Evolving a cybersecurity brand for enterprise growth


Overview

When Intruder needed to move upmarket from SMBs to enterprise customers, our playful retro brand, while beloved by smaller customers, risked appearing unserious to Fortune 500 CISOs.

I led our design team through a strategic brand evolution that maintained our distinctive personality while adding the polish and maturity needed to compete against vendors with 10x our resources.


Goals

Mature brand to appeal to revised target audience of enterprise scale customers.

Develop but retain Intruder’s distinctive brand identity.

Apply the revised identity across all brand touch points.


Role
Lead designer and project lead

Q4 2024
When

Product Design, Engineering, Marketing, Senior Leadership
Collaborators

Context and Team

Intruder had built a strong position in SMB vulnerability management with a distinctive retro gaming aesthetic that set it apart. But to achieve growth targets, they needed to win enterprise deals against established competitors like Tenable, Qualys, Crowdstrike and Rapid7.

The core tension: How does Intruder mature the brand enough to win enterprise trust without losing the personality that differentiated it in the first place?

Specific concerns from leadership:

  • Would Intruder be taken seriously at industry conferences next to major competitors?

  • Could Intruders’ visual identity hold up in lengthy enterprise sales cycles?

  • How does Intruder signal "enterprise-ready" without looking generic?

I was able to pull the full design team to focus on this, as well as having support from both Marketing and Engineering. My primary stakeholder for the project was the founder and CEO of Intruder.


The Problem

A lot of brand surfaces, like the marketing site, were dated and hadn’t kept up with the brands development. Before going any further we began by taking an inventory of brand assets so that they could be approached holistically.

Pixelated graphic of a yellow question mark block from Mario game series
Pixel art yellow alien with antennae plus white atomic symbol, with digital space background.
A webpage for an external vulnerability scanning service called Intruder. It features sections on how to scan your perimeter, customer testimonials, and key features like automated scanning, integration with cloud platforms, and keeping protection from unknown threats. The page includes buttons for free trials and tours, a demonstration screenshot of the scanner dashboard, and icons indicating infrastructure checks and 24/7 scanning.
A collection of pixel art icons related to technology, gaming, and communication, displayed in rows on a dark background.
Pixel art image of a bearded man wearing sunglasses with '2024' written below, against a dark background with scattered teal squares.
Web page screenshot of Intruder's OWASP Top 10 Vulnerability Scanner platform, featuring a main header, a call-to-action button 'Try for Free', a dashboard showing target scans, customer reviews, partner logos, a three-step setup guide, and information about vulnerability detection and remediation.
Pixel art style glowing light blue lightning bolt in the center with small pixelated light blue dots on a dark background.
Screenshot of Intruder cybersecurity website homepage with headline "Don’t get breached. Get Intruder." featuring navigation menu, call-to-action buttons, client logos, pixel art characters, and sections about asset discovery, vulnerability scans, attack surface protection, vulnerability management, and security features.
Screenshot of a cybersecurity dashboard displaying threat levels, issue statistics, activity logs, and network updates, with navigation menu on the left and data visualizations.

Research and Insight

Discovery & Validation

Rather than accepting the assumption that the brand was the blocker, I started by validating the problem:

  • Sales team interviews: Gathered feedback on deal objections and competitive positioning

  • Customer research: Spoke with existing enterprise customers and recent lost deals about perception.

  • Competitive audit: Analysed how competitors presented themselves at conferences and in enterprise sales materials

  • Internal brand audit: Mapped every touchpoint where the brand appeared - product, marketing site, sales decks, conference presence, support docs

Key insights: The feedback I got from Sales was that whilst the Product needed to scale to accommodate the size of the attack surface we were seeing with Enterprise customers, the brand’s retro aesthetic was curbing expectations of what the product itself was capable of. At the same time, they universally loved the brand’s character.

People who worked in cybersecurity were also, unsurprisingly, risk-averse, and we knew that our customers valued Intruder for the ‘Peace of Mind’ it offered them. This was the same for the enterprise-scale customers we already had; but the brand didn’t communicate this to them. The stakes were higher, and they couldn’t take a risk on something that didn’t pattern-match what they were looking for. Intruder appeared immature.

