. She doesn’t care what people think of her. 6. Her parents can’t get hold of her. 7. She has a bad temper.

RESEARCH IN RIM BRANDING BOOK

Rachel

Rachel is a celebrites, but it doesn’t mean she does not need privacy. Actually, she need more information protection than normal people. A lot of hackers try to hack her personal information for profit. The paparazzi is very interesting to sell her information to publication.

“I need more private space and time. Stop try hacking my computer, my phone.”


30

RESEARCH IN RIM BRANDING BOOK

Sarah Uber driver 35 years old

Sarah

1. Uses her phone every day to pick up riders. 2. Bank account linked to Uber so she can get paid. 3. She is tired everyday, and driving is a dangerous job. 4. She likes to meet new people. 5. She is not married. 6. Only works in the day time because it is safer. 7. Saving money to buy condo.

Sarah is an uber driver, actually she is very care about her online security because all of uber money transfer through the internet. She is also worried about her mobile security. If her phone or computer get hacked, she will get real risk to lose her money.

“I am worried about my iphone and account security because every money transfer through internet and app.�


31

Andrew Politician 50 years old.

RESEARCH IN RIM BRANDING BOOK

Andrew

1. Always in the public eye, Paparazzi would love to get a hold of him. 2. Doesn’t want his private information hacked. 3. Has political enemies. 4. Travels a lot to campaign. 5. Has to keep the government secret. 6. On weekend, he drives to the beach and running. 7. He likes to spend time with family.

Andrew is a politician. He works in the government office. He needs highly security for his peronal information and office information. He has a lot of secrets that he doesn’t want other person to see or know. Once his personal information is hacked, he might lose everything includes family and jobs.

“All human beings have three lives: public, private, and secret.”


32

RESEARCH IN RIM BRANDING BOOK

Joseph Software Engineer 23 years.old

Joseph

1. Knows how to hack into things, and wants to make sure he can’t get hacked into. 2. Everyday he will spend a lot of time on the computer. 3. He likes to eat fast food. 4. Doesn’t have girlfriend 5. He doesn’t like socialize. 6. Works long hours and sleep in the office. 7. Has a good paid from company.

Joseph is a computer programmer, his career is protect the internet safety. He doesn’t want the program which is designed by him is hacked or cracked by hacker. He wants to design the program as safety as he can.

“I am always keeping update of the software because that is a way to fix problem and make it harder for hacker.”


33

Cynthia Student 21 years old

RESEARCH IN RIM BRANDING BOOK

Cynthia

1. Text and chats a lot on phone 2. Likes to use social media 3. She doesn’t like reading. 4. She thinks tattoo is very cool and wants to take one. 5. She likes night clubs and drinking. 6. She wears make up everyday. 7. She likes to going to the mall.

Max Retire 65 years old

1. Not well versed with technology 2. Has no family 3. He is in the medical insurance. 4. He likes to listen news from radio. 5. He likes eating oatmeal in the morning. 6. Lives in the nursing home. 7. He changes his clothes every 3 days.

Max


RESEARCH IN RIM BRANDING BOOK

PAST RIM

BUSINESS, CLASSIC, TRANDITIONAL

34


35

RESEARCH IN RIM BRANDING BOOK


RESEARCH IN RIM BRANDING BOOK

FUTURE RIM

SECURE, INFORMATION, SAFE, TECHNOLOGY

36


37

RESEARCH IN RIM BRANDING BOOK


38

RESEARCH IN RIM BRANDING BOOK

COMPARATIVE ANALYSIS GRID RIM will use the price and versatility as the key words to analysie the brand comparative strength. RIM campare with IBM, Samsung, Apple and so on to see the opportunity of rebrand. Ultimately, RIM will be a high price and high versatility for customers.

Higher Price

Apple RIM/After

google Microsoft IBM

Higher

Lower Xfinity

Versatility Samsung

Oracle

Frontprint RIM/Before

Lower Price

Protect America

Versatility


39

RESEARCH IN RIM BRANDING BOOK

RIM will also use the secure and control as the analysis key word because after rebranding, Rim will be a control, powerful, and secure brand to protect information security.

