Fortinet

Persona-driven reporting

Data Visualization

FortiDevSec - Security Reporting

FortiDevSec - Security Reporting

FortiDevSec - Security Reporting

FortiDevSec - Security Reporting

FortiDevSec - Security Reporting

FortiDevSec - Security Reporting

This story is about how persona-based design revolutionized our security reporting feature in FortiDevSec.

This story is about how persona-based design revolutionized our security reporting feature in FortiDevSec.

This story is about how persona-based design revolutionized our security reporting feature in FortiDevSec.

This story is about how persona-based design revolutionized our security reporting feature in FortiDevSec.

This story is about how persona-based design revolutionized our security reporting feature in FortiDevSec.

This story is about how persona-based design revolutionized our security reporting feature in FortiDevSec.

July 2023 - Oct 2023

Timeline

UX Designer & Researcher

Role

July 2023 - Oct 2023

Timeline

UX Designer & Researcher

Role

Before we delve into the security reporting, let’s start

Before we delve into the security reporting, let’s start

What is FortiDevSec?

What is FortiDevSec?

FortiDevSec is like a security spell for your code! This static code analyzer scans your code automatically, finding and advising fixes vulnerabilities before they cause trouble.

FortiDevSec is like a security spell for your code! This static code analyzer scans your code automatically, finding and advising fixes vulnerabilities before they cause trouble.

1

Code Scanning

1

Code Scanning

1

Code Scanning

1

Code Scanning

1

Code Scanning

2

Data Aggregation

2

Data Aggregation

2

Data Aggregation

2

Data Aggregation

2

Data Aggregation

3

Actionable Responses

3

Actionable Responses

3

Actionable Responses

3

Actionable Responses

3

Actionable Responses

Problem space

Problem space

From Data Deluge to Insights

From Data Deluge to Insights

FortiDevSec is like a security spell for your code! This static code analyzer scans your code automatically, finding and advising fixes vulnerabilities before they cause trouble.

FortiDevSec is like a security spell for your code! This static code analyzer scans your code automatically, finding and advising fixes vulnerabilities before they cause trouble.

1

Information overload

FortiDevSec scanning raw results was overwhelming and was making it difficult to identify and prioritise issues for different personas.

1

Information overload

FortiDevSec scanning raw results was overwhelming and was making it difficult to identify and prioritise issues for different personas.

1

Information overload

FortiDevSec scanning raw results was overwhelming and was making it difficult to identify and prioritise issues for different personas.

1

Information overload

FortiDevSec scanning raw results was overwhelming and was making it difficult to identify and prioritise issues for different personas.

1

Information overload

FortiDevSec scanning raw results was overwhelming and was making it difficult to identify and prioritise issues for different personas.

2

Missing the bigger picture

Lack of historical trends and comparative analysis obscured application performance and progress over time, making it difficult for stakeholders to understand security posture and make informed decisions.

2

Missing the bigger picture

Lack of historical trends and comparative analysis obscured application performance and progress over time, making it difficult for stakeholders to understand security posture and make informed decisions.

2

Missing the bigger picture

Lack of historical trends and comparative analysis obscured application performance and progress over time, making it difficult for stakeholders to understand security posture and make informed decisions.

2

Missing the bigger picture

Lack of historical trends and comparative analysis obscured application performance and progress over time, making it difficult for stakeholders to understand security posture and make informed decisions.

2

Missing the bigger picture

Lack of historical trends and comparative analysis obscured application performance and progress over time, making it difficult for stakeholders to understand security posture and make informed decisions.

“Numbers have an important story to tell. They rely on you to give them a clear and convincing voice. ― Stephen Few”

Impact

Impact

Empowered Users, Enhanced Security

Empowered Users, Enhanced Security

1

Reduced information overload

Introduced targeted data visualisation and personalized views.

1

Reduced information overload

Introduced targeted data visualisation and personalized views.

1

Reduced information overload

Introduced targeted data visualisation and personalized views.

1

Reduced information overload

Introduced targeted data visualisation and personalized views.

1

Reduced information overload

Introduced targeted data visualisation and personalized views.

2

Slashed search time by 2X with efficient filters

Offered a customizable, in-workflow filter view, preferred by developers. Reported spending half time searching for vulnerabilities.