Even the company's name caused confusion at times. Intruders, or hackers, were called ‘threat-actors’ in the industry. The term wasn’t typically associated with stopping vulnerabilities. This led me to the conclusion that Intruder needed to predominantly communicate two things:

Intruder needed to mirror customers’ expectations of an enterprise-scale solution without sacrificing personality.

Intruder can offer Peace-Of-Mind at scale and must mature from ‘playful’ to ‘quietly confident’.

In a review of our competitors, we also noticed that many of our enterprise-scale competitors placed a much greater emphasis on marketing than we had historically. Intruder had tended to be very product-led, whereas our competitors focused much more on messaging. If we want to mirror them, we’d perhaps want to explore that shift too.

A digital diagram illustrating brand messaging interconnected with various website or app design mockups, categorized under brand, marketing, and product.

Strategic Framing

After the initial research and review I worked with leadership to establish some core brand principles to guide decisions. This really helped us thread the needle for who we wanted to be in a way which would keep us distinct from competitors:

A pixel art character holding a mug with steam, with a laptop or similar device in the other hand, standing on a dark blue background with text describing qualities of a brand character.
A webpage titled 'Voice and tone' discussing the voice and tone guidelines for a brand platform. The page has a section with text on the left explaining the importance of voice and tone, and a section on the right listing brand characteristics with corresponding descriptions: 'Identity' as 'Uncomplicated', 'Language' as 'Informative', 'Tone of voice' as 'Easy and reassuring', 'Characteristics' as 'Brave but reliable', and 'Motivation' as 'Independence'. There is also a pixel art illustration of a person with a newspaper on the bottom right corner. The top includes navigation links and the bottom has a yellow button labeled 'Read full guidelines'.

We then began to work on various concepts in light of the above, coming up with a range of directions that we could have explored. These were iterated on repeatedly in light of feedback from senior leadership, customer facing teams, and a sample of customers within our ideal customer profile.

Collage of images related to pixelation and retro video game culture, including a NES console diagram, a game controller, a pixelated Mario, LEGO bricks, pixel art of a face, artwork of lungs, and a pixelated portrait of a person.
A presentation slide titled "Immersive illustration" showing various examples of digital and graphic art, including a person with virtual reality headset, stylized portraits, abstract digital scenes, and a football player named Kane with 51 goals.
A collage of futuristic digital displays and interfaces, featuring various screens with data visualizations, control panels, and graphical elements in a high-tech style, with a black background and neon accents.
A detailed infographic titled 'Voxel: Combining the retro with the modern,' explaining the connection between retro gaming influences and modern design through concepts like 3D pixels, isometric projection, and pixel art. The infographic includes images of pixelated characters, game scenes, architectural sketches, and digital landscapes, illustrating the evolution of voxel-based art and design.
A collage of digital and graphic art images related to modern technology and gaming, including posters, 3D pixel art, neon graphics, and virtual reality elements.
A collage of various digital screens and scenes featuring futuristic and cyberpunk-inspired themes with neon lighting, holographic interfaces, cityscapes, and a gaming or control room environment.
Screenshot of a webpage titled 'Beyond words' from Intruder, featuring various graphic designs with bold typography, colorful backgrounds, and images of people, emphasizing the importance of typography in visual communication.
A digital design collage featuring futuristic UI elements, neon and dark-themed graphics, technology-inspired interfaces, and a car and robot image, with some text in bold and stylized fonts.

Solution and Execution

Visual Evolution

Color palette with three color swatches labeled Greg Yellow, Dark Blue, and Dark Teal, including their HEX, RGB, and CMYK codes.
Digital color palette featuring three color swatches with labels and color codes: Greg Yellow, Darkest Blue, and Blue.
A color palette featuring shades of teal, blue, red, purple, gray, and black, each labeled with its name, hex code, RGB values, and CMYK values.
Color palette chart showing seven colors: Flamingo, Magenta, Teal, Grey, Red, Orange, and Green, each with their HEX, RGB, CMYK, and HSL color codes.
Trade show booth for Intruder: cybersecurity brand, featuring digital displays, wall graphics with Pac-Man style characters, and informational panels about vulnerability management and threat monitoring.
Booth display promoting cybersecurity, with a TV screen, neon security icon, and tips for preventing breaches, titled 'Stop breaches before they start.'

