[BRAND BOOK]
1
RESEARCH IN RIM BRANDING BOOK
RESEARCH IN RIM BRANDING BOOK
2
3
RESEARCH IN RIM BRANDING BOOK
Copyright Š 2015 by Research In Motion 965 Sutter street, San Francisco, CA 94909 www.thisisthinkink.com info@thisisthinkink.com All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law. All images in this book have been reproduced with the knowledge and prior consent of the designers and the clients concerned, and every effort has been made to ensure that credits accurately comply with information applied. No responsibility is acceted by producer, publisher, or printer for any infringement of copyright or otherwise arising from the contents of this publication. Printed in the United States of America
5
RESEARCH IN RIM BRANDING BOOK
RESEARCH IN RIM BRANDING BOOK
6
7
RESEARCH IN RIM BRANDING BOOK
CONTENT
RESEARCH
P11
IDENTITY
P38
EXTENSION
P58
RESEARCH IN RIM BRANDING BOOK
This is where our story begins.
SEARCH
10
11
RESEARCH IN RIM BRANDING BOOK
RESEARCH
RESE
RESEARCH IN RIM BRANDING BOOK
EARCH
12
13
RESEARCH IN RIM BRANDING BOOK
ABOUT RIM BlackBerry is a line of wireless handheld devices and services designed and marketed by BlackBerry Limited, formerly known as Research In Motion Limited (RIM).
BlackBerry is a line of wireless handheld devices (commonly called smartphones) and services designed and marketed by BlackBerry Limited, formerly known as Research In Motion Limited (RIM). The very first RIM device was the Inter@ctive Pager 900, a clamshell-type device that allowed two-way paging, announced on September 18, 1996. After the success of the 900, the Inter@ctive Pager 800 was created for IBM, which bought US$10 million worth of them on February 4, 1998. The next device to be released was the Inter@ctive Pager 950, on August 26, 1998. The very first device to carry the BlackBerry name was the BlackBerry 850, an email pager, released January 19, 1999. Although identical in appearance to the 950, the 850 was the first device to integrate email and the name Inter@ctive Pager was no longer used to brand the device. Blackberry is considered one of the major smartphone vendors in the world, specializing in secure communications and mobile productivity. For use on devices made prior to the new Blackberry 10 Operating System (BBOS 7 and earlier), the consumer BlackBerry Internet Service is available in 91 countries worldwide on over 500 mobile service operators using various mobile technologies. As of September 2013, there were 85 million BlackBerry subscribers worldwide. That number has dropped steadily, down to 46 million in September 2014. Starting in November 2013, BlackBerry Messenger could be run on multiple platforms including Android, iOS and Windows Phone, and up to June 2015 got 260 million new users. In September 2015, Blackberry announced it would launch a new smartphone called Priv on the Android platform. The Priv is expected to work with many of the world's carriers, and the four major carriers in the US.
14
RESEARCH IN RIM BRANDING BOOK
The first BlackBerry device, the 850, was introduced in 1999 as a two-way pager in Munich, Germany. The name BlackBerry was coined by the marketing company Lexicon Branding. The name was chosen due to resemblance of the keyboard's buttons to that of the drupelets that compose the blackberry fruit. The original BlackBerry devices, the RIM 850 and 857, used the DataTAC network. In 2003, the more commonly known convergent smartphone BlackBerry was released, which supports push email, mobile telephone, text messaging, Internet faxing, Web browsing and other wireless information services. BlackBerry gained market share in the mobile industry by concentrating on email. BlackBerry began to offer email service on non-BlackBerry devices, such as the Palm Treo, through the proprietary BlackBerry Connect software. The original BlackBerry device had a monochrome display while newer models installed color displays. All newer models have been optimized for "thumbing", the use of only the thumbs to type on a keyboard. The Storm 1 and Storm 2 include a SureType keypad for typing. Originally, system navigation was achieved with the use of a scroll wheel mounted on the right side of device models prior to the 8700. The trackwheel was replaced by the
trackball with the introduction of the Pearl series, which allowed four-way scrolling. The trackball was replaced by the optical trackpad with the introduction of the Curve 8500 series. Models made to use iDEN networks, such as Nextel, SouthernLINC, and Mike also incorporate a push-to-talk (PTT) feature, similar to a two-way radio. On January 30, 2013, BlackBerry announced the release of the Z10 and Q10 smartphones. Both models consist of touch screens: the Z10 features an all-touch design and the Q10 combines a QWERTY keyboard with touchscreen features. On August 12, 2013, BlackBerry announced the intention to sell the company due to their increasingly unfavourable financial position and competition in the mobile industry. Largely due to lower than expected sales on the Z10, BlackBerry announced on September 20, 2013 that 4,500 full- and parttime positions (an estimated 40% of its operating staff) have been terminated and its product line has been reduced from six to four models. On September 23, 2013, Fairfax Financial, which owns a 10% equity stake in BlackBerry, made an offer to acquire BlackBerry for $4.7 billion (at $9.00 per share). Following the announcement, BlackBerry announced an acceptance of the offer provisionally but it would continue to seek other offers until November 4, 2013.