More Control

Microsoft Apple

RIM/After

IBM

Samsung

Lower Secure

google

Xfinity

Higher

Oracle

Secure

Frontprint Protect America

RIM/Before

Less Control


40

RESEARCH IN RIM BRANDING BOOK

REFORGE A SHIELD

DENTITY


41

RESEARCH IN RIM BRANDING BOOK

IDENTITY

IDEN


RESEARCH IN RIM BRANDING BOOK

WHAT: Brand will provide securites and information for individuals and companies in the future world. WHY: The information security need protect in the future technology world For Who: Individuals, company, government

42


43

RESEARCH IN RIM BRANDING BOOK

IDENTITY OF RESEARCH IN MOTION Brand Overview: Research In Motion specializes in highly secure software and hardware. The focus is on wireless technology, including point-of-sale terminals, wireless modems and pagers to keep business and individuals information safe.

THE BRAND SOUL: TO BE A PROVIDER OF INFORMATION SECURITY IN THE FUTURE WORLD.

+ RIM =


44

RESEARCH IN RIM BRANDING BOOK

EXCLUSION ZONE 2X

7X

2X

5X

0.6X

5X

X

X

The exclusion zone refers to the area around the logo which must remain free from other copy to ensure that the logo is not obscured. As the diagram indicates, the exclusion zone is equal to that blue square.


45

There are three versions of the RIM logo use at different sizes. The relationship between the two or three elements of the logo must be the same as shown for all versions.

ICON+TYPE

ONLY TYPE

ONLY ICON

RESEARCH IN RIM BRANDING BOOK


46

RESEARCH IN RIM BRANDING BOOK

SIZE & CLEAR SPACE To standardize the use of the tag, three sizes are provided for most uses—50 pixels high for web banners and e-mail headers, .875” high for printed materials, and 72 pixels high for large pages. These sizes should be considered the minimum size for print/Online uses. For printed communication, add .125” to the top or bottom of the red field to cover bleed.

50 px

0.875 inch

72 px


47

RESEARCH IN RIM BRANDING BOOK

ONLY ICON

Web/app

A5

A4

A3 or larger

ONLY TYPE

ICON+TYPE


48

RESEARCH IN RIM BRANDING BOOK

BRAND COLOR PALETTE

R93 G129 B151

R158 G210 B241

R192 G202 B211

R130 G141 B149

R192 G202 B211

R39 G13 B0

C65 M37 Y26 K10

C35 M5 Y0 K0

C23 M13 Y10 K0

C46 M32 Y28 K30

C5 M63 Y74 K0

C35 M60 Y60 K90

5405C

297C

5435C

5415C

021C

80%

60%

40%

20%

The corporate color system reflects a safety, dynamic, multi-dimensional RIM. RIM uses the blue color as the sea and cold grey as primary color to represent security feeling. Orange color is limited use only for dangerous, compelling or competitive meaning.


49

ONE COLOR LOGO

TWO COLORS

RESEARCH IN RIM BRANDING BOOK


50

RESEARCH IN RIM BRANDING BOOK

INCORRECT USE Do not alter the Research In Motion logo in any way. Do not animate, color, rotate, skew, or apply effects to the logo. Do not separate the elements. Never attempt to create the logo yourself, change the font, or alter the size or proportions.

RESEARCH IN MOTION RESEARCH IN MOTION

RIM RIM

RESEARCH IN MOTION

RESEARCH IN MOTION


51

USAGE EXAMPLE

HIGH SECURITY

RESEARCH IN RIM BRANDING BOOK


52

RESEARCH IN RIM BRANDING BOOK

Tungsten

Aa

ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz

0123456789 12 pt

RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.

14 pt

RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.

16 pt

RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.

12 pt

RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.

14 pt

RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.

16 pt

RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.


53

RESEARCH IN RIM BRANDING BOOK

Aa

Vitesse

ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz

01 2 34 5678 9 12 pt

14 pt

16 pt

12 pt

14 pt

16 pt

RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.

RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.

RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD. RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.

RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.

RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.