What I kept:

  • Everyone loved Intruders logo, externally and internally, and the merchandise we produced featuring it was always extremely popular. As a result, I kept it’s Yellow as our accent colour.

  • Whilst I explored changing it, given time constraints and the range of debate around it, I made the decision not to fundamentally change Typography as part of this.

What I evolved:

  • I moved away from the pixel imagery to something more consciously drawing on synthwave and neon aesthetics. These deliberately evoked feelings of nostalgia but were received at the same time as contemporary by both external and internal stakeholders.

  • To achieve the above, and to work with Intruders yellow accent colour, we made a conscious effort to darken the overall background palette and brighten our foreground elements to create a clearer visual contrast.

  • I also consciously made a point to distinguish between the product and our marketing assets. With the latter, I relied less on product imagery and more on messaging, visualisations, and graphics. With the product itself, we consciously tried to formalise it to align more closely with enterprise customer expectations.

A collection of pixel art icons related to brand style and graphic elements, including charts, rockets, clocks, hearts, and various symbols.
A collection of neon-style digital icons representing various brand and user interface elements, including email, notifications, settings, alerts, user profile, health, information, code, and miscellaneous symbols, set against a dark background.

Marketing surfaces

The quickest to implement were the marketing assets we focused on these first using advertising campaigns to iterate on the assets and messaging we were coming up with in collaboration with the marketing team.

Digital illustration of a sun partially covered by stylized clouds with a neon glow, against a blue-green gradient background, with a blue stylized letter A in the lower left corner.
Neon-style digital illustrations of a cloud with a lightning bolt and the text 'AWS' with a smiley face beneath it on a dark gradient background.
Neon graphic illustrating bug hunting threats: one section labeled 'Local file inclusion - Credentials exposed' with a bug icon, another section labeled 'Subdomain takeover' with a different bug icon, connected by lines and a central abstract figure.
Screenshot of Intruder cybersecurity platform homepage, featuring a dark blue space-themed background, platform features, client logos, and customer reviews.
Promotional graphic with purple and blue background stating "Recap from our roundtable discussion at TEISS" in neon-style text, featuring headshots of a woman and a man, with abstract arrow designs.
Comparison chart for security plans including Essential, Cloud, Pro, and Enterprise, detailing features, scanning options, integrations, support, and pricing.

Core Product Updates

When it came to implementation within Intruder’s core product we published a revised version of Intruder’s Design System ‘Bits’ to facilitate this. This followed a revision of the explicit 12-column grid and a 4px implicit grid we used, including both primitive and semantic tokenisation.

The approach taken with the core product was to actually introduce a divergence between the marketing assets and the core product. We felt that when customers were actually monitoring for vulnerabilities we needed to present an interface that felt much more mature and inline with their expectations and experiences with enterprise scale tools. This ended up being reflected in the design system product as part of the project.

A diagram illustrating the CSS box model, including content, padding, border, and margin, with color codes and labels for each part.
Screenshot of a design system or style guide, showing variables related to spacing and colors, with categories like system, components, and color. It displays various spacing sizes and color options with corresponding labels and codes.

Technical collaboration

As I looked to have this implemented, I worked closely with engineering to:

  • Understand implementation complexity and technical constraints

  • Prioritise components that would have an immediate impact, ensuring they are built atomically with naming conventions aligned between the design system and our codebase.

  • Create documentation that makes handoff seamless

  • Balance comprehensiveness with adoptability (a simpler system that gets into use quickly beats a perfect one that comes in late or sits unused).

  • Ensure compatibility with our prior iteration of the Design System, to ensure we are not forcing total rewrites of the code to ensure a prompt delivery.

Icons labeled Atom, Component, Molecule, Organism, Template, Page, and Alien sprite from a user interface
Screenshots of digital documentation or web pages related to badges, pills, special pills, and tags, showing various layout sections, components, and descriptions.
A detailed wireframe of various user interface components and form elements, including text fields, card input, textarea, search bar, select menus, date picker, file picker, slider range, checkboxes, radio buttons, toggle switch, input groups, limited text field, and more, all organized in columns with labels and annotations.

Constraints and Trade-offs

The project had three major constraints associated with it:

Given team capacity, I made strategic trade-offs:

  • Deprioritised my IC product work to focus on creative direction and project leadership

  • Worked with leadership to selectively reduce or rotate the team's product workload during the rebrand

  • Identified which product projects aligned most closely with annual targets and maintained focus there.

