explain.ai
Cloud Security Solution, an Ai assisted temporal network graph engine
explain.ai
Cloud Security Solution, an Ai assisted temporal network graph engine
Introduction
explain.ai is an intelligent ai driven, temporal network graph analytical engine. Detects, Explains, Visualise, Remediates threats in Virtual Cloud Networks.
Agent-less, Multi-Cloud Security Platform which integrates distinct tools, data sources and methods in a single SaaS Application. The Application detects, threats and compliance violations in near real time. Explains to End-Users the origin and propagation of threats across multiple vectors such as: user behaviour, machine communications ,application Interactions. Continuously assures Access Policies and application interactions. Reduces time to detect, analyse and reduces cost of breach. The application ingests temporal cloud network logs and other data. The data is processed by the application not only offering threat detection but remediation as well.
Introduction
explain.ai is an intelligent ai driven, temporal network graph analytical engine. Detects, Explains, Visualise, Remediates threats in Virtual Cloud Networks.
Agent-less, Multi-Cloud Security Platform which integrates distinct tools, data sources and methods in a single SaaS Application. The Application detects, threats and compliance violations in near real time. Explains to End-Users the origin and propagation of threats across multiple vectors such as: user behaviour, machine communications ,application Interactions. Continuously assures Access Policies and application interactions. Reduces time to detect, analyse and reduces cost of breach. The application ingests temporal cloud network logs and other data. The data is processed by the application not only offering threat detection but remediation as well.
Introduction
explain.ai is an intelligent ai driven, temporal network graph analytical engine. Detects, Explains, Visualise, Remediates threats in Virtual Cloud Networks.
Agent-less, Multi-Cloud Security Platform which integrates distinct tools, data sources and methods in a single SaaS Application. The Application detects, threats and compliance violations in near real time. Explains to End-Users the origin and propagation of threats across multiple vectors such as: user behaviour, machine communications ,application Interactions. Continuously assures Access Policies and application interactions. Reduces time to detect, analyse and reduces cost of breach. The application ingests temporal cloud network logs and other data. The data is processed by the application not only offering threat detection but remediation as well.
What We Did...
We have established: a usage / navigation pattern, underlying UI architecture, information design, visual language and aesthetic direction.
What We Did...
We have established: a usage / navigation pattern, underlying UI architecture, information design, visual language and aesthetic direction.
Goals
Goals
Provide a feasible, Proof-of-concept Application UI Screens for my client’s pitch presentations. Translating his abstract business cases & concepts to concrete UI screens, screen-flows to support him to gain potential investors. Establish Early Logotype / Corporate Identity design.
Provide a feasible, Proof-of-concept Application UI Screens for my client’s pitch presentations. Translating his abstract business cases & concepts to concrete UI screens, screen-flows to support him to gain potential investors. Establish Early Logotype / Corporate Identity design.
Design Opportunities
Design Opportunities
How to visualise virtual cloud network’s communications in a meaningful manner for an end-users, enabling him/her to pinpoint problems immediately?
How to offer contextual suggestions to eliminate the threats?
How to enable end user to look through suspicious activities in a cloud network’s communication history -within a user defined time-range- and being able to act upon those threats right away?
How to manage pre-caned solutions to eliminate reoccurring typical threats?
How to visualise virtual cloud network’s communications in a meaningful manner for an end-users, enabling him/her to pinpoint problems immediately?
How to offer contextual suggestions to eliminate the threats?
How to enable end user to look through suspicious activities in a cloud network’s communication history -within a user defined time-range- and being able to act upon those threats right away?
How to manage pre-caned solutions to eliminate reoccurring typical threats?
How to visualise virtual cloud network’s communications in a meaningful manner for an end-users, enabling him/her to pinpoint problems immediately?
How to offer contextual suggestions to eliminate the threats?
How to enable end user to look through suspicious activities in a cloud network’s communication history -within a user defined time-range- and being able to act upon those threats right away?
How to manage pre-caned solutions to eliminate reoccurring typical threats?
How to choose / apply those pre-canned solutions when a threat is detected?
How to manage multiple, monitored Virtual Private Clouds within the application?
How add a new VPC to the system?
How to manage, add new or disable existing datasource to an existing, already ingested VPC?
And a lot more unclear questions and problems…
How to choose / apply those pre-canned solutions when a threat is detected?
How to manage multiple, monitored Virtual Private Clouds within the application?
How add a new VPC to the system?
How to manage, add new or disable existing datasource to an existing, already ingested VPC?
And a lot more unclear questions and problems…
How to choose / apply those pre-canned solutions when a threat is detected?
How to manage multiple, monitored Virtual Private Clouds within the application?
How add a new VPC to the system?
How to manage, add new or disable existing datasource to an existing, already ingested VPC?
And a lot more unclear questions and problems…
The "PackMan" Logotype Concept
The "PackMan" Logotype Concept
Logotype “PackMan” concept.
The app is eating up all the malicious threats…
Logotype “PackMan” concept.
The app is eating up all the malicious threats…
Branded Login Screen
Branded front page with simple sequential login to access the application.
Application Performance Overview Screen
Application Status / Performance Overview Screen
Contains a list of affected networks currently ingested by the system. User can launch a VPC for analysis / remediation from the prioritised list.

After Login, user would land on the last opened graph if wasn’t closed or if there was any.
Virtual Private Cloud Library
Tab selected screen where User can choose if wants to address new high priority threats or continue monitoring graphs previously worked on.
Also can add a new VPC to be monitored.

Right hand side panel displays performance related statistical data and high priority threats detected.
Data Source Management
Application Status / Performance Overview Screen
Contains a list of affected networks currently ingested by the system. User can launch a VPC for analysis / remediation from the prioritised list.

After Login, user would land on the last opened graph if wasn’t closed or if there was any.
Virtual Private Cloud Temporal Graph
VPC Network Graph Visualisation Viewport
displays affected entities
allowing DevSecOps to perform threat remediation on a number of nodes displayed.
User can play back network communications for a selected time range
to see when and where did some suspicious activity took place in the network.

Algorithmic analysis under
´Status Tab calls out cost increase, affected entities, suspicious activities.
Threat details and suggested actions
After user selected a particular threat to remediate, suggested actions “PlayBooks” and threat details displayed in the panel.
User can navigate back to the full threat list if needed.

Selecting a suggested action will offer subsequent options to remediate the threat.
PlayBook test result / Run PlayBook Action
After PlayBook is tested, user can read the list of eliminated threats and the remaining threats. in the panel. The operator can also see the PlayBooks effect visualised on the network graph.

She/He has the choice to run the PlayBook or to go back to the chronological list of threats.
hi@zizo.design
ZIZO.DESIGN ©2022 All Rights Reserved
hi@zizo.design
ZIZO.DESIGN ©2022 All Rights Reserved
hi@zizo.design
ZIZO.DESIGN ©2022 All Rights Reserved