Vered Solomovitz

Activity Log Redesign

Background and Business Context

In a Data Security Permissions Management system, a comprehensive activity log was maintained, recording user actions and permission changes. Over time, the accumulation of data turned the log into a long, hard-to-read, and often unusable list.

Product

Database Access Management System

My Role

Product Designer

Team

Solo work in collaboration with the CPO, R&D team and the AI team.

Goal

Transform the activity log from an overwhelming list into a meaningful analytical tool.

Identified Issues

  • The log became a monolithic and non-hierarchical list of diverse actions.
  • Users were unable to quickly identify patterns or anomalies.
  • The tool acted more as a data dump than an investigative or analytical utility.
  • Security incident analysis was slow and heavily dependent on manual interpretation.

Related Logs

12.July.2025 01:52 PM

Kelly Hauck

SELECT user_name, request_type, request_data

15.July.2025 08:02 AM

Fernando Effertz

SELECT user_name, accessed_data, ROM acc...

14.July.2025 06:33 AM

Raymond Lind

SELECT request_id, data_ requested, request_status...

10.July.2025 09:24 AM

Marvin Runolfsson

SELECT request_id, data_ requested, request_status...

11.July.2025 03:17 PM

Vera Shanahan

SELECT request_id, data_ requested, request_status...

17.July.2025 11:15 AM

Marlon Hayes

SELECT request_id, data_ requested, request_status...

13.July.2025 07:41 AM

Edith Wintheiser Jr.

SELECT request_id, data_ requested, request_status...

16.July.2025 02:29 PM

Kelli Kling

SELECT request_id, data_ requested, request_status...

18.July.2025 04:58 PM

Eugene Hane

SELECT request_id, data_ requested, request_status...

19.July.2025 10:36 AM

Margie Jacobson

SELECT request_id, data_ requested, request_status...

Rows per page:

10

1-10 of 30K items

Cognitive and Psychological Diagnosis

Cognitive Load

Users had to mentally hold and cross-reference information, a process that quickly led to confusion and information loss.

Selective Attention

The lack of visual emphasis on anomalies made it hard for users to detect critical events.

Episodic Memory

Data was presented as a flat list, not as a coherent story, limiting understanding of sequences, causes, and consequences.

Sense of Control and Trust

Users felt they lacked control over the information and struggled to derive insights from it.

The Research

User Research & Understanding

Instead of focusing solely on stated user needs, I adopted the ECD (Entity centered Design) from Capabilities Design) approach, inspired by Dr. Ofer Moner:

  • Mapped the system's existing analytical capabilities: tagging, time ranges, anomaly detection, user-based grouping, etc.
  • Identified which visual formats would best support these capabilities intuitively.
  • Investigated how security teams currently interact with logs.
  • Analyzed competing systems to uncover effective patterns of information hierarchy and investigative UI.
  • Mapped primary user tasks and recurring workflows to derive design opportunities focused on process support.

Collaboration

  • Worked closely with the CPO, R&D, and AI departments.
  • Divided the project into clear phases. At the end of each phase, I conducted usability tests, applied fixes based on findings, and expanded the feature set with continuous improvements.
  • Balanced technical constraints with cognitive needs throughout the decision-making process.

UI Decisions

Tab-based navigation
High-level tabs (Anomaly Detection, Users, Databases, Classification, Raw Data) allowed users to focus on one perspective at a time, aligning with the Split Attention principle.

Multi-view dashboards
Each tab integrated line graphs, heatmaps, visual maps, and tables – enabling smooth transitions between trend overviews, standout anomalies, and granular details.

Heatmap for Anomaly Detection
Presenting data as color matrices enhanced rapid visual recognition of load patterns and irregularities, especially in time-based sequences.

Dynamic filters on the left panel
Gave users control over their perspective – by time, users, or data type, preserving their sense of control (Locus of Control).

Filter By

Filter by time

Dec.18.2024 - Dec.24.2024

1D

1W

1M

3M

Custom

Display anomalies only

Users

Select property...

Data

Select property...