54

RESEARCH IN RIM BRANDING BOOK

Aa Aa Mobile messaging presents several security and compliance challenges, especially to organizations in regulated industries, such as government, financial services and healthcare. Concerns over data leakage, cyber surveillance and industrial espionage have forced some CIOs to restrict or even prohibit this popular and productivityaccelerating form of communication and collaboration.

Vitesse can use for both body text and header.

HEADLINE Tungsten is always used for the headline.

SECURE MOBILE MESSAGING Mobile messaging presents several security and compliance challenges, especially to organizations in regulated industries, such as government, financial services and healthcare. Concerns over data leakage, cyber surveillance and industrial espionage have forced some CIOs to restrict or even prohibit this popular and productivityaccelerating form of communication and collaboration.

Example of type composition


55

RESEARCH IN RIM BRANDING BOOK

USAGE EXAMPLE

INFORMATION SECURITY Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take.

IT security Sometimes referred to as computer security, Information Technology security is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory. Such devices can range from non-networked standalone devices as simple as calculators, to networked mobile computing devices such as smartphones and tablet computers. IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems. Information assurance The act of ensuring that data is not lost when critical issues arise. These issues include, but are not limited to: natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost. Since most information is stored on computers in our modern era, information assurance is typically dealt with by IT security specialists. One of the most common methods of providing information assurance is to have an off-site backup of the data in case one of the mentioned issues arise.


RESEARCH IN RIM BRANDING BOOK

Graphic Elements The idea of graphic elements design is based on shield shape, I sepreate the shield to lines, square and triangle. I try to make it highly contrast with lines and shapes to represent technology feeling.

56


57

RESEARCH IN RIM BRANDING BOOK


RESEARCH IN RIM BRANDING BOOK

58


59

RESEARCH IN RIM BRANDING BOOK


60

RESEARCH IN RIM BRANDING BOOK

This is what we do.

ENSION


61

RESEARCH IN RIM BRANDING BOOK

EXTENSION

EXTE


62

RESEARCH IN RIM BRANDING BOOK

WHAT WE DO?

INDIVIDUAL PRIVATE SECURITY

INDIVIDUAL PUBLIC SECURITY

SOCIETY PRIVATE SECURITY

PUBLIC PUBLIC SECURITY


63

RESEARCH IN RIM BRANDING BOOK

PRIVATE

PUBLI C

S OC I E T Y Home Automation

Message Secure_1

Video Games_5

Security_2/4 Risk Management_2/4

Identity System_1/2/7

Bank Vault_3

Credit Company_2/4

Event about Food Safety_6

Child ID Profile_2/4/5

In Defense of Violent

Game Firewall_2/3

Evidence Storage_7

Password Manager_2

Company Cybertalk_2/3

Email Protection_2

Airport Security_2/4/7

GPS location protect_1

Office Privacy Training_5

IT Magzine_2/3 Whisper Communication_1 Future Credit Card_1 Art Security_2

Wireless Router_1

Conference About Info Safe_6

Cyber Security

Transport Database

Insurance_2

of Passenger_2/4

Cloud backup_2

Law Service_2

Video about protecting SSN_5 Supply Chain Security_2

Institution_5 Privacy Message App_1

IN DI V I D UAL

Online Vendor Provider Security_2

High Sercurity Wireless Router_1

Network Threat Actor_2

Anti-Virus Software_1/2

[1] product [2] service [3] environment [4] experience [5] educational opportunity [6] event [7] co-branding opportunity


64

RESEARCH IN RIM BRANDING BOOK

Product Complete Home Security Identity System Privacy Message App High Sercurity Wireless Router GPS location protect System Bank Vault Anti-Virus Software

Environment Bank Vault Database Center Self-defense Training Disaster Shelter Natural Food Market

Co-branding Opportunity Identity System Driver School Program Airport Security Evidence Storage

Service Identity System Credit Company Child ID Profile Risk Management Insurance Art Security Law Service Network Threat Actor Email Protection Online Vendor Provider Security

Event Event about food safety Conference About Info Safe

Experience Complete Home Security Credit Company Students Profile Analysis Risk Management

Educational Opportunity Child Safety Driver School Program School Emergency Training Video about protecting SSN


65

RESEARCH IN RIM BRANDING BOOK

[RIM_Shield_Cyber Security Insurance] _ RIM Cyber Security Insurance is an insurance service used to protect businesses and individual users from Internet-based risks, and more risks relating to information technology infrastructure and activities.

