Challenge Summary

On this challenge you will be working on creating the initial concepts of a web based desktop application that will host the upcoming “Data Security Platform” of a large global company. This web app will provide a truly integrated platform for enterprise security and also provide a single management interface to allow security teams to centrally report, orchestrate their data security controls and uniformly enforce policies across a variety of data repositories, on-premises and in the cloud.

Round 1

For the first round provide the initial designs for the following screens:
4) Reporting
4.1) Security Manager Dashboards
4.2) Chief Information Security officer
4.3) Customized Report

- Important: As part of your checkpoint submission, you must upload your submission to MarvelApp so we can provide direct feedback on your designs.
- Please ask in the Forum for a MarvelApp prototype link. You will receive 1 MarvelApp prototype for Desktop.
- Make sure to include a URL/Link to your design within your "notes.txt", Important!
- Make sure all pages have correct flow! Use correct file numbering. (00, 01, 02, 03).

Round 2

For the first round provide the final designs for the following screens:
1) Login Page with Two factor Authentication:
2) Registration Page
3) Home Page
4) Reporting
4.1) Security Manager Dashboards
4.2) Chief Information Security officer
4.3) Customized Report
5) Settings Page

- Important: As part of your final submission, you must update your submission to MarvelApp.    
- Use the same MarvelApp prototype you received in checkpoint.
- Make sure to include a URL/Link to your design within your "notes.txt", Important!
- Make sure all pages have correct flow! Use correct file numbering. (00, 01, 02, 03).
Project Background
In view of the increased demand for security to clouds, our Client has decided to build a comprehensive data security platform (DSP). It will combine data protection capabilities such as sensitive data discovery, data loss prevention, encryption, data access governance, user behavior analytics, advanced threat detection, activity monitoring, and compliance reporting, and integrate with adjacent security technologies. They also provide a single management interface to allow security teams to centrally orchestrate their data security controls and uniformly enforce policies across a variety of data repositories, on-premises and in the cloud.

The platform is targeting to address the following challenges faced by organizations:
  • No single pane of glass view of data security solutions for customers
  • Lack of standardized end to end data security controls and services
  • Expertise required for integration of third-party solutions like Discovery, DLP, Encryption, Tokenization, Masking

Design Focus
Your design concepts should focus on solving the following objectives:
  • Provide centralized reporting for data security
  • Allow users to generate their own customized reports  with drill down / filter options
  • Allow users to change the layout of the reports (grid options), download as image, email
  • Provide a role based model for users to have access to resources (data / reports etc) based on their role requirements

Role Based Dashboard
A role-based dashboard is available in addition to a user's personal dashboard.   A role-based dashboard can be customized to match the needs and interests of users with that role. You can configure the contents of a role-based dashboard to meet the needs of users with that role. All role options needs to be configured with the drop down menu options where the respective dashboard would be flashed upon selection.

Workflow
The overall process can be resumed in the following three steps:

Step 1
- User Signup if he doesn’t already
- User Logins

Step 2
- After a successful Login, user lands into “Home Page” or main Dashboard.
- User can browse through the list of menu items. Respective pages will open when a specific menu item is clicked.

Step 3
- User start digging into all the data by hovering over the graphics, filtering, exporting and printing.

Users/Roles
Please make sure your design supports the following roles.
A) Security Manager
Platform Administration + Policy + Dashboard + security Event Management.
We will call him “Alex”; He is in the field and needs to have detailed information about the IT security.  So he has access to a lot of security data and tools.

B) Chief information security officer
Should have access to High-level access Security dashboard and performance of security tools.
We will call him “John”; He doesn’t have as much access as “Alex”, because he is more concerned with a high level overview of the information security.

C) Admin
Global access to this application. Add/Edit/Remove users and roles, check for app status, setup and settings.

Screens/Features
While the following screens are a starting point, please feel free to add any other screen that actually improves your UX based on your concept.

1) Login Page with Two factor Authentication
App must integrate with an existing login mechanism. Typically this involves integration with the following features:
  • Email
  • Password
  • Recovery Password
  • Remember user
Two-factor user authentication must be implemented here to provide enhanced security:
- OTP will be received from SMS or Authenticator
- Keep a Text box to enter OTP and Verify

2) Registration Page
Refer to this screenshot for content reference.
Make this page looks elegant with same look and feel you have been working in overall app style.

3) Home Page
  • This homepage will be the starting point and main navigation flow that will take the user to the different levels of features for this application.
  • Think on a “Launchpad” view with “shortcuts” to each section and feature on this app.
  • It must provide summary information all about the application, key feature information, overview of security aspects, contact & support notes. Should have options to include static text and images.
  • You can use the following images for content reference only, DO NOT Copy these layouts exacly. Remember we are looking to improve these.

4) Reporting
Under reporting menu, we will get two options.
i) Dashboard
ii) Customized Report
This page should be able to show up various reports. These reports will come from four data security domains viz. ‘Data Discovery and Classification’, ‘Data Loss Prevention’, ‘Encryption and Key Management’, ‘Data Access Governance’. There will be different dashboards presented based on the role of the user – CISO or Security Manager.