Anomaly on Datasource Over Time

 

Reset View

Customer_Transactions

Sales_Performance_2024

Inventory_Management_DB

Marketing_Campaign_Analy...

Employee_Timesheets

Product_Catalog

Financial_Reports_Q4

Financial_Reports_Q2

Website_Traffic_Data

Very High Score

High Score

Medium score

Low score

Very low score

No score

00:00

  •  
  •  

03:00

  •  
  •  

06:00

  •  
  •  

09:00

  •  
  •  

12:00

  •  
  •  

15:00

  •  
  •  

18:00

  •  
  •  

21:00

  •  
  •  

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

Anomaly Detection

Classification

1

1.8K

2

700

3

201

4

53321

5

51

Solution

The redesigned interface transformed the log into a visual, interactive, and modular tool tailored to user profiles:

 

  • Enabled system-level anomaly detection, high-level overview, and deep dive into specifics.
  • Analysts could pinpoint irregular behaviors within individual actions.
  • All users could filter and investigate based on context and action type.

Business Impact

  • Significantly improved the speed of incident analysis, especially for security-related events.
  • Shifted the tool from a passive monitoring log to an investigative and analytical asset with operational value.

Key Learnings

  • Cognitive psychology-based design can dramatically boost a system's business value.
  • Sometimes, direct access to users or structured research isn't feasible. In such cases, creative thinking and alternative methodologies are essential. Leveraging ECD and cognitive-psychological tools allowed me to conduct insight-driven design without traditional user research.
  • Visual representation isn't a luxury – it's a foundational way to support human reasoning in complex domains.

Experienced Product Designer

See Resume

I’m a UX/UI designer who enjoys turning complex systems into intuitive experiences. I love working where user needs, product goals, and technical limitations come together, bringing clarity to the unclear through thoughtful, curious, and ever-evolving design.

 

Whether it’s early-stage ideas or polished products, I focus on making a real impact: streamlining workflows, solving problems, and crafting experiences that just feel right. I’m all about diving into research, asking questions, untangling messy processes, and designing interfaces that make everything click.

Vered Solo

Vered Solomovitz

Activity Log Redesign

Background

In a Data Security Permissions Management system, a comprehensive activity log was maintained, recording user actions and permission changes. Over time, the accumulation of data turned the log into a long, hard-to-read, and often unusable list.

Product

Database Access Management System

My Role

Product Designer

Team

Solo work in collaboration with the CPO, R&D team and the AI team.

Goal

Transform the activity log from an overwhelming list into a meaningful analytical tool.

Duration

3 months

Status

Released to production

Identified Issues

  • The log became a monolithic and non-hierarchical list of diverse actions.
  • Users were unable to quickly identify patterns or anomalies.
  • The tool acted more as a data dump than an investigative or analytical utility.
  • Security incident analysis was slow and heavily dependent on manual interpretation.

Related Logs

12.July.2025 01:52 PM

Kelly Hauck

SELECT user_name, request_type, request_data

15.July.2025 08:02 AM

Fernando Effertz

SELECT user_name, accessed_data, ROM acc...

14.July.2025 06:33 AM

Raymond Lind

SELECT request_id, data_ requested, request_status...

10.July.2025 09:24 AM

Marvin Runolfsson

SELECT request_id, data_ requested, request_status...

11.July.2025 03:17 PM

Vera Shanahan

SELECT request_id, data_ requested, request_status...

17.July.2025 11:15 AM

Marlon Hayes

SELECT request_id, data_ requested, request_status...

13.July.2025 07:41 AM

Edith Wintheiser Jr.

SELECT request_id, data_ requested, request_status...

16.July.2025 02:29 PM

Kelli Kling

SELECT request_id, data_ requested, request_status...

18.July.2025 04:58 PM

Eugene Hane

SELECT request_id, data_ requested, request_status...

19.July.2025 10:36 AM

Margie Jacobson

SELECT request_id, data_ requested, request_status...

Rows per page:

10

1-10 of 30K items

Cognitive and Psychological Diagnosis

Cognitive Load

Users had to mentally hold and cross-reference information, a process that quickly led to confusion and information loss.

