Work secure with to the cybersecurity tool

Impact

+23%

ACTVIVATION RATE

+48%

EFFICIENCY

+29%

BRAND SENTIMENT

INDUSTRY

Cibersecurity, IT



MY ROLE

I was the solo designer collaborating with a development team composed of ten developers within the company throughout the process



TIME TO DELIVER

3 Months

THE PROBLEM

Wefender needed to enhance their software experience:


  • It was difficult to use to the customer
  • The software was not appealing
  • The brand had a lack of consistency

THE CHALLENGE

  • Design a user-friendly interface that facilitates the use of a cybersecurity tool for a non-technical audience
  • Design the interface to prioritize the content and features that support the user's primary goals
  • Design a consistent and reliable brand image through all the digital product

Design process

DISCOVERY

We began the project by interviewing the organisation's stakeholders. Afterwards, we tested the actual software to discover the main issues that the actual SAAS had. Then, I analysed the competition to identify opportunities.

INSIGHTS

During our research phase, we identified several key problems. Firstly, user testing revealed that the setup process was not intuitive, even for technical users. We needed to simplify the language to improve understanding. Secondly, the design elements in the interface were ineffective at guiding users towards critical actions, such as creating accounts and sharing passwords.

DEFINITION

I started by creating a user story flowchart, followed by developing prototypes to explore different solutions. After sketching wireframes on paper, we built several low-fidelity prototypes of the final content. Testing these prototypes with five users helped us identify areas for improvement in the user experience (UX).

Look & Feel

EASY SET UP

The goal of the redesign was to make the cybersecurity modem easy for users to install

EFFICIENT PERMISSION MANAGEMENT

When a new user needs access to secure Wi-Fi, administrators must be able to create and manage permissions quickly and efficiently

RESPONSIVE ACCESS

The cybersecurity system is accessible from various devices, allowing an admin to share the password easily from a smartphone, even while having dinner with friends

Learnings

INVOLVING STAKEHOLDERS

The CEO, our main stakeholder, was highly involved in the research phase and clearly understood its value. This engagement was crucial for building confidence in our approach

TEAM BUILDING INICIATIVE

The different departments were working in silos, and Marketing and Development were not aligned. To address this, we organized a team-building workshop using creative methodologies

USING DATA TO AVOID BIAS

To counteract personal bias, it is important to present data. In our framework, we use data to validate our hypotheses, which helps change the overall mindset