4.1) Security Manager Dashboards (KEY SCREENS!)
Security Manager (Alex)
They can able to see drill level details for  below modules. He is a typical manager who interacts with all users and use this details to grab content for day to day regular meetings.  For now we have 4 modules. It can be customized based on customer plans. So we need to design this dashboard to accommodate more modules in the future or it can be only a module. So your design should be designed in a way that it should fit for any number of modules. Keep a consistent layout.
This user will have access to the following tabs/subsections:
  • Data Discovery & Classification: Please check this link for content reference.
  • Data Loss Prevention: Please check this link for content reference.
  • Data Access Governance: Please check this link for content reference.
  • Data Encryption & key Management: There are not samples for this screen, so use a variety of charts and graphs previously created for all other screens.

Key Requirements to all tabs:
  • User should be able to filter Weekly, Monthly, Quarterly, Annually.
  • Ability to Print, Email and Export Data and Reports.
  • Ability to switch graphs on/off.
  • Ability to hover over a graph show more details.
  • Use the images as reference, we are looking to improve this graphics.

4.2) Chief Information Security officer
This is also an important page. This will be a higher level of customised page for CISO user. This should be simplified, executive level kind of stats/KPI metrics, text and tell a story about the details he wants to see.
Chief Information Security Officer (John)
  • Only needs access to a few graphs. Notice he doesn’t have any tabs/subsections. Just needs an overview of the key graphs and charts.
  • Please check this link for content reference.
4.3) Customized Report
User can use this page to customise the reports which is available in previous dashboard.
Refer to these screenshots for reference.
Results will be mostly graphs which can be exported as PDF, Image or email.

Steps
  • Users selects the Data sec domain ( refer Dashboard Section)
  • List of reports will be populated.
  • Users select the from the list of reports .
  • Parameters for the particular report will pop up
  • Users selects the list of the parameters on which he would like to see the report
  • Clicks on Run and Generate report.

5) Settings Page
This menu will be available to Admin. You just need to design landing page for admin. This page should have option to navigate to multiple settings.

For eg. You can show like Tiles with setting name/icon, or side navigation or open to your ideas.

 i) User Administration
ii) Security Tool Configuration
iii)System Health Checks

In future we might add more settings. So plan your admin page accordingly.

Use some icons to represent these settings options. We don’t need to design other details under each settings.

6) Help
- Need a help page which shows some help articles like How to do sections with text or video description.
- Keep a search box
- Add some dummy data for sample.

Form Factors
For this challenge you will be working on creating the design concepts for these form factors:
  • Desktop Web Application: Standard 1280px width and height increased if necessary.
  • Out of scope (DO NOT DESIGN)
    • Tablet portrait and landscape
    • Mobile portrait and landscape

Operating Systems
- Web Desktop Browsers

Final Deliverables
  • All original source files.
  • Files should be created in Adobe Photoshop and saved as a layered PSD file, Adobe Illustrator or as a layered AI file, Sketch or XD.
  • Marvel Prototype
    • We need you to upload your screens to Marvel App.
    • Please send your marvel app request to challenge copilot in the forum using the correct thread for this.
    • You MUST include your Marvel app URL as a text file in your final submission labeled “MarvelApp URL” (in your marvel app prototype, click on share and then copy the link).

Please read the challenge specification carefully and watch the forums for any questions or feedback concerning this challenge. It is important that you monitor any updates provided by the client or Studio Admins in the forums. Please post any questions you might have for the client in the forums.

How To Submit

  • New to Studio? ‌Learn how to compete here
  • Upload your submission in three parts (Learn more here). Your design should be finalized and should contain only a single design concept (do not include multiple designs in a single submission).
  • If your submission wins, your source files must be correct and “Final Fixes” (if applicable) must be completed before payment can be released.
  • You may submit as many times as you'd like during the submission phase, but only the number of files listed above in the Submission Limit that you rank the highest will be considered. You can change the order of your submissions at any time during the submission phase. If you make revisions to your design, please delete submissions you are replacing.

Winner Selection

Submissions are viewable to the client as they are entered into the challenge. Winners are selected by the client and are chosen solely at the client's discretion.

Challenge links

Screening Scorecard

Submission format

Your Design Files:

  1. Look for instructions in this challenge regarding what files to provide.
  2. Place your submission files into a "Submission.zip" file.
  3. Place all of your source files into a "Source.zip" file.
  4. Declare your fonts, stock photos, and icons in a "Declaration.txt" file.
  5. Create a JPG preview file.
  6. Place the 4 files you just created into a single zip file. This will be what you upload.

Trouble formatting your submission or want to learn more? ‌Read the FAQ.

Fonts, Stock Photos, and Icons:

All fonts, stock photos, and icons within your design must be declared when you submit. DO NOT include any 3rd party files in your submission or source files. Read about the policy.

Screening:

All submissions are screened for eligibility before the challenge holder picks winners. Don't let your hard work go to waste. Learn more about how to  pass screening.

Challenge links

Questions? ‌Ask in the Challenge Discussion Forums.

Source files

  • Layered PSD files created in Adobe Photoshop or similar
  • AI files created in Adobe Illustrator or similar
  • Sketch
  • XD

You must include all source files with your submission.

Submission limit

5 submissions

ID: 30100625