From brainstorming to a winning product

From brainstorming to a winning product

Project case-study, cyber risks visualization dashboard

Project case-study, cyber risks visualization dashboard

Project case-study, cyber risks visualization dashboard

Team Lead

Team Lead

Team Lead

Ideation Workshop

Ideation Workshop

Ideation Workshop

User Experience

User Experience

User Experience

Innovation

Innovation

Innovation

1

1

1

4

Months

Project Duration

Weeks

Project

Duration

2

Ideation
Brainstorming

Ideation

Brainstorming

3

Weeks

Design Iterations

1

Innovative

Product of the Year

Innovative

Product of

the Year

Background and Context

Background and Context

As a UX Lead at Aman Digital, a specialized product design agency, I led the comprehensive redesign initiative for SkyBox Security’s cybersecurity management platform.

SkyBox Security, established in 2002, serves Global 2000 enterprises and government agencies with advanced cybersecurity solutions that provide visibility and intelligence across complex network infrastructures

My Role

My Role

Team Leadership

Led a team of UX/UI designers, providing guidance and support.

Project Management

Managed project timelines and served as a main point of contact for clients.

Ideation Facilitation

Facilitated team ideation brainstorming sessions to generate creative solutions.

Architecture Development

Developed the information architecture and interaction models for the project.

The Challenge

The Challenge

The Challenge
SkyBox Security’s product team identified an opportunity to consolidate capabilities from two existing products into a unified dashboard solution. This new product would serve dual purposes: creating an intuitive network visualization tool for sales demonstrations and providing managers with comprehensive network oversight capabilities.

Strategic Business Objectives

  • Product Consolidation: Merge functionality from two legacy products into a single, more powerful solution

  • Sales Enablement: Develop a compelling demonstration tool that clearly communicates SkyBox’s value proposition

  • Management Dashboard: Create an executive-level view of network security posture and operations

  • Market Positioning: Strengthen SkyBox’s competitive advantage in the cybersecurity management space

Key Design Considerations

Audience Segmentation
The dual-purpose nature of this product requires careful consideration of distinct user groups:

  1. Sales Professionals: Need clear, visually compelling representations of network security data that effectively communicate value to prospects

  2. Security Managers: Require comprehensive, actionable insights for operational decision-making and risk assessment

Technical Complexity Management
SkyBox Security’s platform integrates with over 120 networking and security technologies, creating significant challenges in data visualization and user experience design. The dashboard must simplify this complexity while maintaining the depth of information required for effective cybersecurity management.

The Challenge
SkyBox Security’s product team identified an opportunity to consolidate capabilities from two existing products into a unified dashboard solution. This new product would serve dual purposes: creating an intuitive network visualization tool for sales demonstrations and providing managers with comprehensive network oversight capabilities.

Strategic Business Objectives

  • Product Consolidation: Merge functionality from two legacy products into a single, more powerful solution

  • Sales Enablement: Develop a compelling demonstration tool that clearly communicates SkyBox’s value proposition

  • Management Dashboard: Create an executive-level view of network security posture and operations

  • Market Positioning: Strengthen SkyBox’s competitive advantage in the cybersecurity management space

Audience Segmentation
The dual-purpose nature of this product requires careful consideration of distinct user groups:

  1. Sales Professionals: Need clear, visually compelling representations of network security data that effectively communicate value to prospects

  2. Security Managers: Require comprehensive, actionable insights for operational decision-making and risk assessment

Technical Complexity Management
SkyBox Security’s platform integrates with over 120 networking and security technologies, creating significant challenges in data visualization and user experience design. The dashboard must simplify this complexity while maintaining the depth of information required for effective cybersecurity management.

The Challenge
SkyBox Security’s product team identified an opportunity to consolidate capabilities from two existing products into a unified dashboard solution. This new product would serve dual purposes: creating an intuitive network visualization tool for sales demonstrations and providing managers with comprehensive network oversight capabilities.

Strategic Business Objectives

  • Product Consolidation: Merge functionality from two legacy products into a single, more powerful solution

  • Sales Enablement: Develop a compelling demonstration tool that clearly communicates SkyBox’s value proposition

  • Management Dashboard: Create an executive-level view of network security posture and operations

  • Market Positioning: Strengthen SkyBox’s competitive advantage in the cybersecurity management space

Audience Segmentation
The dual-purpose nature of this product requires careful consideration of distinct user groups:

  1. Sales Professionals: Need clear, visually compelling representations of network security data that effectively communicate value to prospects

  2. Security Managers: Require comprehensive, actionable insights for operational decision-making and risk assessment

Technical Complexity Management
SkyBox Security’s platform integrates with over 120 networking and security technologies, creating significant challenges in data visualization and user experience design. The dashboard must simplify this complexity while maintaining the depth of information required for effective cybersecurity management.

Vision & Core Objective

Vision & Core Objectives

Vision & Core Objectives

Key Requirements

  • Entity Mapping Visualization

    • Provide an interactive, visual representation of all network entities (such as devices, servers, or endpoints).