Selective Attention

The lack of visual emphasis on anomalies made it hard for users to detect critical events.

Episodic Memory

Data was presented as a flat list, not as a coherent story, limiting understanding of sequences, causes, and consequences.

Sense of Control and Trust

Users felt they lacked control over the information and struggled to derive insights from it.

The Research

User Research & Understanding

Instead of focusing solely on stated user needs, I adopted the ECD (Entity centered Design) from Capabilities Design) approach, inspired by Dr. Ofer Moner:

  • Mapped the system's existing analytical capabilities: tagging, time ranges, anomaly detection, user-based grouping, etc.
  • Identified which visual formats would best support these capabilities intuitively.
  • Investigated how security teams currently interact with logs.
  • Analyzed competing systems to uncover effective patterns of information hierarchy and investigative UI.
  • Mapped primary user tasks and recurring workflows to derive design opportunities focused on process support.

Collaboration

  • Worked closely with the CPO, R&D, and AI departments.
  • Divided the project into clear phases. At the end of each phase, I conducted usability tests, applied fixes based on findings, and expanded the feature set with continuous improvements.
  • Balanced technical constraints with cognitive needs throughout the decision-making process.

UI Decisions

Tab-based navigation
High-level tabs (Anomaly Detection, Users, Databases, Classification, Raw Data) allowed users to focus on one perspective at a time, aligning with the Split Attention principle.

Multi-view dashboards
Each tab integrated line graphs, heatmaps, visual maps, and tables – enabling smooth transitions between trend overviews, standout anomalies, and granular details.

Heatmap for Anomaly Detection
Presenting data as color matrices enhanced rapid visual recognition of load patterns and irregularities, especially in time-based sequences.

Dynamic filters on the left panel
Gave users control over their perspective – by time, users, or data type, preserving their sense of control (Locus of Control).

Filter By

Filter by time

Dec.18.2024 - Dec.24.2024

1D

1W

1M

3M

Custom

Display anomalies only

Users

Select property...

Data

Select property...

Anomaly on Datasource Over Time

 

Reset View

Customer_Transactions

Sales_Performance_2024

Inventory_Management_DB

Marketing_Campaign_Analy...

Employee_Timesheets

Product_Catalog

Financial_Reports_Q4

Financial_Reports_Q2

Website_Traffic_Data

Very High Score

High Score

Medium score

Low score

Very low score

No score

00:00

  •  
  •  

03:00

  •  
  •  

06:00

  •  
  •  

09:00

  •  
  •  

12:00

  •  
  •  

15:00

  •  
  •  

18:00

  •  
  •  

21:00

  •  
  •  

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

Anomaly Detection

Classification

1

1.8K

2

700

3

201

4

53321

5

51

Solution

The redesigned interface transformed the log into a visual, interactive, and modular tool tailored to user profiles:

 

  • Enabled system-level anomaly detection, high-level overview, and deep dive into specifics.
  • Analysts could pinpoint irregular behaviors within individual actions.
  • All users could filter and investigate based on context and action type.

Business Impact

  • Significantly improved the speed of incident analysis, especially for security-related events.
  • Shifted the tool from a passive monitoring log to an investigative and analytical asset with operational value.

Key Learnings

  • Cognitive psychology-based design can dramatically boost a system's business value.
  • Sometimes, direct access to users or structured research isn't feasible. In such cases, creative thinking and alternative methodologies are essential. Leveraging ECD and cognitive-psychological tools allowed me to conduct insight-driven design without traditional user research.
  • Visual representation isn't a luxury – it's a foundational way to support human reasoning in complex domains.

Previous Project

Next Project

Experienced Product Designer

See Resume

I’m a UX/UI designer who enjoys turning complex systems into intuitive experiences. I love working where user needs, product goals, and technical limitations come together, bringing clarity to the unclear through thoughtful, curious, and ever-evolving design.

 

Whether it’s early-stage ideas or polished products, I focus on making a real impact: streamlining workflows, solving problems, and crafting experiences that just feel right. I’m all about diving into research, asking questions, untangling messy processes, and designing interfaces that make everything click.