DURING THE SECOND FINANCIAL QUARTER OF 2013, BLACKBERRY SOLD 6.8 MILLION HANDSETS.
16
BLACKBERRY LIMITED STOCK CHART Last 10 years
Volume
246.15 M
205.13
164.10
123.08
82.05
41.03
06 A J O 07 A J O 08 A J O 09 A J O 10 A J O 11
In June 2011, RIM stock fell to its lowest point since 2006. On December 16, 2011, RIM shares fell to their lowest price since January 2004. Overall in 2011, the share price tumbled 80 percent from January to December, causing its market capitalization to fall below book value. By March 2012, shares were worth less than $14, from a high of over $140 in 2008. From June 2008 to June 2011, RIM's shareholders lost almost $70 billion, or 82 percent, as the company's market capitalization dropped from $83 billion to $13.6 billion, the biggest decline among communications-equipment providers. Shares price fell further on July 16, closing at $7.09 on the Toronto Stock Exchange, the lowest level since September 8, 2003, after a jury in California said RIM must pay $147.2 million as a result of a patent infringement judgement that was subsequently overturned.
A J O 12 A J O 13 A J O 14 A J O 15 A J O
On November 22, 2012, shares of RIM/BlackBerry surged 18%, the largest gain of the stock in over three years. This was due to National Bank of Canada analyst Kris Thompson's announcement that the new BB10 devices were expected to sell better than anticipated; along with raising the target stock price. On June 28, 2013, after BlackBerry announced net losses of approximately $84 million, its shares plunged 28%.
17
160.00
150.00
140.00
130.00
M 120.00
110.00
100.00
90.00
80.00
70.00
60.00
50.00
40.00
30.00
20.00
10.00
06 A J O 07 A J O 08 A J O 09 A J O 10 A J O 11
A J O 12 A J O 13 A J O 14 A J O 15 A J O
RESEARCH IN RIM BRANDING BOOK
18
19
On November 4, 2013, BlackBerry replaced Thorsten Heins with new interim CEO John S. Chen, the former CEO of Sybase. On November 8, the BlackBerry board rejected proposals from several technology companies for various BlackBerry assets on grounds that a break-up did not serve the interest of all stakeholders, which include employees, customers and suppliers in addition to shareholders, said the sources, who did not want to be identified as the discussions were confidential. On November 13, 2013, Chen released an open message: "We are committed to reclaiming our success." In early July 2014, the TechCrunch online publication published an article titled "BlackBerry Is One Of The Hottest Stocks Of 2014", following a 50 percent rise in the company's stock, an increase that was greater than peer companies such as Apple and Google; however, an analysis of BlackBerry's financial results showed that neither revenue or profit margin were improved, but, instead, costs were markedly reduced. During the same period, BlackBerry also introduced the new Passport handset, consisting of a 4.5 inches (11 cm) square screen
RESEARCH IN RIM BRANDING BOOK
with "Full HD Class" (1,440 x 1,440) resolution and marketed to professional fields such as healthcare and architecture, promoted its Messenger app and released minor updates for the BB10 mobile operating system. On December 17, 2014, the BlackBerry Classic was introduced, with a keyboard that many consumers preferred over the touchscreen BlackBerry models (Z10 and Z30) introduced two years earlier.
However, an analysis of Black Berry’s financial results showed that neither revenue or profit margin were improved, but, instead, company’s stock costs were markedly reduced.
RESEARCH IN RIM BRANDING BOOK
20
21
IT IS A GREAT TIME TO REBRAND RIM
RESEARCH IN RIM BRANDING BOOK
22
RESEARCH IN RIM BRANDING BOOK
TIMELINE
1988: RIM begins developing products for Mobitex wireless packet-switched data communications networks, often used by military and
1996: RIM releases the Inter@ctive Pager, also known as the RIM 900, its first keyboard-based device.
police forces, firefighters and ambulance services.
1999: The stock symbol RIMM is added to Nasdaq. RIM announces it has received FCC approval in the U.S. to begin selling its first BlackBerry device, the 850, with mobile email.
1984: Research In Motion
1992: Jim Balsillie
1997: RIM goes public on the
2005: RIM hits four million
is founded by University of
joins RIM. He would
Toronto Stock Exchange.
subscribers, Balsillie and
Waterloo engineering student
become co-CEO along with
Lazaridis are named among
Mike Lazaridis and University
Lazaridis.
