top of page

Centraleyes: From Concept to Completion – UX/UI Design for a Cutting-Edge Cyber Risk Management Platform

I was responsible for the platform's design from its inception, starting with the first screen and guiding the project through every stage of the UX process. This involved conducting user research, creating personas, and mapping user journeys to ensure a user-centered approach. I designed wireframes, built interactive prototypes, and developed the platform's entire graphic language. Additionally, I collaborated with stakeholders

and developers to ensure seamless integration of features.

The result is a polished, intuitive product now used by hundreds of satisfied customers worldwide.

01. Upperdeck.png

Overview

Centraleyes is SaaS-based cyber risk management platform that helps organizations identify, measure, and manage cyber risks. The no-code, cloud-native platform enables single-day onboarding, automated data collection, and real-time analytics through dashboards and reports, streamlining risk and compliance processes while supporting smarter decision-making.

UX/UI Development Stages

1

Explore

  • Stakeholder alignment

  • Regulatory standards

  • User identification

2

Research

  • User interviews

  • Industry trends

  • Competitor analysis

3

Analyze

  • User workflows

  • Feedback prioritization

  • Personas and journeys

4

Design

  • Wireframes

  • High-fidelity prototypes

  • Design system

5

Testing

  • Usability testing

  • A/B testing

  • Iteration

Comprehensive UX/UI Design Process

Receiving Requirements

At the outset of the Centraleyes project, the primary goal was to develop a user-friendly, cloud-native cyber risk management platform.

The stakeholders emphasized the need for a no-code interface, automated data collection, and real-time reporting to empower organizations in managing their cyber risk and compliance.

 

The core requirements were:

Seamless Onboarding:

The ability for users to implement and configure the platform in a single day.

 

Real-Time Insights:

Dashboards providing real-time data for smarter decision-making.

 

Automation:

Automated data collection and reporting to ease the burden of compliance and risk management.

 

Scalability:

A cloud-native architecture to accommodate organizations of varying sizes.

Competitor Analysis

To gain insights into the market, I conducted a thorough competitor analysis, focusing on:

  • Leading cyber risk management and GRC (Governance, Risk, and Compliance) platforms.

  • Key differentiators such as ease of use, scalability, automation, and dashboard design.

  • Identifying gaps in existing solutions helped position Centraleyes as an innovative and user-friendly alternative.

compatitors.png

Main competitors on which the research is based:

User Research

Extensive user research was conducted to understand the platform's

potential users, including:

  • Interviews with industry professionals (CISOs, security analysts, MSSPs).

  • Surveys to uncover pain points and feature preferences.

  • Analysis of user workflows in existing systems to identify areas of improvement.

This summary concisely presents the main findings from our user research:

70%

Prefer platforms with quick onboarding, ideally within one day

78%

Users want automated data collection and reporting to boost efficiency

85%

Utilize real-time dashboards and reports for improved strategic decisions

Target Audience Insights

One of the key target audiences we focused on was MSSPs (Managed Security Service Providers), who require:

  • Real-time dashboards for multiple clients.

  • The ability to automate risk data collection and reporting.

  • Easy onboarding for both their teams and client companies.

This research informed much of the platform’s features and design decisions, ensuring that Centraleyes met the specific needs of MSSPs.

Personas

Based on the research, we developed two key personas:

David.png

David, CISO at a Mid-Size Company,

45 years old

Goals: Streamline cyber risk management, ensure compliance, and report effectively to stakeholders.

Pain Points: Manual processes, lack of real-time data, complexity in managing risk across departments.

Needs: Automated data collection, intuitive dashboards, clear compliance reporting.

Sarah.png

Sarah, MSSP Account Manager,

38 years old

Goals: Manage risk data for multiple clients, provide comprehensive reports, ensure rapid onboarding of new clients.

Pain Points: Managing a large volume of client

data, difficulty in automating processes,

complex user interfaces.

Needs: Real-time client dashboards, automated reporting, streamlined onboarding tools.

Flow

I designed a user flow that ensures seamless navigation and efficient interaction with the Centraleyes platform:

  • Login/Onboarding:
    Quick and intuitive onboarding for new users, with clear steps to set up their organization’s risk profile and begin assessments.

  • Dashboard:
    Immediate access to real-time data, showing the organization’s risk scores, compliance metrics, and insights into both first-party and third-party risks. The dashboard provides a comprehensive overview for easy monitoring and management.

  • 1st Party Risk Management:
    Users can perform assessments to track and manage their organization's internal risks, identifying vulnerabilities and improving risk scores over time through continuous evaluation.

  • 3rd Party Risk Management:
    Dedicated tools for tracking and assessing the risks posed by third-party suppliers, allowing organizations to monitor and mitigate external threats in their supply chain.

  • Board Views & Reports:
    Users can generate dynamic, visually appealing reports for board members, mapping all relevant risk data and providing clear insights for strategic decision-making. These reports help communicate both internal and external risk profiles to key stakeholders.

Wireframes

Style Guide

Centraleyes Screens

Each screen is thoughtfully crafted with a focus on usability, ensuring that users can navigate the platform seamlessly while accessing and managing critical risk data. The intuitive design enhances the user experience, making complex processes—like risk tracking, assessments, and report generation—straightforward and efficient.

bottom of page