Vered Solo

Vered Solomovitz

Activity Log Redesign

Background

In a Data Security Permissions Management system, a comprehensive activity log was maintained, recording user actions and permission changes. Over time, the accumulation of data turned the log into a long, hard-to-read, and often unusable list.

Product

Database Access Management System

My Role

Product Designer

Team

Solo work in collaboration with the CPO and the R&D team

Goal

Transform the activity log from an overwhelming list into a meaningful analytical tool.

Duration

3 months

Status

Released to production

Identified Issues

  • The log became a monolithic and non-hierarchical list of diverse actions.
  • Users were unable to quickly identify patterns or anomalies.
  • The tool acted more as a data dump than an investigative or analytical utility.
  • Security incident analysis was slow and heavily dependent on manual interpretation.

Related Logs

12.July.2025 01:52 PM

Kelly Hauck

SELECT user_name, request_type, request_data

15.July.2025 08:02 AM

Fernando Effertz

SELECT user_name, accessed_data, ROM acc...

14.July.2025 06:33 AM

Raymond Lind

SELECT request_id, data_ requested, request_status...

10.July.2025 09:24 AM

Marvin Runolfsson

SELECT request_id, data_ requested, request_status...

11.July.2025 03:17 PM

Vera Shanahan

SELECT request_id, data_ requested, request_status...

17.July.2025 11:15 AM

Marlon Hayes

SELECT request_id, data_ requested, request_status...

13.July.2025 07:41 AM

Edith Wintheiser Jr.

SELECT request_id, data_ requested, request_status...

16.July.2025 02:29 PM

Kelli Kling

SELECT request_id, data_ requested, request_status...

18.July.2025 04:58 PM

Eugene Hane

SELECT request_id, data_ requested, request_status...

19.July.2025 10:36 AM

Margie Jacobson

SELECT request_id, data_ requested, request_status...

Rows per page:

10

1-10 of 30K items

Cognitive and Psychological Diagnosis

Cognitive Load

Users had to mentally hold and cross-reference information, a process that quickly led to confusion and information loss.

Selective Attention

The lack of visual emphasis on anomalies made it hard for users to detect critical events.

Episodic Memory

Data was presented as a flat list, not as a coherent story, limiting understanding of sequences, causes, and consequences.

Sense of Control and Trust

Users felt they lacked control over the information and struggled to derive insights from it.

The Research

User Research & Understanding

Instead of focusing solely on stated user needs, I adopted the ECD (Entity centered Design) from Capabilities Design) approach, inspired by Dr. Ofer Moner:

  • Mapped the system's existing analytical capabilities: tagging, time ranges, anomaly detection, user-based grouping, etc.
  • Identified which visual formats would best support these capabilities intuitively.
  • Investigated how security teams currently interact with logs.
  • Analyzed competing systems to uncover effective patterns of information hierarchy and investigative UI.
  • Mapped primary user tasks and recurring workflows to derive design opportunities focused on process support.

Collaboration

  • Worked closely with the CPO, R&D, and AI departments.
  • Divided the project into clear phases. At the end of each phase, I conducted usability tests, applied fixes based on findings, and expanded the feature set with continuous improvements.
  • Balanced technical constraints with cognitive needs throughout the decision-making process.

UI Decisions

Tab-based navigation
High-level tabs (Anomaly Detection, Users, Databases, Classification, Raw Data) allowed users to focus on one perspective at a time, aligning with the Split Attention principle.

Multi-view dashboards
Each tab integrated line graphs, heatmaps, visual maps, and tables – enabling smooth transitions between trend overviews, standout anomalies, and granular details.

Heatmap for Anomaly Detection
Presenting data as color matrices enhanced rapid visual recognition of load patterns and irregularities, especially in time-based sequences.

Dynamic filters on the left panel
Gave users control over their perspective – by time, users, or data type, preserving their sense of control (Locus of Control).

Filter By

Filter by time

Dec.18.2024 - Dec.24.2024

1D

1W

1M

3M

Custom

Display anomalies only

Users

Select property...

Data

Select property...