    • Enable users to quickly identify the location and status of each entity within the network.

  • Risk Display per Entity

    • For every entity, present a clear overview of the various risks associated with it.

    • Each risk should be categorized and visually distinguished for easy recognition.

  • Severity Levels

    • Assign severity levels to each risk (e.g., Critical, High, Medium, Low), dynamically updated based on monitoring time and threat activity.

    • Highlight the current severity status.

  • Real-Time Data Integration

    • Ensure that risk and severity information is updated in real time as monitoring data is received.

Example Provided by the CTO
To illustrate the need, the CTO created a visual example:

Key Requirements

Entity Mapping Visualization

  • Provide an interactive, visual representation of all network entities (such as devices, servers, or endpoints).

  • Enable users to quickly identify the location and status of each entity within the network.

Risk Display per Entity

  • For every entity, present a clear overview of the various risks associated with it.

  • Each risk should be categorized and visually distinguished for easy recognition.

Severity Levels

  • Assign severity levels to each risk (e.g., Critical, High, Medium, Low), dynamically updated based on monitoring time and threat activity.

  • Highlight the current severity status.

Real-Time Data Integration

  • Ensure that risk and severity information is updated in real time as monitoring data is received.

Example Provided by the CTO
To illustrate the need, the CTO created a visual example:

  • The letters (A/B/C) - are entities

  • The shapes position on the A entity are the risk type.

  • Each shape can have different severity.

Cracking the concept

Cracking the concept

Ideation & Brainstorming

I brought together three talented designers and another UX architect for two focused brainstorming sessions. We explored a range of ideas, always keeping the end user’s needs at the center of our discussions.

Prototyping

Our first prototype represented each entity as a circle, with cyber risks mapped around the border-like the hours on an analog watch. Each risk’s position, shape, and color conveyed its type and status. This approach allowed us to:

  • Show multiple risks per entity at a glance

  • Use color and position to communicate urgency and type

  • Keep the map visually clean and consistent

Prototyping

Our first prototype represented each entity as a circle, with cyber risks mapped around the border-like the hours on an analog watch. Each risk’s position, shape, and color conveyed its type and status. This approach allowed us to:

  • Show multiple risks per entity at a glance

  • Use color and position to communicate urgency and type

  • Keep the map visually clean and consistent

Iterating to the Final Product

We refined the concept through user feedback and internal reviews.

The Final Product

The Final Product

Key improvements included:

  • Enhanced filtering options to help users focus on specific risks or entities

  • Clear legends and tooltips to explain the visual language

  • Creating the icons for the cyber risks

Key improvements included:

  • Enhanced filtering options to help users focus on specific risks or entities

  • Clear legends and tooltips to explain the visual language

  • Creating the icons for the cyber risks

Comparing Status Between Two Time Periods

Clear Legends and Tooltips

Entity Pop-over

Focusing on specific entity helps us communicate the concept better, by:

  • Show the cyber risks position with the name and the icon.

  • Show trends over time for each risk type.

Elevating Experience Across All Products

After successfully redesigning our first product, we didn’t stop there, we set out to bring the same thoughtful improvements to every product in our suit

What Changed, and Why It Matters

  • Our customers now enjoy a consistent experience from product to product, reducing confusion and boosting confidence.

  • A modernized design means clearer navigation, better accessibility, and a cleaner, welcoming interface.

Comparing Status Between Time Periods

Clear Legends and Tooltips

Focusing on specific entity helps us communicate the concept better, by:

  • Show the cyber risks position with the name and the icon.

  • Show trends over time.

Entity Pop-over

What Changed, and Why It Matters

  • Our customers now enjoy a consistent experience from product to product, reducing confusion and boosting confidence.

  • A modernized design means clearer navigation, better accessibility, and a cleaner, welcoming interface.

After successfully redesigning our first product, we didn’t stop there, we set out to bring the same thoughtful improvements to every product in our suit

Elevating Experience Across All Products

Feedback and ROI

Feedback and ROI

Business Value
The final solution help sales teams showcase the full value and benefits of Skybox product suite during customer demos.

Feedback and Recognition
Skybox Horizon demonstrates how thoughtful UX design can transform complex cybersecurity data into clear, actionable insights-empowering teams to protect their organizations more effectively. This commitment to innovation and usability was recognized when the Cyber Security Awards honored Skybox® Horizon as “Innovative Product of the Year” for 2016.

Key Takeaways from the Project

Key Takeaways from the Project

Leading the Skybox Horizon project highlighted the importance of teamwork and open brainstorming in generating creative solutions, while also demonstrating how patience and careful attention to detail are critical for turning complex cyber risk data into a user-friendly dashboard. Through this experience, I learned that successful digital products are built on both collaborative thinking and a commitment to refining every element for clarity and reliability.

© PinkDog. 2025

© PinkDog. 2025

3

Weeks

Design Iterations

1

Innovative

Product of the Year