2

Slashed search time by 2X with efficient filters

Offered a customizable, in-workflow filter view, preferred by developers. Reported spending half time searching for vulnerabilities.

2

Slashed search time by 2X with efficient filters

Offered a customizable, in-workflow filter view, preferred by developers. Reported spending half time searching for vulnerabilities.

2

Slashed search time by 2X with efficient filters

Offered a customizable, in-workflow filter view, preferred by developers. Reported spending half time searching for vulnerabilities.

2

Slashed search time by 2X with efficient filters

Offered a customizable, in-workflow filter view, preferred by developers. Reported spending half time searching for vulnerabilities.

3

Increased actionable insights by 50%

Actionable data points have been added to be consumed by each persona type.

3

Increased actionable insights by 50%

Actionable data points have been added to be consumed by each persona type.

3

Increased actionable insights by 50%

Actionable data points have been added to be consumed by each persona type.

3

Increased actionable insights by 50%

Actionable data points have been added to be consumed by each persona type.

3

Increased actionable insights by 50%

Actionable data points have been added to be consumed by each persona type.

Developer level

Goal:

Access detailed vulnerability information with powerful filtering (app, severity, type, etc.) and the ability to save filter presets.

Name: Cha eun-koo

Position: Senior software engineer

Product: Sodo IDE, Sodo Chrome plugin

Goal:

Access detailed vulnerability information with powerful filtering (app, severity, type, etc.) and the ability to save filter presets.

Name: Cha eun-koo

Position: Senior software engineer

Product: Sodo IDE, Sodo Chrome plugin

Organization level

Organization level

Goal:

Goal: Organization level real-time actionable insights & historical trends

Name: Rachel Chen

Position: Chief Information Security Officer (CISO)

Organnization: CloudTree

Goal:

Goal: Organization level real-time actionable insights & historical trends

Name: Rachel Chen

Position: Chief Information Security Officer (CISO)

Organnization: CloudTree

Goal:

Goal: Organization level real-time actionable insights & historical trends

Name: Rachel Chen

Position: Chief Information Security Officer (CISO)

Organnization: CloudTree

Goal:

Goal: Organization level real-time actionable insights & historical trends

Name: Rachel Chen

Position: Chief Information Security Officer (CISO)

Organnization: CloudTree

Goal:

Goal: Organization level real-time actionable insights & historical trends

Name: Rachel Chen

Position: Chief Information Security Officer (CISO)

Organnization: CloudTree

1

Threat Radar

Quickly identify the biggest threats volume such as OWASP, SANS 25 vulnerabilities, FortiOutbreak alerts, and supply chain threats.

1

Threat Radar

Quickly identify the biggest threats volume such as OWASP, SANS 25 vulnerabilities, FortiOutbreak alerts, and supply chain threats.

1

Threat Radar

Quickly identify the biggest threats volume such as OWASP, SANS 25 vulnerabilities, FortiOutbreak alerts, and supply chain threats.

1

Threat Radar

Quickly identify the biggest threats volume such as OWASP, SANS 25 vulnerabilities, FortiOutbreak alerts, and supply chain threats.

1

Threat Radar

Quickly identify the biggest threats volume such as OWASP, SANS 25 vulnerabilities, FortiOutbreak alerts, and supply chain threats.

2

Focus on Top 10 Vulnerable Applications

See list of your most vulnerable applications.

2

Focus on Top 10 Vulnerable Applications

See list of your most vulnerable applications.

2

Focus on Top 10 Vulnerable Applications

See list of your most vulnerable applications.

2

Focus on Top 10 Vulnerable Applications

See list of your most vulnerable applications.

2

Focus on Top 10 Vulnerable Applications

See list of your most vulnerable applications.

3

Visualise Risk Distribution

Your overall risk posture with a pie chart that shows the distribution of applications by risk level (Critical, High, Medium, Low).

3

Visualise Risk Distribution

Your overall risk posture with a pie chart that shows the distribution of applications by risk level (Critical, High, Medium, Low).

3

Visualise Risk Distribution

Your overall risk posture with a pie chart that shows the distribution of applications by risk level (Critical, High, Medium, Low).

