A feature that allows users to specify excluded ports and IP addresses, generates comprehensive scanning reports, and provides users with insights into scanning activity to reduce detrimental scanning results.
I designed a high-fidelity design for a cybersecurity platform that addresses 90+ customer reports.
I leveraged the company design system that functions across Android, Web, Windows, and iOS. Streamlined development handoff by collaborating cross-functionally with research and development, product, and engineering teams.
To comply with my non-disclosure agreement, I have omitted confidential information in this case study. All information in this case study is my own and does not necessarily reflect the views of Arctic Wolf.
The primary objective of this project was to address customer reports of issues stemming from scan activity and provide the ability for specific ports to be specified that should be excluded during an IVA scan so as to avoid issues with known detrimental scanning outcomes (e.g. printer malfunctions.)
We needed to learn more about how people share their personal experiences with others - what they share, and how they decide who to share with.
To ensure an in depth understanding of the user, I crafted a user flow to guide the research process. This strategic approach allowed for comprehensive user surveys, insightful interviews, and effective usability testing, all contributing to a more user-centered cybersecurity solution.
Research on this project consisted primarily of speaking with targeted users including: Members of the Security Team Developers (S2 team), Managed Risk Users, and Concierge Service Team (CST) to understand their workflow and understand which features would be most important for them to do their job most efficiently.
To better understand our user, we created an interview plan that outlined:
We used this research plan to conduct user interviews with participants that fit our persona.
I conducted a thorough competitive analysis, diving into the strategies of industry peers to gain deeper insights into user expectations and industry standards. This research informed our design decisions, ensuring our cybersecurity solution not only met but exceeded user needs.
Through our research, we determined a few key goals that created a seamless and effective features for a scan exemption tool.
I created 4 initial versions of low-fidelity wireframes and brainstormed some ideas and features to ensure the designs would address users in their user goals.
Throughout my entire design process, I would actively present my designs at design reviews to receive iterative feedback. Below is the first review I received that led to my first iteration of the scanner exclusion feature.
After iterating on the lo-fi designs, I began to design the high-fidelity designs and
The final design for the port scan exclusion feature provides users with a user-friendly solution. It offers an intuitive interface that allows users to easily specify excluded ports during scanning, giving them more control and transparency. This design seamlessly integrates into the existing system, enhancing the overall cybersecurity experience.
At this point the next steps are developing the feature and pushing it to S2 first. After the feature is tested and used by these targeted users, it will be opened up to MR customers down the line.
Below are annotated designs for simplified development handoff.
To streamline the development handoff, I would continuously implement new feedback I was given. I ensured this by collaborating cross-functionally with research and development, product, and engineering teams, while leveraging the company design system and patterns. I also added annotations to my designs so that developers could easily understand the different features.
I presented my designs to key stakeholders including, the Senior Product Manager, Technical Lead Security Services, Architect Manager, R&D Lead, Senior Developer, Product Owner, and Lead UI Developer to receive vital feedback that defined many of the final changes I made to the design.
A key lesson I learned was to focus on the user. In my initial ideation and designs, I created many features and tools that were ultimately excess and futile. Understanding the user needs and goals effectively initially helped me narrow down to focus on only the key features that truly solved their problem. I also learned the value of continuous feedback and regular design reviews. These processes not only helped me spot misinterpretations and inefficiencies in my designs but also encouraged me to adopt a more collaborative approach by consulting with key stakeholders and subject matter experts.