Time magazine’s 100 most
of Windsor engineering student Douglas Fregin.
influential people.
23
RESEARCH IN RIM BRANDING BOOK
2007: RIM becomes the
2010: RIM surpasses 40
2013: Heins finally unveils
most valuable company
million users and announces
BlackBerry 10 and the first
on the TSX with a market
it has shipped its 100
two smartphones to use the
capitalization surpassing
millionth smartphone. It buys
operating system, the Z10 and
$67 billion. The company
Ottawa-based QNX Software
Q10. The company purchases
has 10 million subscribers
Systems, which would help
a Super Bowl ad to build hype
and introduces the first of its
reshape its operating system
for the new company, which
Curve BlackBerrys. But RIM
software going forward.
officially changes its name to BlackBerry.
is caught flat-footed by the overwhelming response to Apple’s new iPhone.
2008: RIM stock hits a high
2012: Lazaridis and Balsillie
2020: RIM rebrand itself to
of $149.90 in June but the
step down as co-CEOs and are
find another business market.
euphoria is short lived.
replaced by Thorsten Heins.
The stock market crash in
Balsillie also resigns from
September takes its shares
the board of directors. Within
below $50.
months Heins announces 5,000 layoffs and a delay to the critical BlackBerry 10 software update.
RESEARCH IN RIM BRANDING BOOK
24
OUR MISSION IS TO BE A PROVIDER OF SECURITY AND INFORMATION FOR INDIVIDUALS AND COMPANIES.
25
RESEARCH IN RIM BRANDING BOOK
RESEARCH IN RIM BRANDING BOOK
AUDIENCE
26
27
Daniel Lawyer 35 years old
RESEARCH IN RIM BRANDING BOOK
Daniel
1. Has a lot of confidential cases. 2. He is familiar with underground deals. 3. He will do anything to win the case. 4. Amulance chaser 5. He has a lot of friends who have power. 6. He is cheating on his wife. 7. Owns a big house, and he is a president of PTA.
Daniel is a lawyer that care about privacy and information security because in his carrer and life, he faces a lot of cases about information security. In his mind, information security is very important to everyone when digital world is coming. He also care about his security because he doesn’t want anyone stolen his information and identity.
“It used to be expensive to make things public and cheap to make them private. Now it’s expensive to make things private and cheap to make them public.”
28
RESEARCH IN RIM BRANDING BOOK
William CEO 40 years old
William
1. Wants to protect his company and work from other corporate spies. 2. Wants to make sure the company holdings are secure. 3. He does not sleep well because he was worried about enemies. 4. He has a lot of bank accounts. 5. He likes to buy expensive car. 6. Global travel a lot 7. He had taken confidential information to build his business in the past.
William is a company CEO. Information security for him is so important because in his company and life, he need keep his personal and company information in high safety. He doesn’t want his information shared or stolen by other people.
“Once you’ve lost your privacy, you realize you’ve lost an extremely valuable thing.”
29
Rachel Celebrities 25 years old
1. She goes to parties every night. 2. She has a lot of boyfriends. 3. Loves fashion and labels. 4. Wants her personal life privacy. 5. She doesn’t care what people think of her. 6. Her parents can’t get hold of her. 7. She has a bad temper.
RESEARCH IN RIM BRANDING BOOK
Rachel
Rachel is a celebrites, but it doesn’t mean she does not need privacy. Actually, she need more information protection than normal people. A lot of hackers try to hack her personal information for profit. The paparazzi is very interesting to sell her information to publication.
“I need more private space and time. Stop try hacking my computer, my phone.”
30
RESEARCH IN RIM BRANDING BOOK
Sarah Uber driver 35 years old
Sarah
1. Uses her phone every day to pick up riders. 2. Bank account linked to Uber so she can get paid. 3. She is tired everyday, and driving is a dangerous job. 4. She likes to meet new people. 5. She is not married. 6. Only works in the day time because it is safer. 7. Saving money to buy condo.
Sarah is an uber driver, actually she is very care about her online security because all of uber money transfer through the internet. She is also worried about her mobile security. If her phone or computer get hacked, she will get real risk to lose her money.
“I am worried about my iphone and account security because every money transfer through internet and app.�
31
Andrew Politician 50 years old.
RESEARCH IN RIM BRANDING BOOK
Andrew
1. Always in the public eye, Paparazzi would love to get a hold of him. 2. Doesn’t want his private information hacked. 3. Has political enemies. 4. Travels a lot to campaign. 5. Has to keep the government secret. 6. On weekend, he drives to the beach and running. 7. He likes to spend time with family.
