INCIDENTRON - cyber-incident-reporting concept and platform for EU;
Want to win a job like this?
This customer received 169 logo designs from 69 designers. They chose this logo design from razertron as the winning design.
Join for free Find Design JobsLogo Design Brief
design logo and visual materials for project and brand - INCIDENTRON is about cyber-incident reporting, a platform and methodology support, mainly EU
consider using contents of an incident as part of the design (data breach, DDoS, ransomware, take-over, virus, ...). consider using concept of TRON (game/movie) as means to style.
Target Market(s)
regulated for companies to deliver a specific format to competent authorities, cybersecurity incident managers, CISOs, policy makers in the domain of cybersecurity, cybersecurity technical teams
Industry/Entity Type
cybersecurity
Logo Text
INCIDENTRON.eu
Logo styles of interest
Pictorial/Combination Logo
A real-world object (optional text)
Wordmark Logo
Word or name based logo (text only)
Lettermark Logo
Acronym or letter based logo (text only)
Font styles to use
Other font styles liked:
- OpenSans, Calibri, ...
Colors
Colors selected by the customer to be used in the logo design:
Look and feel
Each slider illustrates characteristics of the customer's brand and the style your logo design should communicate.
Elegant
Bold
Playful
Serious
Traditional
Modern
Personable
Professional
Feminine
Masculine
Colorful
Conservative
Economical
Upmarket
Requirements
Must have
- the name of the brand in it; a clearly readable typo. it should be fitting with typical CISO communication style business oriented, creative with a an angle - not creative for being creative; should refer to incident handling in the graphics
Nice to have
- incidentron will be a platform, technology, framework and a concept whereby cybersecurity incidents (breaches, attacks, data losses, ...) will be derived from data collection from system-events, and formated to be reported towards the competent authorities (in Europe under NIS2)
Should not have
- too many fringes, no keys/keyholes or other typical cybersecurity representations, think of