3

Visualise Risk Distribution

Your overall risk posture with a pie chart that shows the distribution of applications by risk level (Critical, High, Medium, Low).

3

Visualise Risk Distribution

Your overall risk posture with a pie chart that shows the distribution of applications by risk level (Critical, High, Medium, Low).

4

Exposure Window

Treemap visualization to take action on ageing vulnerabilities.

4

Exposure Window

Treemap visualization to take action on ageing vulnerabilities.

4

Exposure Window

Treemap visualization to take action on ageing vulnerabilities.

4

Exposure Window

Treemap visualization to take action on ageing vulnerabilities.

4

Exposure Window

Treemap visualization to take action on ageing vulnerabilities.

5

Vulnerability Density

See how your overall vulnerability landscape is evolving.

5

Vulnerability Density

See how your overall vulnerability landscape is evolving.

5

Vulnerability Density

See how your overall vulnerability landscape is evolving.

5

Vulnerability Density

See how your overall vulnerability landscape is evolving.

5

Vulnerability Density

See how your overall vulnerability landscape is evolving.

6

Compliance Posture Overview

This widget shows the number of applications scanned and their compliance with key security standards over time.

6

Compliance Posture Overview

This widget shows the number of applications scanned and their compliance with key security standards over time.

6

Compliance Posture Overview

This widget shows the number of applications scanned and their compliance with key security standards over time.

6

Compliance Posture Overview

This widget shows the number of applications scanned and their compliance with key security standards over time.

6

Compliance Posture Overview

This widget shows the number of applications scanned and their compliance with key security standards over time.

7

Vulnerable Applications

Showing the trend of vulnerable applications by severity over time period selected.

7

Vulnerable Applications

Showing the trend of vulnerable applications by severity over time period selected.

7

Vulnerable Applications

Showing the trend of vulnerable applications by severity over time period selected.

7

Vulnerable Applications

Showing the trend of vulnerable applications by severity over time period selected.

7

Vulnerable Applications

Showing the trend of vulnerable applications by severity over time period selected.

Application level

Application level

Goal:

View an actionable overview of current security metrics and insights into the security trend of my application.

Name: Vijay Reddy

Position: Technical Manager

Product: Sodo IDE

Goal:

View an actionable overview of current security metrics and insights into the security trend of my application.

Name: Vijay Reddy

Position: Technical Manager

Product: Sodo IDE

Goal:

View an actionable overview of current security metrics and insights into the security trend of my application.

Name: Vijay Reddy

Position: Technical Manager

Product: Sodo IDE

Goal:

View an actionable overview of current security metrics and insights into the security trend of my application.

Name: Vijay Reddy

Position: Technical Manager

Product: Sodo IDE

Goal:

View an actionable overview of current security metrics and insights into the security trend of my application.

Name: Vijay Reddy

Position: Technical Manager

Product: Sodo IDE

Application view

Application view

Application view

Application view

Application view

Application view

Showing widget from application view

Widgets from application view

Widgets from application view

Widgets from application view

Widgets from application view

Widgets from application view

Widgets from application view

1

Threat Radar

This widget displays the number of threats detected across OWASP, SANS, FortiGuard, and Supply Chain categories, comparing the latest scan results with the previous ones.

1

Threat Radar

This widget displays the number of threats detected across OWASP, SANS, FortiGuard, and Supply Chain categories, comparing the latest scan results with the previous ones.

1

Threat Radar

This widget displays the number of threats detected across OWASP, SANS, FortiGuard, and Supply Chain categories, comparing the latest scan results with the previous ones.

1

Threat Radar

This widget displays the number of threats detected across OWASP, SANS, FortiGuard, and Supply Chain categories, comparing the latest scan results with the previous ones.

1

Threat Radar

This widget displays the number of threats detected across OWASP, SANS, FortiGuard, and Supply Chain categories, comparing the latest scan results with the previous ones.

2

Application Risk Snapshot

Get application risk rating score with the distribution of vulnerabilities by severity.

2

Application Risk Snapshot

Get application risk rating score with the distribution of vulnerabilities by severity.

2

Application Risk Snapshot

Get application risk rating score with the distribution of vulnerabilities by severity.