Andrew is a politician. He works in the government office. He needs highly security for his peronal information and office information. He has a lot of secrets that he doesn’t want other person to see or know. Once his personal information is hacked, he might lose everything includes family and jobs.
“All human beings have three lives: public, private, and secret.”
32
RESEARCH IN RIM BRANDING BOOK
Joseph Software Engineer 23 years.old
Joseph
1. Knows how to hack into things, and wants to make sure he can’t get hacked into. 2. Everyday he will spend a lot of time on the computer. 3. He likes to eat fast food. 4. Doesn’t have girlfriend 5. He doesn’t like socialize. 6. Works long hours and sleep in the office. 7. Has a good paid from company.
Joseph is a computer programmer, his career is protect the internet safety. He doesn’t want the program which is designed by him is hacked or cracked by hacker. He wants to design the program as safety as he can.
“I am always keeping update of the software because that is a way to fix problem and make it harder for hacker.”
33
Cynthia Student 21 years old
RESEARCH IN RIM BRANDING BOOK
Cynthia
1. Text and chats a lot on phone 2. Likes to use social media 3. She doesn’t like reading. 4. She thinks tattoo is very cool and wants to take one. 5. She likes night clubs and drinking. 6. She wears make up everyday. 7. She likes to going to the mall.
Max Retire 65 years old
1. Not well versed with technology 2. Has no family 3. He is in the medical insurance. 4. He likes to listen news from radio. 5. He likes eating oatmeal in the morning. 6. Lives in the nursing home. 7. He changes his clothes every 3 days.
Max
RESEARCH IN RIM BRANDING BOOK
PAST RIM
BUSINESS, CLASSIC, TRANDITIONAL
34
35
RESEARCH IN RIM BRANDING BOOK
RESEARCH IN RIM BRANDING BOOK
FUTURE RIM
SECURE, INFORMATION, SAFE, TECHNOLOGY
36
37
RESEARCH IN RIM BRANDING BOOK
38
RESEARCH IN RIM BRANDING BOOK
COMPARATIVE ANALYSIS GRID RIM will use the price and versatility as the key words to analysie the brand comparative strength. RIM campare with IBM, Samsung, Apple and so on to see the opportunity of rebrand. Ultimately, RIM will be a high price and high versatility for customers.
Higher Price
Apple RIM/After
google Microsoft IBM
Higher
Lower Xfinity
Versatility Samsung
Oracle
Frontprint RIM/Before
Lower Price
Protect America
Versatility
39
RESEARCH IN RIM BRANDING BOOK
RIM will also use the secure and control as the analysis key word because after rebranding, Rim will be a control, powerful, and secure brand to protect information security.
More Control
Microsoft Apple
RIM/After
IBM
Samsung
Lower Secure
Xfinity
Higher
Oracle
Secure
Frontprint Protect America
RIM/Before
Less Control
40
RESEARCH IN RIM BRANDING BOOK
REFORGE A SHIELD
DENTITY
41
RESEARCH IN RIM BRANDING BOOK
IDENTITY
IDEN
RESEARCH IN RIM BRANDING BOOK
WHAT: Brand will provide securites and information for individuals and companies in the future world. WHY: The information security need protect in the future technology world For Who: Individuals, company, government
42
43
RESEARCH IN RIM BRANDING BOOK
IDENTITY OF RESEARCH IN MOTION Brand Overview: Research In Motion specializes in highly secure software and hardware. The focus is on wireless technology, including point-of-sale terminals, wireless modems and pagers to keep business and individuals information safe.
THE BRAND SOUL: TO BE A PROVIDER OF INFORMATION SECURITY IN THE FUTURE WORLD.
+ RIM =
44
RESEARCH IN RIM BRANDING BOOK
EXCLUSION ZONE 2X
7X
2X
5X
0.6X
5X
X
X
The exclusion zone refers to the area around the logo which must remain free from other copy to ensure that the logo is not obscured. As the diagram indicates, the exclusion zone is equal to that blue square.
45
There are three versions of the RIM logo use at different sizes. The relationship between the two or three elements of the logo must be the same as shown for all versions.
ICON+TYPE
ONLY TYPE
ONLY ICON
RESEARCH IN RIM BRANDING BOOK
46
RESEARCH IN RIM BRANDING BOOK
SIZE & CLEAR SPACE To standardize the use of the tag, three sizes are provided for most uses—50 pixels high for web banners and e-mail headers, .875” high for printed materials, and 72 pixels high for large pages. These sizes should be considered the minimum size for print/Online uses. For printed communication, add .125” to the top or bottom of the red field to cover bleed.
