A B2B product design project rethinking how cybersecurity teams monitor and manage risk, evolving a static dashboard into a dynamic system that visualizes threat lifecycle, actions taken, and trust metrics.

Overview

TYPE

SaaS Product Design

ROLE

Lead Product Designer

TOOL

Figma

SKILL

UI/UX Design, User Research, Data Visualization

project snapshot

Goal

Challenge

Outcome

Goal

Create a dashboard that clearly shows how URLs and domains move through the three lifecycle phases, connects related data sources, and presents high-level insights that are both easy to understand and actionable for faster decision-making.

Goal

Challenge

Outcome

Goal

Create a dashboard that clearly shows how URLs and domains move through the three lifecycle phases, connects related data sources, and presents high-level insights that are both easy to understand and actionable for faster decision-making.

Goal

Challenge

Outcome

Goal

Create a dashboard that clearly shows how URLs and domains move through the three lifecycle phases, connects related data sources, and presents high-level insights that are both easy to understand and actionable for faster decision-making.

Goal

Challenge

Outcome

Goal

Create a dashboard that clearly shows how URLs and domains move through the three lifecycle phases, connects related data sources, and presents high-level insights that are both easy to understand and actionable for faster decision-making.

IMPACT ANALYSIS

Three core metrics reveal how the redesign improved user engagement, reduced errors, and boosted clarity.

Three core metrics reveal how the redesign improved user engagement, reduced errors, and boosted clarity.

URL & DOMAIN LIFECYCLE

This lifecycle diagram maps how monitored domains move between states. Suspicious, Phish/Scam, and Clean, through scanning, takedown actions, and ongoing monitoring.

Scan Pre-Malicious

Scan Pre-Malicious

Scan Pre-Malicious

Takedown Malicious

Takedown Malicious

Takedown Malicious

Monitor Post-malicious

Monitor Post-malicious

Monitor Post-malicious

Visibility into emerging risks

Quantify suspicious activity before it escalates.

1/

Scan

Pre-MALICIOUS

INSIGHTS TO uncover

1/ How much low-risk data transitioned to high-risk during a given period?

2/ How much suspicious data did we detect for the user?

Effectiveness of takedowns

Measure how well threats are being addressed and neutralized.

2/

TAKEDOWN
MALICIOUS

INSIGHTS TO uncover

1/ How effectively is Bolster addressing threats?
2/ How much high-risk data has been successfully taken down?

Resurgence of threats

Track clean domains or data reverting back to suspicious or malicious states.

3/

monitor
post-malicious

INSIGHTS TO uncover

1/ How much clean data became risky again?
2/ Which clean domains reverted to suspicious or malicious states?

Problems to Solve

Visibility into emerging risks

Quantify suspicious activity before it escalates.

Visibility into emerging risks

Quantify suspicious activity before it escalates.

Visibility into emerging risks

Quantify suspicious activity before it escalates.

1/

1/

1/

Scan

Pre-MALICIOUS

Scan

Pre-MALICIOUS

Scan

Pre-MALICIOUS

INSIGHTS TO uncover

INSIGHTS TO uncover

INSIGHTS TO uncover

1/ How much low-risk data transitioned to high-risk during a given period?

2/ How much suspicious data did we detect for the user?

1/ How much low-risk data transitioned to high-risk during a given period?

2/ How much suspicious data did we detect for the user?

1/ How much low-risk data transitioned to high-risk during a given period?

2/ How much suspicious data did we detect for the user?

Effectiveness of takedowns

Measure how well threats are being addressed and neutralized.

2/

2/

2/

TAKEDOWN
MALICIOUS

TAKEDOWN
MALICIOUS

TAKEDOWN
MALICIOUS

INSIGHTS TO uncover

INSIGHTS TO uncover

INSIGHTS TO uncover

1/ How effectively is Bolster addressing threats?
2/ How much high-risk data has been successfully taken down?

1/ How effectively is Bolster addressing threats?
2/ How much high-risk data has been successfully taken down?

