Making the Invisible Visible
Web • IOS • Wireframes • Flowcharts • User Interface • Animation • Prototyping
Project Snapshot
The Big Idea
IoT brought billions of new devices into networks — cameras, sensors, medical machines, printers. Security teams were blind to risks. I created a living map that made the invisible visible — and gave teams clarity and confidence.
The Human Problem
At 2am, Complexity is the enemy
Too many Dashboards
Too many logs
Too many false alarms
My Role
I led UX design end-to-end: from research and strategy through flows, prototyping, and stakeholder alignment, partnering closely with PM, engineering, and security SMEs
The Evolution
We removed distractions and highlighted the main points to make data easy to understand.
BEFORE
Too many alerts, hard to focus.
AFTER
Clarity at a glance
Solution
An IoT Security Map — devices, roles, and risks in one view.
See every connection live.
Spot traffic and risks instantly.
Act directly on the map.
What was once constant alerts became a clear, living overview of security.
The Growth Potential
Analysts didn’t need more dashboards. They needed one clear view.
Device view — health, status, risk.
Connection view — traffic, exposure, detail.
The Resulting Design Principles
Clarity first. Legible at a glance.
Context always. Role, health, traffic visible.
Scale without noise. From hundreds to millions — never chaos.
The Experience, Alive
One map. Two perspectives.
See every connection in real time.
Grasp criticality at a glance.
Act without leaving the map
What was once endless alerts became a living, breathing view of security.
Key Features
Unified Map — Displays all devices, color-coded by health, clustered by location.
Devices Table — Provides a detailed, sortable list view of all devices with metadata for quick scanning
At-a-Glance Risk — Each device shows a Purdue level and vulnerability score.
Contextual Traffic View — Connections highlight traffic volume and risky or denied paths.
Inline Controls — Quick actions appear directly on the map without disrupting the flow.
From Sketch to System:
Icons designed to be clear at a glance, effective at small sizes, and consistent across the platform.
From Static to Actionable:
Goals: Turn maps into mission control
Inline actions replace passive visuals
Risks become triggers for immediate response
Flow: See it → Fix it T→ Move on
Final Design
Prototype in hand.
Leadership saw the map come alive, with devices, connections, risks.
Real time. Clear. Human.
The room leaned in. Support was unanimous.
The Human Impact
The IoT Security Map didn’t just show devices.
It became a decision-making tool that gave analysts confidence.
Proactive, not reactive — teams stopped chasing cleanup and started preventing risk.
Confidence unlocked — uncertainty gave way to clarity and faster action.
Adoption surged — security + IT aligned around one map.
Faster + sharper — less context-switching, fewer errors.
Built to grow — scalable for AI insights and automation.
Closing Notes
One map. One flow. From risk to action.
The IoT Security Map transformed scattered, multi-screen workflows into a single, unified experience. By combining Illumio’s policy engine with Armis’s device visibility, admins gained the ability to see every asset, spot risks, and act instantly — without ever switching context.
This project shows how user research, design strategy, and engineering collaboration can turn enterprise complexity into clarity at scale. Delivered in just 12 weeks (6 sprints), the Security Map improved usability today while establishing a scalable design framework for tomorrow’s integrations and growth.