50 px
0.875 inch
72 px
47
RESEARCH IN RIM BRANDING BOOK
ONLY ICON
Web/app
A5
A4
A3 or larger
ONLY TYPE
ICON+TYPE
48
RESEARCH IN RIM BRANDING BOOK
BRAND COLOR PALETTE
R93 G129 B151
R158 G210 B241
R192 G202 B211
R130 G141 B149
R192 G202 B211
R39 G13 B0
C65 M37 Y26 K10
C35 M5 Y0 K0
C23 M13 Y10 K0
C46 M32 Y28 K30
C5 M63 Y74 K0
C35 M60 Y60 K90
5405C
297C
5435C
5415C
021C
80%
60%
40%
20%
The corporate color system reflects a safety, dynamic, multi-dimensional RIM. RIM uses the blue color as the sea and cold grey as primary color to represent security feeling. Orange color is limited use only for dangerous, compelling or competitive meaning.
49
ONE COLOR LOGO
TWO COLORS
RESEARCH IN RIM BRANDING BOOK
50
RESEARCH IN RIM BRANDING BOOK
INCORRECT USE Do not alter the Research In Motion logo in any way. Do not animate, color, rotate, skew, or apply effects to the logo. Do not separate the elements. Never attempt to create the logo yourself, change the font, or alter the size or proportions.
RESEARCH IN MOTION RESEARCH IN MOTION
RIM RIM
RESEARCH IN MOTION
RESEARCH IN MOTION
51
USAGE EXAMPLE
HIGH SECURITY
RESEARCH IN RIM BRANDING BOOK
52
RESEARCH IN RIM BRANDING BOOK
Tungsten
Aa
ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz
0123456789 12 pt
RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.
14 pt
RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.
16 pt
RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.
12 pt
RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.
14 pt
RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.
16 pt
RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.
53
RESEARCH IN RIM BRANDING BOOK
Aa
Vitesse
ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz
01 2 34 5678 9 12 pt
14 pt
16 pt
12 pt
14 pt
16 pt
RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.
RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.
RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD. RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.
RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.
RESEARCH IN MOTION PROVIDE SECURITY FOR FUTURE WORLD.
54
RESEARCH IN RIM BRANDING BOOK
Aa Aa Mobile messaging presents several security and compliance challenges, especially to organizations in regulated industries, such as government, financial services and healthcare. Concerns over data leakage, cyber surveillance and industrial espionage have forced some CIOs to restrict or even prohibit this popular and productivityaccelerating form of communication and collaboration.
Vitesse can use for both body text and header.
HEADLINE Tungsten is always used for the headline.
SECURE MOBILE MESSAGING Mobile messaging presents several security and compliance challenges, especially to organizations in regulated industries, such as government, financial services and healthcare. Concerns over data leakage, cyber surveillance and industrial espionage have forced some CIOs to restrict or even prohibit this popular and productivityaccelerating form of communication and collaboration.
Example of type composition
55
RESEARCH IN RIM BRANDING BOOK
USAGE EXAMPLE
INFORMATION SECURITY Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take.
IT security Sometimes referred to as computer security, Information Technology security is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory. Such devices can range from non-networked standalone devices as simple as calculators, to networked mobile computing devices such as smartphones and tablet computers. IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems. Information assurance The act of ensuring that data is not lost when critical issues arise. These issues include, but are not limited to: natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost. Since most information is stored on computers in our modern era, information assurance is typically dealt with by IT security specialists. One of the most common methods of providing information assurance is to have an off-site backup of the data in case one of the mentioned issues arise.
RESEARCH IN RIM BRANDING BOOK
Graphic Elements The idea of graphic elements design is based on shield shape, I sepreate the shield to lines, square and triangle. I try to make it highly contrast with lines and shapes to represent technology feeling.
56
57
RESEARCH IN RIM BRANDING BOOK
RESEARCH IN RIM BRANDING BOOK
58
59
RESEARCH IN RIM BRANDING BOOK
60
RESEARCH IN RIM BRANDING BOOK
This is what we do.
ENSION
61
RESEARCH IN RIM BRANDING BOOK
EXTENSION
EXTE
62
RESEARCH IN RIM BRANDING BOOK
WHAT WE DO?