[RIM_Shield_Child ID Profile] _ The child’s personal information is protected by law. RIM Child ID Profile is a sevice that help schools to collecting children Identity information that the ID theft can’t steal them to get benefit.

[RIM_Shield_Institution] _ RIM educational institution is focused on the Cybersecurity Skills Crisis. We have the strongest skill professers and equipments for students who want to work in information security professionals.

[RIM_Shield_Conference About Info Safe] _ RIM Conference is a world wide event and presentation that about how to protect information serurity. In the conference, people will discuss the newest technology of IT protection. The conference is host every 2 years.

[RIM_Shield_Identity System] _ RIM Secure Identity System has face scanner and video analysis system that offer both proactive and reactive protection against identity theft.

[RIM_Shield_Credit Company] _ RIM Credit Company is a full suite of online tools to help you take control of your credit and protect your identity from the ID theft. We also help people to start monitoring the good credit you’ve worked hard to build.

[RIM_Shield_Network Threat Actors] _ RIM Threat actors are using increasingly advanced malware designed to evade traditional signaturebased protections, network security monitoring tools and even some sandbox technology. In addition, RIM Threat actors detect and/or respond to a major information security breach.

[RIM_Shield_Law] _ RIM LAW will provide the legal assistance for informtaion security such as IT security, supply chain security and so on.

[RIM_Shield_Supply Chain Security] _ RIM Supply Chain Security enables the enterprise to take full advantage of rapid globalization through secure integration with critical supply chain partners, connecting disparate processes and diverse technology, and allowing supply chain activities to flow seamlessly.

[RIM_Shield_Evidence Storage] _ RIM Evidence Storage is co-branded with US police that protect the evidence room. It is a system that build on the high security evidence database. It is also a service that protect the evidences both on the database and physical.


RESEARCH IN RIM BRANDING BOOK

[RIM_Shield_GPS Location Protect] _ it is a good feature in mobile device which allows people can share the location in particular. But at the same time, the hacker will track you easily. RIM GPS protection will let you save your locations.

66

[RIM_Anti-Virus Software] _ RIM Anti-Virus is a powerful protection software from infections and other files which can harm personal data stored over your devices.

[RIM_Shield_Video about protecting SSN] _ It is an educational video about protecting SSN. In the video, RIM will give the tips that how people can avoid SSN stolen risks.

[RIM_Shield_Wireless Router] _ RIM Wireless Router is the strongest router to protect home network security from hackers. It comes equipped with enterprise-grade network security, so you never even have to think about network security.

[RIM_Shield_Airport Security] _ RIM Airport Security refers to the techniques and methods used in protecting passengers, staff and aircraft information. We are not only designed the equipment, the more is building the data information for the airport.

[RIM_Shield_IT Magzine] _ It is a magzine focused on technology and software program. The computer engeneers are our main target audiences. The magzine is collecting all information of IT protect knowledge.

[RIM_Shield_Credit Card of Future] _ It’s all-in-one electronic card lets users store all of their credit and debit cards on RIM Card. RIM Card use the fingerprint protect your credit card information.

[RIM_Shield_RIM Cloud] _ Storing private data in the cloud requires an inconvenient devotion to balancing security and usability. We provide the most privacy backup for the customers.

[RIM_Shield_Password Manager] _ RIM Password Manager installs as a browser plug-in to handle password capture and replay. Automatic password changing by fingerprint, Yubikey, and more.

[RIM_Shield_Whisper Communication] _ RIM Whisper Communication is a very strong encrypted voice and calls application for people who care about privacy.


67

RESEARCH IN RIM BRANDING BOOK

[RIM_Message Secure] _ RIM Message is protecting your phone number and personal messages and photos. Text anyone with a free new phone number without exposing your private number. With RIM Message, protecting your privacy is easy. Text anyone with a free and real number.

[RIM_Shield_Colocation] _ RIM Colocation offer a range of customizable hybrid solutions for the different business requirements. From single cabinets to large private suites, data modules, or a hybrid solution of both, we can engineer the highest security space for IT environment.

