Zero trust use case

Mammoth Cyber

Enterprise access browser-based zero trust
My role: Principal product designer

About the service and competition

Secure Remote Access for Applications With An Enterprise Access Browser. Appaegis provides full control of remote user access back to the enterprise IT team. It secures cloud infrastructure access by combining browser isolation, identity, and authorization. Appaegis leverages an Enterprise Access Browser to eliminate operational complexity, enhance security and protect against malicious actors.


Upon joining the company, I received shared feedback from the users about the UX and usability, expressing a desire for a more sensible and practical solution. After conducting a thorough analysis of the product's UX and interactions, I identified several issues, starting with the dashboard. Users struggled to navigate through the widgets and find viable scenarios to understand the problems and how to solve them. This made it difficult for them to see how the product could address real user needs. Additionally, adding policies was another significant usability challenge that slowed task performance.

My Role

I focused on enhancing the UI for the Appaegis administrator user experience. This involved identifying and implementing improvements to the end-to-end user design process. Specifically, I concentrated on the following objectives to enhance the overall user experience:

  • Creating user onboarding experience
  • Improving configuration workflows and UI navigation by reducing clicks and logically grouping
  • Creating policy experience from app page
  • Explicitly showing the value of the solution by reorganizing the dashboards to align the product strengths
  • Designing the UI with scalability in mind, ensuring that new features can be added without cluttering
  • Mentoring junior designers
  • Dashboard-flow

    To ensure a comprehensive and effective design process, I began by thoroughly researching the product and consulting with key stakeholders, including founders, product managers, and solution architects. This process provided valuable insights into the issues we aimed to address, the benefits of our solution, and user feedback.

    With a deeper understanding of the solution and customer expectations, I reviewed existing write-ups, user stories, and action items to prioritize tasks and inform product design and development processes. I scheduled regular meetings with both the design and development teams to discuss ongoing projects and determine which initiatives required redesign or a fresh start.

    To facilitate the design process, I introduced design thinking methodology to the organization's design team and implemented design sprints for developing or redesigning features. Interactive designs were created to allow for sharing and iterative feedback from "real" users, further enhancing the user experience. Overall, these actions were critical in ensuring a cohesive, user-centric approach to product design and development.


    Use case sample: Data Loss Protection (DLP)

    Data breach happens in every organization. It becomes very important for enterprises to deploy some Data Loss Protection (DLP) features to monitor and stop data breach from attacks or accidental leaks.


    • Creating user onboarding experience
    • Search in various file type: Support pdf. word, excel, spreadsheets, identity true file type
    • Detect PII information in files: We should allow customers to select what kind of PII info they want to monitor
    • userstory-2


      Through the implementation of various UX improvements, I was able to achieve several positive outcomes for the product. This included enhancing UI navigation by reducing clicks and grouping related configurations logically. Workflow experiences were also improved, and UI design was scaled accordingly.

      By creating a dashboard that aligned with user and product expectations, I was able to enhance the value of the solution. This included incorporating elements such as visibility, discoverability, and usability to enable users to perform tasks and reach their goals. The new approach to the product involved the "Secure Remote Access for Applications Using An Enterprise Access Browser" method, with a more intuitive UI and analytics that covered the story of "who" accessed "what" and "where".

      To ensure an effective dashboard design, I implemented various best practices. These included providing quick access to essential information, prioritizing data, and displaying information in a clear visual hierarchy on one screen. The design offered a coherent overview that included sparse, clear initial data with additional opportunities to drill down for more. Additionally, charts, tables, and forms were displayed in a minimized view with the ability to bring up more details in a modal window or go to a page with more details. Finally, the use of filters allowed users to customize how data is displayed and filter content using labels and categories. Overall, these improvements resulted in a more user-friendly and efficient product experience.




      Analytic dashboard

      We created a dashboard to presents data in a visually appealing way, allowing users to quickly and easily monitor conditions and gain insights. By using visual elements such as charts, graphs, and tables, help users understand large amounts of data at a glance. From our experience working with admins, we have learned that they place a high value on having a useful dashboard that enables them to quickly make informed decisions based on data.

      Dashboards provide an easy way to identify trends, anomalies, and patterns in data, which can be crucial for effective decision-making. By having the right information at their fingertips, admins can act quickly and confidently, which is essential in today's fast-paced business environment.


      We shared our new dashboard design approach with admins to validate and measure usability. This helped us make informed decisions on how to effectively communicate useful information through widgets. This data analytics dashboard provides a comprehensive view of the security settings, allowing to monitor the health of your system. With detailed information on user activity, location, and accessed resources, you can quickly identify any potential security threats and take necessary action.