INDIVIDUAL PRIVATE SECURITY
INDIVIDUAL PUBLIC SECURITY
SOCIETY PRIVATE SECURITY
PUBLIC PUBLIC SECURITY
63
RESEARCH IN RIM BRANDING BOOK
PRIVATE
PUBLI C
S OC I E T Y Home Automation
Message Secure_1
Video Games_5
Security_2/4 Risk Management_2/4
Identity System_1/2/7
Bank Vault_3
Credit Company_2/4
Event about Food Safety_6
Child ID Profile_2/4/5
In Defense of Violent
Game Firewall_2/3
Evidence Storage_7
Password Manager_2
Company Cybertalk_2/3
Email Protection_2
Airport Security_2/4/7
GPS location protect_1
Office Privacy Training_5
IT Magzine_2/3 Whisper Communication_1 Future Credit Card_1 Art Security_2
Wireless Router_1
Conference About Info Safe_6
Cyber Security
Transport Database
Insurance_2
of Passenger_2/4
Cloud backup_2
Law Service_2
Video about protecting SSN_5 Supply Chain Security_2
Institution_5 Privacy Message App_1
IN DI V I D UAL
Online Vendor Provider Security_2
High Sercurity Wireless Router_1
Network Threat Actor_2
Anti-Virus Software_1/2
[1] product [2] service [3] environment [4] experience [5] educational opportunity [6] event [7] co-branding opportunity
64
RESEARCH IN RIM BRANDING BOOK
Product Complete Home Security Identity System Privacy Message App High Sercurity Wireless Router GPS location protect System Bank Vault Anti-Virus Software
Environment Bank Vault Database Center Self-defense Training Disaster Shelter Natural Food Market
Co-branding Opportunity Identity System Driver School Program Airport Security Evidence Storage
Service Identity System Credit Company Child ID Profile Risk Management Insurance Art Security Law Service Network Threat Actor Email Protection Online Vendor Provider Security
Event Event about food safety Conference About Info Safe
Experience Complete Home Security Credit Company Students Profile Analysis Risk Management
Educational Opportunity Child Safety Driver School Program School Emergency Training Video about protecting SSN
65
RESEARCH IN RIM BRANDING BOOK
[RIM_Shield_Cyber Security Insurance] _ RIM Cyber Security Insurance is an insurance service used to protect businesses and individual users from Internet-based risks, and more risks relating to information technology infrastructure and activities.
[RIM_Shield_Child ID Profile] _ The child’s personal information is protected by law. RIM Child ID Profile is a sevice that help schools to collecting children Identity information that the ID theft can’t steal them to get benefit.
[RIM_Shield_Institution] _ RIM educational institution is focused on the Cybersecurity Skills Crisis. We have the strongest skill professers and equipments for students who want to work in information security professionals.
[RIM_Shield_Conference About Info Safe] _ RIM Conference is a world wide event and presentation that about how to protect information serurity. In the conference, people will discuss the newest technology of IT protection. The conference is host every 2 years.
[RIM_Shield_Identity System] _ RIM Secure Identity System has face scanner and video analysis system that offer both proactive and reactive protection against identity theft.
[RIM_Shield_Credit Company] _ RIM Credit Company is a full suite of online tools to help you take control of your credit and protect your identity from the ID theft. We also help people to start monitoring the good credit you’ve worked hard to build.
[RIM_Shield_Network Threat Actors] _ RIM Threat actors are using increasingly advanced malware designed to evade traditional signaturebased protections, network security monitoring tools and even some sandbox technology. In addition, RIM Threat actors detect and/or respond to a major information security breach.
[RIM_Shield_Law] _ RIM LAW will provide the legal assistance for informtaion security such as IT security, supply chain security and so on.
[RIM_Shield_Supply Chain Security] _ RIM Supply Chain Security enables the enterprise to take full advantage of rapid globalization through secure integration with critical supply chain partners, connecting disparate processes and diverse technology, and allowing supply chain activities to flow seamlessly.
[RIM_Shield_Evidence Storage] _ RIM Evidence Storage is co-branded with US police that protect the evidence room. It is a system that build on the high security evidence database. It is also a service that protect the evidences both on the database and physical.
RESEARCH IN RIM BRANDING BOOK
[RIM_Shield_GPS Location Protect] _ it is a good feature in mobile device which allows people can share the location in particular. But at the same time, the hacker will track you easily. RIM GPS protection will let you save your locations.
66
[RIM_Anti-Virus Software] _ RIM Anti-Virus is a powerful protection software from infections and other files which can harm personal data stored over your devices.
[RIM_Shield_Video about protecting SSN] _ It is an educational video about protecting SSN. In the video, RIM will give the tips that how people can avoid SSN stolen risks.
[RIM_Shield_Wireless Router] _ RIM Wireless Router is the strongest router to protect home network security from hackers. It comes equipped with enterprise-grade network security, so you never even have to think about network security.
[RIM_Shield_Airport Security] _ RIM Airport Security refers to the techniques and methods used in protecting passengers, staff and aircraft information. We are not only designed the equipment, the more is building the data information for the airport.
[RIM_Shield_IT Magzine] _ It is a magzine focused on technology and software program. The computer engeneers are our main target audiences. The magzine is collecting all information of IT protect knowledge.