  • Accepted that overall output would temporarily dip in exchange for long-term leverage

  • We could not add additional financial overhead to the business as a result of the brand refresh. Everything had to be done in-house. We therefore managed our expectations in terms of the kinds of graphics we could produce as part of this.

My role: I maintained creative vision throughout, directed visual strategy, and owned the design system implementation. One designer contributed significantly to asset creation under my direction, with two others contributing more selectively.

Rollout Strategy

Rather than attempting a big-bang launch, we phased rollout strategically and sequentially:

Budget: The project had no dedicated budget, and any solution we proposed couldn’t cost in any expenses on an ongoing basis. Everything produced had to be in-house. This led to us having to adapt the leading concept in the project to accommodate this.

Bandwidth: Whilst I called upon all of the design team to contribute to the project none of us were on the project full time. This meant I had to plan and rotate team members in and out depending on availability.

Phase 2 (Product Integration):

  • Design system + Portal tokens

  • Atomic approach to component revisions throughout the Design System and live Portal in collaboration with engineering.

Deadlines: Updating the public brand touch-points had a hard deadline. Whilst we could take longer to update the product itself we had to work to a reasonably aggressive deadline to meet the goal. This informed the time spent on assets to meet the timeline.

Phase 1 (High Impact):

  • Conference booth and marketing materials (critical for upcoming trade shows and allowing us to iterate across campaigns nased on performance before committing.)

  • Marketing website

  • Sales deck templates

Phase 3 (Long tail):

  • Report PDFs

  • Emails


Outcomes

Business Impact

In the year following launch of the revised brand surfaces we saw the following changes:

Enterprise revenue: Grew significantly by 52%, up from 13% the previous year. While we can't attribute this solely to the rebrand, sales reported that the evolved brand removed a key friction point in deals.

Conference presence: The rebrand immediately impacted Intruder’s ability to compete at industry events, pulling significantly more footfall than competitor brands. The CEO reported significant lead generation at events post-launch.

Design-to-development handoff: became more efficient. Reworks and the time to implement decreased dramatically. Tokenisation also enabled work to progress quickly on other requested features like variable themes.

Component reuse: reduced overheads in the team and enabled the team to take on multiple additional dedicated design projects in the following quarters.

Ongoing collaboration: between Design and Front-End engineering emerged. Since then, the two teams have converged significantly and the rate of output has continued to increase throughout the year.

The new design system had a practical effect of making it much quicker to generate designs for not just new features but new brand surfaces.

Screenshot of a cybersecurity dashboard showing threat levels, findings, issues, and scans. The threat level is critical, with recommendations to fix issues immediately. Data includes findings, issues, targets, checks, scans in progress, and activity updates, with specific issues like local file inclusion and vulnerable WordPress versions.

The new design system and the resultant tokenisation opened a lot of opportunities for variable theming that previously hadn’t been viable.

Internal confidence shift: Leadership's anxiety about moving upmarket transformed into confidence. Intruder was no longer perceived as an underdog but as a legitimate competitor who could earn facetime and demonstrate superiority over larger rivals.

The brand system proved flexible enough for external partners to use effectively. Working with Blublu, I provided guidelines and reviewed work to ensure brand continuity as they created promotional content.

Promotional video created by Blublu, art directed using the brand system. What I loved about this was how they were able to bring back in some of the isometric elements we’d originally explored.

Design System ROI

The design system investment paid off quickly:


Reflections

This was a fast moving project and was an opportunity to work closely with both the CEO and the marketing team at Intruder. Managing a wide range of stakeholders, maintaining a creative vision, whilst also being hands on in the implementation of the project required a lot of context switching, but frequently communication, a clear process, and demonstrating incremental wins proved crucial here.

The very real constraints on the project ultimately bred focus, the limited resources available meant I had to be ruthless when it came to prioritisation. Maintaining team moral and continuity of vision amidst the capacity constraints and pressure from stakeholders also became it’s own informal objective for the project alongside delivering on some ambitious goals.

The lasting impact, for me, were ultimately the systems we put in place. Putting in place a robust design system, or a reusable system of generating graphical assets set up the team to move faster in the time since the project concluded.