Okta Threat Detection & Prevention

A 0 to 1 product that increased security incident detection and prevention by ~88%  

My Role:

Lead Product Designer

Team:

Product Manager, Engineering Lead, 7 Engineers

Date:

2021

Tools Used:

Figma, Miro, Usertesting.com, Pendo

Design Methods

User Research, Wireframing, UX Design, Service Design, UI Design, Prototyping

Impact

~88% increase in threat detection & prevention and ~84% improvement in user satisfaction with prevention measures

The Context

Okta is an identity and access management company. One of the main use cases for customers is companies using it to manage what their employees and wait they have access to

The Problem

We had no criteria checks in place after the successful log in has happened, which was leaving users vulnerable to security attacks and incidents

The Root Cause

Due to the national health crisis, many companies reported that they were still unable to send out company devices to new hires immediately, and the use of personal devices was often the catalyst for these security incidents, based on reports gathered by customer and sales teams.

Problem Validation

Conducted research in order to validate the problem

  • User Interviews
  • 5 customers
  • 5 non-customers
  • Competitive Analysis
  • Top competiters

Key Takeaways

Conducted research in order to validate the problem

  • Unmanaged devices are the most vulnerable to security incidents
  • Phishing attacks are the most common security incident
  • Okta Admins are uncertain what security best practices were and often not following them
  • “Good users” regularly mistaken for bad actors, effecting their experience

Gereral Personas based on Research

Competitive Anaylysis

Current Employee Log In Experience

How might we create a way for Okta admins at Small and Medium businesses to accurately detect and prevent security attacks post login?

Ideating

Potential "Happy Path" Employee Log In Experience

Using internal feedback to go from sketches to higher fidelity

Defining MVP Experience Requirements

As we started defining the main pain points we wanted to address, we were able to define requirments

  • Risk Configurations Policy (Decided to add risk configs in an existing policy)
  • The ability to continuously assess security (Create an API for 3rd party security tools)
  • Give Okta Admins a place to monitor avoided security threats

Success Metrics

We'll know this product is successful if:

  • We're able to detect and prevent security incidents at a rate higher than our competitor; 76% +
  • End users are able to understand prevent being mistakenly identified as a security incident

MVP Solution

  • An updated authentication policy that includes conditions and outcomes for initial authentication and continuous authentication
  • A risk ecosystem dashboard for Okta Admins to be able to monitor security incidents and utilized 3rd party security tools for an added level of security
  • A modified end-user experience that reflects the authethentication policy choices made by the admi

Updated Authentication Policy

Risk Ecosystem Dashboard for Okta Admin

Modified End User Experience based on Okta Admin Configuration

Below is a demo of an end user whose account has been flagged as high risk with the risk ecosystem. The okta admin has created requirements that if this user logs in through a low-risk app, they can use a tier 2 authentication method, but when they attempt to open a high-risk area, like the admin console, they will be required to re-authenticate again using a tier 1 authentication method.

The Impact

4 Sprints

Launched MVP by Oktane event deadline

~88%

threat detection and prevention rate

~84%

positive user satisfaction with threat prevention

Photo of Anna enjoying a drink
Let's chat!

Do our missions align? Shoot me an email and let's chat