[RIM_Shield_Credit Card of Future] _ It’s all-in-one electronic card lets users store all of their credit and debit cards on RIM Card. RIM Card use the fingerprint protect your credit card information.
[RIM_Shield_RIM Cloud] _ Storing private data in the cloud requires an inconvenient devotion to balancing security and usability. We provide the most privacy backup for the customers.
[RIM_Shield_Password Manager] _ RIM Password Manager installs as a browser plug-in to handle password capture and replay. Automatic password changing by fingerprint, Yubikey, and more.
[RIM_Shield_Whisper Communication] _ RIM Whisper Communication is a very strong encrypted voice and calls application for people who care about privacy.
67
RESEARCH IN RIM BRANDING BOOK
[RIM_Message Secure] _ RIM Message is protecting your phone number and personal messages and photos. Text anyone with a free new phone number without exposing your private number. With RIM Message, protecting your privacy is easy. Text anyone with a free and real number.
[RIM_Shield_Colocation] _ RIM Colocation offer a range of customizable hybrid solutions for the different business requirements. From single cabinets to large private suites, data modules, or a hybrid solution of both, we can engineer the highest security space for IT environment.
[RIM_ Shield_Email Security] _ All emails are secured automatically with endto-end encryption. This means even we cannot decrypt and read your emails. As a result, your encrypted emails cannot be shared with third parties. No personal information is required to create your secure email account.
[RIM_Shield_Transport Database of Passenger] _ RIM Transport is protecting their passengers, staff and their assets is of paramount importance, and increasingly so. Whether on buses, trains or trams, indeed on any passenger transport, combating crime and dealing with the fall-out of crime is a major concern, fraught with challenges.
[RIM_ Shield_Risk Management] _ RIM Risk Management is created as a response to the growing need for quality IT & Cyber Security professional services. We are offering expert guidance and support in Cyber Security, IT Security, Risk Management, IT Forensic Services.
[RIM_Shield_In Defense of Violent Video Games] _ A lot of researches have long shown a cause-effect relationship between television violence and aggression among children and youth who watch it. RIM will host a campaign for both youth and parents that help children get away from video violent.
[RIM_Shield_Bank Training] _ RIM bank security trainning and education should be provided and employees should fully understand the act and their working rules.
[RIM_Shield_Home Automation Protect] _ RIM Home is a device that protect your smarthome from hackers and stalkers. Our mission is keeping your home private and safety.
[RIM_Shield_Company CyberTalks] _ RIM Cyber Talks is a presentation to guide CEO and business manager the knowledge about cybersecurity and how to protect your company information security.
[RIM_Shield_Game Firewall] _ RIM Game Firewall is a service for game company to protect players’ in-game information and register information. It is including game data analysis.
RESEARCH IN RIM BRANDING BOOK
68
69
RESEARCH IN RIM BRANDING BOOK
There are only two types of companies: those that have been hacked, and those that will be. — Robert Mueller FBI Director, 2012
RESEARCH IN RIM BRANDING BOOK
70
71
RESEARCH IN RIM BRANDING BOOK
0.1 RIM SHIELD HOME RIM Home is a service that protect your smarthome from hackers and stalkers. Our mission is keeping your home private and safety.
RESEARCH IN RIM BRANDING BOOK
RIM HOME PROTECT ALL OF YOUR CONNECTED HOME DEVICES FROM MALWARE, VIRUSES AND ANY CYBER ATTACKS WHILE KEEPING YOUR PRIVACY INTACT.
72
73
RESEARCH IN RIM BRANDING BOOK
RESEARCH IN RIM BRANDING BOOK
0.2 RIM ANTI-VIRUS RIM Anti-Virus is a powerful protection software from infections and other files which can harm personal data stored over your devices, not only computers and laptops but for also smartphones like iPhone and iPad. It gets quick update and provides faster scanning features to find out about various threats in your smartphone.
74
75
RESEARCH IN RIM BRANDING BOOK
RESEARCH IN RIM BRANDING BOOK
76
77
RESEARCH IN RIM BRANDING BOOK
REAL TIME PROTECTION DEFENDS AGAINST NEW AND EMERGING VIRUSES, SPYWARE AND MORE. URL ADVISOR INFORMS YOU ABOUT THE REPUTATION AND SECURITY OF WEBSITE LINKS.
RESEARCH IN RIM BRANDING BOOK
78
79
RESEARCH IN RIM BRANDING BOOK
0.3 RIM WIRELESS ROUTER RIM Wireless Router is the strongest router to protect home network security from hackers. It comes equipped with enterprise-grade network security, so you never even have to think about network security. RIM Wireless comes equipped with enterprise-grade network security, so you never even have to think about network security.