1/ How effectively is Bolster addressing threats?
2/ How much high-risk data has been successfully taken down?

Resurgence of threats

Track clean domains or data reverting back to suspicious or malicious states.

3/

3/

3/

monitor
post-malicious

monitor
post-malicious

monitor
post-malicious

INSIGHTS TO uncover

INSIGHTS TO uncover

INSIGHTS TO uncover

1/ How much clean data became risky again?
2/ Which clean domains reverted to suspicious or malicious states?

1/ How much clean data became risky again?
2/ Which clean domains reverted to suspicious or malicious states?

1/ How much clean data became risky again?
2/ Which clean domains reverted to suspicious or malicious states?

dashboard audit

Overuse of Purple

Nine data feeds in similar shades created confusion.


Hard-to-Read Numbers

Large digit formats reduce readability and make data harder to interpret quickly.


Lack of Clear Correlation

The interactive bar graph updates the Live Scanned Domain section, but this connection is not visually conveyed.


Static & Disconnected Cards

Cards remain static and disconnected, offering no visual cues about how data moves or transitions between lifecycle stages.


Hidden Live Scanned Domain Section

Due to the screen height, part of the [Live Scanned Domain] section is hidden, reducing its immediate visibility and making it harder for users to notice changes when interacting with the bar graph.

01

01

01

01

02

02

02

02

03

03

03

03

04

04

04

04

05

05

05

05

06

06

06

06

07

07

07

07

08

08

08

08

09

09

09

09

Design

Adaptive. Connected. Insight-Driven.

The Web Module redesign connects previously scattered threat data into a single, narrative-driven view. Each widget is reimagined to clarify relationships, visualize domain movement, and surface the most critical insights first—empowering security teams to identify, investigate, and act without hesitation.

The Web Module redesign connects previously scattered threat data into a single, narrative-driven view. Each widget is reimagined to clarify relationships, visualize domain movement, and surface the most critical insights first—empowering security teams to identify, investigate, and act without hesitation.

01

Final Design

The redesigned layout guides the eye logically—from monitoring coverage, to lifecycle transitions, to operational impact. Dynamic interactions connect related data, ensuring users always understand the “what” and “why” behind each number.

02

Smart Leaderboard

Less critical context, such as feed rankings and coverage depth, is condensed into a slim leaderboard. This lets users see the bigger picture without distraction. Mini circle graphs double as navigation—linking directly to deeper lifecycle breakdowns.

03

Data Feed Cards

Each feed now has an interactive card showing its contribution across lifecycle phases. Users can instantly compare performance or investigate anomalies without leaving the main view.

04

Lifecycle Funnel

Replaced the static funnel with a Sankey-inspired diagram that shows exactly how domains progress between Pre-Malicious, Malicious, and Post-Malicious states—making the lifecycle tangible and trackable.

05

Trends & Change Insights

A dedicated widget surfaces percentage shifts, emerging threats, and movement trends within each phase. This change context answers the “what’s new?” question without extra clicks.

06

Progress Tracker with Directional Cues

This design exploration uses progress bars and directional arrows to make state changes instantly visible. The tracker quantifies transitions between lifecycle stages—such as Suspicious to Malicious or Malicious to Clean—while arrows guide the eye through the flow. The combination of visual progress and directional indicators helps users quickly grasp both the scale and direction of change without deep-diving into raw numbers.

07

Alternative Exploration

Explored replacing the bar graph with clean, numeric data cards. This simplified the visual load and allowed users to see key metrics at a glance. Each card is interactive and can be filtered by data feed for more focused monitoring. While the approach improved clarity, the lack of visual variety made the interface feel overly static and number-heavy.

08

Micro-Timeline for Deep Dives

For granular cases, a domain-level timeline logs every status change, supporting investigation and audit needs.

09

Full Flow Overview

A complete lifecycle flowchart view ties together all monitoring data, change activity, and takedown progress into one operational snapshot.