[RIM_ Shield_Email Security] _ All emails are secured automatically with endto-end encryption. This means even we cannot decrypt and read your emails. As a result, your encrypted emails cannot be shared with third parties. No personal information is required to create your secure email account.

[RIM_Shield_Transport Database of Passenger] _ RIM Transport is protecting their passengers, staff and their assets is of paramount importance, and increasingly so. Whether on buses, trains or trams, indeed on any passenger transport, combating crime and dealing with the fall-out of crime is a major concern, fraught with challenges.

[RIM_ Shield_Risk Management] _ RIM Risk Management is created as a response to the growing need for quality IT & Cyber Security professional services. We are offering expert guidance and support in Cyber Security, IT Security, Risk Management, IT Forensic Services.

[RIM_Shield_In Defense of Violent Video Games] _ A lot of researches have long shown a cause-effect relationship between television violence and aggression among children and youth who watch it. RIM will host a campaign for both youth and parents that help children get away from video violent.

[RIM_Shield_Bank Training] _ RIM bank security trainning and education should be provided and employees should fully understand the act and their working rules.

[RIM_Shield_Home Automation Protect] _ RIM Home is a device that protect your smarthome from hackers and stalkers. Our mission is keeping your home private and safety.

[RIM_Shield_Company CyberTalks] _ RIM Cyber Talks is a presentation to guide CEO and business manager the knowledge about cybersecurity and how to protect your company information security.

[RIM_Shield_Game Firewall] _ RIM Game Firewall is a service for game company to protect players’ in-game information and register information. It is including game data analysis.


RESEARCH IN RIM BRANDING BOOK

68


69

RESEARCH IN RIM BRANDING BOOK

There are only two types of companies: those that have been hacked, and those that will be. — Robert Mueller FBI Director, 2012


RESEARCH IN RIM BRANDING BOOK

70


71

RESEARCH IN RIM BRANDING BOOK

0.1 RIM SHIELD HOME RIM Home is a service that protect your smarthome from hackers and stalkers. Our mission is keeping your home private and safety.


RESEARCH IN RIM BRANDING BOOK

RIM HOME PROTECT ALL OF YOUR CONNECTED HOME DEVICES FROM MALWARE, VIRUSES AND ANY CYBER ATTACKS WHILE KEEPING YOUR PRIVACY INTACT.

72


73

RESEARCH IN RIM BRANDING BOOK


RESEARCH IN RIM BRANDING BOOK

0.2 RIM ANTI-VIRUS RIM Anti-Virus is a powerful protection software from infections and other files which can harm personal data stored over your devices, not only computers and laptops but for also smartphones like iPhone and iPad. It gets quick update and provides faster scanning features to find out about various threats in your smartphone.

74


75

RESEARCH IN RIM BRANDING BOOK


RESEARCH IN RIM BRANDING BOOK

76


77

RESEARCH IN RIM BRANDING BOOK

REAL TIME PROTECTION DEFENDS AGAINST NEW AND EMERGING VIRUSES, SPYWARE AND MORE. URL ADVISOR INFORMS YOU ABOUT THE REPUTATION AND SECURITY OF WEBSITE LINKS.


RESEARCH IN RIM BRANDING BOOK

78


79

RESEARCH IN RIM BRANDING BOOK

0.3 RIM WIRELESS ROUTER RIM Wireless Router is the strongest router to protect home network security from hackers. It comes equipped with enterprise-grade network security, so you never even have to think about network security. RIM Wireless comes equipped with enterprise-grade network security, so you never even have to think about network security.


RESEARCH IN RIM BRANDING BOOK

80


81

RESEARCH IN RIM BRANDING BOOK

ROUTER SECURITY SCAN Scans your router for any security vulnerabilities and recommends options for improving protection.

MALICIOUS SITE BLOCKING Restricts access to known malicious websites in the Trend RIM database for always-up-to-date protection.


RESEARCH IN RIM BRANDING BOOK

0.4 RIM NETWORK THREAT ACTOR RIM Threat actors are using increasingly advanced malware designed to evade traditional signature-based protections, network security monitoring tools and even some sandbox technology. In addition, RIM Threat actors detect and/or respond to a major information security breach.

