Home
About us
Products
Partners
Knowledge Base
Press Office


Logotypes

Dual-color logo, for use on a light background.
download EPSdownload jpgdownload png

Monochrome logo, for use on a dark background.
download EPSdownload jpgdownload png

B/W logo, for use on a light background.
download EPSdownload jpgdownload png

B/W logo, for use on a dark background.
download jpgdownload png

Horizontal, dual-color logo, for use on a light background.
download EPSdownload jpgdownload png

Horizontal, monochrome logo, for use on a dark background.
download EPSdownload jpgdownload png

Horizontal, B/W logo, for use on a light background.
download EPSdownload jpgdownload png

Horizontal, B/W logo, for use on a dark background.
download jpgdownload png

Please, refer to the Style Guide before using the logo to avoid any misunderstanding download pdf .

 

Didn't find something you were looking for? Need additional information? Please, get in touch with the Perimetrix Team!

 

White Papers

Perimetrix SafeSpace™
Full-spectrum confidentiality protection and data integrity
[pdf]

Secret Documents Lifecycle™
The New Generation of Corporate Secrets Protection Technology
[pdf]

 
Data Leaks: Fact & Figures

80% of efforts by companies to protect confidential data are spent in the form of technological protection from external threats: while 80% of attacks, presenting a serious threat to the business, were performed from within.
US Secret Service // Insider Threat Study

The risk of losing informational resources, due to internal threats, is on a rising tendency: 84% in 2007 vs. 59% in 2006.
PwC // Global State of information Security

75% of Fortune 500 companies have experienced problems with intellectual property theft.
Ponemon Institute // Cost of a Data Breach

87% of incidents are the fault of non-technical personnel - people who do not have specific computer skills. Only in 9% of the cases, those responsible for the incident were IT specialists.
CSI/FBI // Computer Crime Report

In 78% of incidents, insiders used legal access to the company's information resources, and in 43% of these incidents they used their personal logins and passwords. In 83% of the incidents, the attacks occurred in the workplace, and in 70% - during business hours.
CSI/FBI // Computer Crime Report