RESEARCH IN RIM BRANDING BOOK
80
81
RESEARCH IN RIM BRANDING BOOK
ROUTER SECURITY SCAN Scans your router for any security vulnerabilities and recommends options for improving protection.
MALICIOUS SITE BLOCKING Restricts access to known malicious websites in the Trend RIM database for always-up-to-date protection.
RESEARCH IN RIM BRANDING BOOK
0.4 RIM NETWORK THREAT ACTOR RIM Threat actors are using increasingly advanced malware designed to evade traditional signature-based protections, network security monitoring tools and even some sandbox technology. In addition, RIM Threat actors detect and/or respond to a major information security breach.
82
83
RESEARCH IN RIM BRANDING BOOK
RESEARCH IN RIM BRANDING BOOK
CYBERTHREAT REAL TIME MAP 2020.10.18 _ 0 9 : 3 0 p m
84
85
RESEARCH IN RIM BRANDING BOOK
RIM NETWORK DETECIVE, ANALYSIS, AND PROTECTION FROM THE GOLBOL CYBER ATTACKS.
RESEARCH IN RIM BRANDING BOOK
0.5 RIM SHIELD IDENTITY As identity thieves continue to find new ways to steal and use information, identity theft product offerings must continuously evolve to protect customers against all forms of identity theft. Secure Identity Systems has patented products that offer both proactive and reactive protection against identity theft. The Identity system will protect you even at home so that you can know is that a real postman?
86
87
RESEARCH IN RIM BRANDING BOOK
Joseph 32 years old Postman Married / 1 child Address: 930 sutter st. Apt 325. San Francisco. Ca. 94109 Phone: 415. 798. 217 Identity Approved No Threat Found
88
RESEARCH IN RIM BRANDING BOOK
0.6 RIM SHIELD EMAIL All emails are secured automatically with end-to-end encryption. This means even we cannot decrypt and read your emails. As a result, your encrypted emails cannot be shared with third parties. No personal information is required to create your secure email account. By default, we do not keep any IP logs which can be linked to your anonymous email account. Your privacy comes first.
INBOX SO MUCH NEW P. PARKER
0.7 RIM EMAIL
RIM EMAIL V 1. RIM EMAIL VIA CRASHLYTICS
I FOUND A WAY PETER PAN
89
0.10 IS READY!
Y BACK HOME
RESEARCH IN RIM BRANDING BOOK
RESEARCH IN RIM BRANDING BOOK
0.7 RIM SHIELD BANK TRAINING Cyber threats to finalcial institutions and other national critical infrastructure is real and growing at alarming rate. RIM bank security trainning and education should be provided and employees should fully understand the act and their working rules. RIM bank training will help employees understand the information security and privacy in bank.
90
91
RESEARCH IN RIM BRANDING BOOK
RESEARCH IN RIM BRANDING BOOK
AFTER RIM BANK TRAINNING, BANK EMPLOYEES WILL GIVE THE CUSTMORS BEST SERVICE AND PRIVACY PROTECTION.
92
93
RESEARCH IN RIM BRANDING BOOK
RESEARCH IN RIM BRANDING BOOK
08. RIM SHIELD DATABASE RIM Collocation offer a range of customizable hybrid solutions for the different business requirements. From single cabinets to large private suites, data modules, or a hybrid solution of both, we can engineer the highest security space for IT environment.
94
95
RESEARCH IN RIM BRANDING BOOK
RESEARCH IN RIM BRANDING BOOK
EVEN NATURAL DISASTERS CAN’T DESTROY RIM DATABASE CENTER.
96
97
RESEARCH IN RIM BRANDING BOOK
RESEARCH IN RIM BRANDING BOOK
ypography
0.9 RIM SHIELD CONFERENCE RIM Conference is a world wide event and presentation that about how to protect information serurity. In the conference, people will discuss the newest technology of IT protection. The conference is host every 2 years.
98
99
RESEARCH IN RIM BRANDING BOOK
100
RESEARCH IN RIM BRANDING BOOK
Information Screen
Fingerprint Password
101
RESEARCH IN RIM BRANDING BOOK
10 RIM SHIELD CREDIT CARD It’s all-in-one electronic card lets users store all of their credit and debit cards on RIM Card. RIM Card use the fingerprint protect your credit card information.
RESEARCH IN RIM BRANDING BOOK
SECURITY RIM credit card use the fingerprint to protect your personal informtaion. Auto locks when the card leaves you 5 feet.
SIMPLE RIM credit card is designed to combine your whole bank cards in one high security card.
102
103
RESEARCH IN RIM BRANDING BOOK
RESEARCH IN RIM BRANDING BOOK
104
105
RESEARCH IN RIM BRANDING BOOK