82


83

RESEARCH IN RIM BRANDING BOOK


RESEARCH IN RIM BRANDING BOOK

CYBERTHREAT REAL TIME MAP 2020.10.18 _ 0 9 : 3 0 p m

84


85

RESEARCH IN RIM BRANDING BOOK

RIM NETWORK DETECIVE, ANALYSIS, AND PROTECTION FROM THE GOLBOL CYBER ATTACKS.


RESEARCH IN RIM BRANDING BOOK

0.5 RIM SHIELD IDENTITY As identity thieves continue to find new ways to steal and use information, identity theft product offerings must continuously evolve to protect customers against all forms of identity theft. Secure Identity Systems has patented products that offer both proactive and reactive protection against identity theft. The Identity system will protect you even at home so that you can know is that a real postman?

86


87

RESEARCH IN RIM BRANDING BOOK

Joseph 32 years old Postman Married / 1 child Address: 930 sutter st. Apt 325. San Francisco. Ca. 94109 Phone: 415. 798. 217 Identity Approved No Threat Found


88

RESEARCH IN RIM BRANDING BOOK

0.6 RIM SHIELD EMAIL All emails are secured automatically with end-to-end encryption. This means even we cannot decrypt and read your emails. As a result, your encrypted emails cannot be shared with third parties. No personal information is required to create your secure email account. By default, we do not keep any IP logs which can be linked to your anonymous email account. Your privacy comes first.

INBOX SO MUCH NEW P. PARKER

0.7 RIM EMAIL

RIM EMAIL V 1. RIM EMAIL VIA CRASHLYTICS

I FOUND A WAY PETER PAN


89

0.10 IS READY!

Y BACK HOME

RESEARCH IN RIM BRANDING BOOK


RESEARCH IN RIM BRANDING BOOK

0.7 RIM SHIELD BANK TRAINING Cyber threats to finalcial institutions and other national critical infrastructure is real and growing at alarming rate. RIM bank security trainning and education should be provided and employees should fully understand the act and their working rules. RIM bank training will help employees understand the information security and privacy in bank.

90


91

RESEARCH IN RIM BRANDING BOOK


RESEARCH IN RIM BRANDING BOOK

AFTER RIM BANK TRAINNING, BANK EMPLOYEES WILL GIVE THE CUSTMORS BEST SERVICE AND PRIVACY PROTECTION.

92


93

RESEARCH IN RIM BRANDING BOOK


RESEARCH IN RIM BRANDING BOOK

08. RIM SHIELD DATABASE RIM Collocation offer a range of customizable hybrid solutions for the different business requirements. From single cabinets to large private suites, data modules, or a hybrid solution of both, we can engineer the highest security space for IT environment.

94


95

RESEARCH IN RIM BRANDING BOOK


RESEARCH IN RIM BRANDING BOOK

EVEN NATURAL DISASTERS CAN’T DESTROY RIM DATABASE CENTER.

96


97

RESEARCH IN RIM BRANDING BOOK


RESEARCH IN RIM BRANDING BOOK

ypography

0.9 RIM SHIELD CONFERENCE RIM Conference is a world wide event and presentation that about how to protect information serurity. In the conference, people will discuss the newest technology of IT protection. The conference is host every 2 years.

98


99

RESEARCH IN RIM BRANDING BOOK


100

RESEARCH IN RIM BRANDING BOOK

Information Screen

Fingerprint Password


101

RESEARCH IN RIM BRANDING BOOK

10 RIM SHIELD CREDIT CARD It’s all-in-one electronic card lets users store all of their credit and debit cards on RIM Card. RIM Card use the fingerprint protect your credit card information.


RESEARCH IN RIM BRANDING BOOK

SECURITY RIM credit card use the fingerprint to protect your personal informtaion. Auto locks when the card leaves you 5 feet.

SIMPLE RIM credit card is designed to combine your whole bank cards in one high security card.

102


103

RESEARCH IN RIM BRANDING BOOK


RESEARCH IN RIM BRANDING BOOK

104


105

RESEARCH IN RIM BRANDING BOOK



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.