2

Application Risk Snapshot

Get application risk rating score with the distribution of vulnerabilities by severity.

2

Application Risk Snapshot

Get application risk rating score with the distribution of vulnerabilities by severity.

3

Scan Comparison

Compare your latest scan (default: previous) to identify new threats, resolved issues, common vulnerabilities, and changes in the overall risk score.

3

Scan Comparison

Compare your latest scan (default: previous) to identify new threats, resolved issues, common vulnerabilities, and changes in the overall risk score.

3

Scan Comparison

Compare your latest scan (default: previous) to identify new threats, resolved issues, common vulnerabilities, and changes in the overall risk score.

3

Scan Comparison

Compare your latest scan (default: previous) to identify new threats, resolved issues, common vulnerabilities, and changes in the overall risk score.

3

Scan Comparison

Compare your latest scan (default: previous) to identify new threats, resolved issues, common vulnerabilities, and changes in the overall risk score.

1

Interesting finding

Interesting finding

Interesting finding

In the journey of refining our security dashboard, a pivotal moment arose when I engaged with application owners. A common thread emerged - a desire for a quick, comparative insight into their application's security standing.

Developer level

Developer level

Goal:

Access detailed vulnerability information with powerful filtering (app, severity, type, etc.) and the ability to save filter presets.

Name: Cha eun-koo

Position: Senior software engineer

Product: Sodo IDE, Sodo Chrome plugin

Goal:

Access detailed vulnerability information with powerful filtering (app, severity, type, etc.) and the ability to save filter presets.

Name: Cha eun-koo

Position: Senior software engineer

Product: Sodo IDE, Sodo Chrome plugin

Goal:

Access detailed vulnerability information with powerful filtering (app, severity, type, etc.) and the ability to save filter presets.

Name: Cha eun-koo

Position: Senior software engineer

Product: Sodo IDE, Sodo Chrome plugin

Goal:

Access detailed vulnerability information with powerful filtering (app, severity, type, etc.) and the ability to save filter presets.

Name: Cha eun-koo

Position: Senior software engineer

Product: Sodo IDE, Sodo Chrome plugin

Goal:

Access detailed vulnerability information with powerful filtering (app, severity, type, etc.) and the ability to save filter presets.

Name: Cha eun-koo

Position: Senior software engineer

Product: Sodo IDE, Sodo Chrome plugin

This view shows total vulnerabilities, severity distribution, compliance issues, resolved vulnerabilities, and offers flexible export options for developers.

This view shows total vulnerabilities, severity distribution, compliance issues, resolved vulnerabilities, and offers flexible export options for developers.

This view shows total vulnerabilities, severity distribution, compliance issues, resolved vulnerabilities, and offers flexible export options for developers.

This view shows total vulnerabilities, severity distribution, compliance issues, resolved vulnerabilities, and offers flexible export options for developers.

This view shows total vulnerabilities, severity distribution, compliance issues, resolved vulnerabilities, and offers flexible export options for developers.

This view shows total vulnerabilities, severity distribution, compliance issues, resolved vulnerabilities, and offers flexible export options for developers.

Reusable filter presets to save developers time and advanced filtering options by application, severity, type, and vulnerability age.

Reusable filter presets to save developers time and advanced filtering options by application, severity, type, and vulnerability age.

Reusable filter presets to save developers time and advanced filtering options by application, severity, type, and vulnerability age.

Reusable filter presets to save developers time and advanced filtering options by application, severity, type, and vulnerability age.

Reusable filter presets to save developers time and advanced filtering options by application, severity, type, and vulnerability age.

Reusable filter presets to save developers time and advanced filtering options by application, severity, type, and vulnerability age.

🎬Behind the Design

🎬Behind the Design

See how I explored user needs, iterated on solutions, and landed on the final design.

See how I explored user needs, iterated on solutions, and landed on the final design.

See how I explored user needs, iterated on solutions, and landed on the final design.

See how I explored user needs, iterated on solutions, and landed on the final design.

See how I explored user needs, iterated on solutions, and landed on the final design.

Conclusion

  • Dashboards are not suitable for every persona. Developers preferred a simple, flexible, and filterable view where vulnerability details were clear.

  • Adopting a phased delivery approach proved more effective for better user adoption.