Anomaly on Datasource Over Time

 

Reset View

Customer_Transactions

Sales_Performance_2024

Inventory_Management_DB

Marketing_Campaign_Analy...

Employee_Timesheets

Product_Catalog

Financial_Reports_Q4

Financial_Reports_Q2

Website_Traffic_Data

Very High Score

High Score

Medium score

Low score

Very low score

No score

00:00

  •  
  •  

03:00

  •  
  •  

06:00

  •  
  •  

09:00

  •  
  •  

12:00

  •  
  •  

15:00

  •  
  •  

18:00

  •  
  •  

21:00

  •  
  •  

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

Anomaly Detection

Classification

1

1.8K

2

700

3

201

4

53321

5

51

Solution

The redesigned interface transformed the log into a visual, interactive, and modular tool tailored to user profiles:

 

  • Enabled system-level anomaly detection, high-level overview, and deep dive into specifics.
  • Analysts could pinpoint irregular behaviors within individual actions.
  • All users could filter and investigate based on context and action type.

Business Impact

  • Significantly improved the speed of incident analysis, especially for security-related events.
  • Shifted the tool from a passive monitoring log to an investigative and analytical asset with operational value.

Key Learnings

  • Cognitive psychology-based design can dramatically boost a system's business value.
  • Sometimes, direct access to users or structured research isn't feasible. In such cases, creative thinking and alternative methodologies are essential. Leveraging ECD and cognitive-psychological tools allowed me to conduct insight-driven design without traditional user research.
  • Visual representation isn't a luxury, it's a foundational way to support human reasoning in complex domains.

Previous Project

Next Project

Experienced Product Designer

See Resume

I’m a UX/UI designer who enjoys turning complex systems into intuitive experiences. I love working where user needs, product goals, and technical limitations come together, bringing clarity to the unclear through thoughtful, curious, and ever-evolving design.

 

Whether it’s early-stage ideas or polished products, I focus on making a real impact: streamlining workflows, solving problems, and crafting experiences that just feel right. I’m all about diving into research, asking questions, untangling messy processes, and designing interfaces that make everything click.

Vered Solo

Vered Solomovitz

Activity Log Redesign

Background

In a Data Security Permissions Management system, a comprehensive activity log was maintained, recording user actions and permission changes. Over time, the accumulation of data turned the log into a long, hard-to-read, and often unusable list.

Product

Database Access Management System

My Role

Product Designer

Team

Solo work in collaboration with the CPO and the R&D team

Goal

Transform the activity log from an overwhelming list into a meaningful analytical tool.

Duration

3 months

Status

Released to production

Identified Issues

  • The log became a monolithic and non-hierarchical list of diverse actions.
  • Users were unable to quickly identify patterns or anomalies.
  • The tool acted more as a data dump than an investigative or analytical utility.
  • Security incident analysis was slow and heavily dependent on manual interpretation.

Related Logs

12.July.2025 01:52 PM

Kelly Hauck

SELECT user_name, request_type, request_data

15.July.2025 08:02 AM

Fernando Effertz

SELECT user_name, accessed_data, ROM acc...

14.July.2025 06:33 AM

Raymond Lind

SELECT request_id, data_ requested, request_status...

10.July.2025 09:24 AM

Marvin Runolfsson

SELECT request_id, data_ requested, request_status...

11.July.2025 03:17 PM

Vera Shanahan

SELECT request_id, data_ requested, request_status...

17.July.2025 11:15 AM

Marlon Hayes

SELECT request_id, data_ requested, request_status...

13.July.2025 07:41 AM

Edith Wintheiser Jr.

SELECT request_id, data_ requested, request_status...

16.July.2025 02:29 PM

Kelli Kling

SELECT request_id, data_ requested, request_status...

18.July.2025 04:58 PM

Eugene Hane

SELECT request_id, data_ requested, request_status...

19.July.2025 10:36 AM

Margie Jacobson

SELECT request_id, data_ requested, request_status...

Rows per page:

10

1-10 of 30K items

Cognitive and Psychological Diagnosis

Cognitive Load

Users had to mentally hold and cross-reference information, a process that quickly led to confusion and information loss.

