Case Study Access

Please enter the password to view this case study

PhishTitan Threat Detection Platform - laptop with dashboard interface

PhishTitan Threat Detection Platform

Role: UX/UI Designer

Duration: 3 months

Team: Product Owner, Technical PM, Engineers, Marketing, Operations & Security specialists

Background
Cybersecurity threats are evolving rapidly, and organizations need effective tools to detect and respond to phishing attacks. The PhishTitan Threat Detection Platform was designed to provide comprehensive threat intelligence and detection capabilities, helping security teams identify and mitigate phishing threats before they cause damage.
  • Responsibilities: UX/UI Design, User Research, Prototyping
  • Team: Product Owner, Technical PM, Engineers, Marketing, Operations & Security specialists
  • Tools: Figma, UserTesting, Miro

The problem

Security teams struggle to effectively detect and respond to phishing threats due to fragmented tools, lack of visibility, and overwhelming amounts of data. Existing solutions fail to provide clear insights and actionable intelligence, making it difficult for teams to prioritize and respond to threats efficiently.

Key goals:

  • Increase threat detection accuracy and reduce false positives
  • Create a unified platform that consolidates threat intelligence from multiple sources
  • Build an intuitive interface that makes complex threat data accessible and actionable

Process

Double Diamond design process diagram

Following the Double Diamond methodology, we moved through four key phases: Discover (Research, Synthesis), Define (Ideation), Develop (Prototyping), and Deliver (Testing, Implementation). This structured approach ensured we understood user needs deeply before designing solutions.

Discover

User Research

  • Conducted interviews with security analysts, IT administrators, and security managers
  • Observed users working with existing threat detection tools
  • Analyzed support tickets and user feedback from current platforms
  • Reviewed industry reports and threat intelligence trends

Insights

  • Security teams are overwhelmed by alert fatigue and need better prioritization
  • Users want contextual information that explains why something is a threat
  • Threat intelligence needs to be actionable, not just informative
  • Teams need to collaborate effectively when responding to incidents

Competitive Analysis

  • Analyzed leading threat detection platforms and their user interfaces
  • Identified gaps in visualization and data presentation
  • Studied how competitors handle threat intelligence and reporting

Findings

  • Most platforms focus on technical details but lack user-friendly visualizations
  • Threat data is often presented in isolation without context
  • Workflow integration is limited, requiring users to switch between multiple tools

Opportunity

  • Create a platform that combines comprehensive threat intelligence with intuitive design
  • Provide clear visualizations that help users understand threat patterns and trends
  • Enable faster decision-making through contextual information and actionable insights

Define

We mapped the ecosystem of users, their workflows, and information needs. This included creating user personas, mapping user flows for key tasks like threat investigation and response, and defining the information architecture that would support these workflows.

User personas
User flow diagram for threat detection and response

The information architecture was designed to support both high-level overview and detailed investigation workflows, ensuring users could quickly access the information they need at each stage of their work.

Design and Testing

Wireframing

Started with low-fidelity wireframes to establish layout and information hierarchy. Focused on creating clear visual hierarchy and ensuring key information was easily accessible.

Design Principles

  • Clarity over complexity - Make threat data easy to understand
  • Context is key - Always provide relevant background information
  • Actionable insights - Every piece of data should support decision-making
  • Consistent patterns - Use familiar UI patterns for security tools

Low-fidelity Prototyping

Created interactive prototypes to test core workflows, including threat investigation, email analysis, and threat intelligence exploration.

Low-fidelity Phishing Emails dashboard Low-fidelity Phishing Email Detail view

Usability Testing

  • Conducted usability tests with security analysts and IT administrators
  • Tested key workflows including threat investigation and email analysis
  • Gathered feedback on information architecture and navigation

Findings

  • Users needed more context when viewing threat details
  • Navigation between related threats needed improvement
  • Visualizations helped users understand patterns more quickly
  • Email content view needed better organization of information

High-fidelity

Refined the design based on testing feedback, creating a polished interface that balances comprehensive functionality with intuitive usability.

Solution Highlights

  • Comprehensive dashboard with key performance indicators and threat trends
  • Detailed threat intelligence with geo-location mapping and threat type analysis
  • Intuitive email analysis interface with clear organization of content, attachments, and headers
  • Actionable insights that help users prioritize and respond to threats
  • Unified platform that consolidates threat data from multiple sources
High-fidelity Dashboard with KPIs and threat trends High-fidelity Threat Intel with geo-location mapping

Impact

  • Faster incident response through improved threat visibility and prioritization
  • Improved user experience with intuitive interface and clear information architecture
  • Better decision-making through actionable threat intelligence and contextual insights
  • Reduced false positives through improved threat detection accuracy

I finally understand what the system is doing — and I can explain it to customers.

— User Interview, 2023

Let's connect

Shoot me a message here or connect with me on LinkedIn to get in touch.