Selective Attention

The lack of visual emphasis on anomalies made it hard for users to detect critical events.

Episodic Memory

Data was presented as a flat list, not as a coherent story, limiting understanding of sequences, causes, and consequences.

Sense of Control and Trust

Users felt they lacked control over the information and struggled to derive insights from it.

The Research

User Research & Understanding

Instead of focusing solely on stated user needs, I adopted the ECD (Entity centered Design) from Capabilities Design) approach, inspired by Dr. Ofer Moner:

  • Mapped the system's existing analytical capabilities: tagging, time ranges, anomaly detection, user-based grouping, etc.
  • Identified which visual formats would best support these capabilities intuitively.
  • Investigated how security teams currently interact with logs.
  • Analyzed competing systems to uncover effective patterns of information hierarchy and investigative UI.
  • Mapped primary user tasks and recurring workflows to derive design opportunities focused on process support.

Collaboration

  • Worked closely with the CPO, R&D, and AI departments.
  • Divided the project into clear phases. At the end of each phase, I conducted usability tests, applied fixes based on findings, and expanded the feature set with continuous improvements.
  • Balanced technical constraints with cognitive needs throughout the decision-making process.

UI Decisions

Tab-based navigation
High-level tabs (Anomaly Detection, Users, Databases, Classification, Raw Data) allowed users to focus on one perspective at a time, aligning with the Split Attention principle.

Multi-view dashboards
Each tab integrated line graphs, heatmaps, visual maps, and tables – enabling smooth transitions between trend overviews, standout anomalies, and granular details.

Heatmap for Anomaly Detection
Presenting data as color matrices enhanced rapid visual recognition of load patterns and irregularities, especially in time-based sequences.

Dynamic filters on the left panel
Gave users control over their perspective – by time, users, or data type, preserving their sense of control (Locus of Control).

Filter By

Filter by time

Dec.18.2024 - Dec.24.2024

1D

1W

1M

3M

Custom

Display anomalies only

Users

Select property...

Data

Select property...

Anomaly on Datasource Over Time

 

Reset View

Customer_Transactions

Sales_Performance_2024

Inventory_Management_DB

Marketing_Campaign_Analy...

Employee_Timesheets

Product_Catalog

Financial_Reports_Q4

Financial_Reports_Q2

Website_Traffic_Data

Very High Score

High Score

Medium score

Low score

Very low score

No score

00:00

  •  
  •  

03:00

  •  
  •  

06:00

  •  
  •  

09:00

  •  
  •  

12:00

  •  
  •  

15:00

  •  
  •  

18:00

  •  
  •  

21:00

  •  
  •  

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

Anomaly Detection

Classification

1

1.8K

2

700

3

201

4

53321

5

51

Solution

The redesigned interface transformed the log into a visual, interactive, and modular tool tailored to user profiles:

 

  • Enabled system-level anomaly detection, high-level overview, and deep dive into specifics.
  • Analysts could pinpoint irregular behaviors within individual actions.
  • All users could filter and investigate based on context and action type.

Business Impact

  • Significantly improved the speed of incident analysis, especially for security-related events.
  • Shifted the tool from a passive monitoring log to an investigative and analytical asset with operational value.

Key Learnings

  • Cognitive psychology-based design can dramatically boost a system's business value.
  • Sometimes, direct access to users or structured research isn't feasible. In such cases, creative thinking and alternative methodologies are essential. Leveraging ECD and cognitive-psychological tools allowed me to conduct insight-driven design without traditional user research.
  • Visual representation isn't a luxury – it's a foundational way to support human reasoning in complex domains.

Previous Project

Next Project

Experienced Product Designer

See Resume

I’m a UX/UI designer who enjoys turning complex systems into intuitive experiences. I love working where user needs, product goals, and technical limitations come together, bringing clarity to the unclear through thoughtful, curious, and ever-evolving design.

 

Whether it’s early-stage ideas or polished products, I focus on making a real impact: streamlining workflows, solving problems, and crafting experiences that just feel right. I’m all about diving into research, asking questions, untangling messy processes, and designing interfaces that make everything click.