OKTA

Security Access Reviews

Helping security teams detect and remediate risky access faster with AI-driven insights.

Design challenge

Access Certifications satisfy audit and compliance needs well, but follow a reactive, scheduled cadence - typically quarterly - rather than responding dynamically to identity-based security incidents. Security teams have threat detection tools, but lack a direct way to act on identity threats in real time, leaving access reviews disconnected from real-time risk detection.

How might we bridge the gap between threat detection and access certifications to enable timely, risk-aware access decisions and support a more proactive security posture?

View case study

Design challenge

User research

User interface design

Usability testing

Artificial Intelligence

Prototyping

Product strategy

Home page

List of all active and closed access reviews

Active review

Reviewing user access and permissions for a specific employee

Active review

AI LLM summary & application details

Remediation actions

Revoking a user’s access to an application

View UX Case Study

Joseph Dzubina

Product (UX) Designer

Site designed and built by Joseph Dzubina | Copyright © 2026. All rights reserved.

OKTA

Security Access Reviews

Helping security teams detect and remediate risky access faster with AI-driven insights.

Design challenge

Access Certifications satisfy audit and compliance needs well, but follow a reactive, scheduled cadence - typically quarterly - rather than responding dynamically to identity-based security incidents. Security teams have threat detection tools, but lack a direct way to act on identity threats in real time, leaving access reviews disconnected from real-time risk detection.

How might we bridge the gap between threat detection and access certifications to enable timely, risk-aware access decisions and support a more proactive security posture?

View case study

Design challenge

User research

User interface design

Usability testing

Artificial Intelligence

Prototyping

Product strategy

Home page

List of all active and closed access reviews

Active review

Reviewing user access and permissions for a specific employee

Active review

AI LLM summary & application details

Remediation actions

Revoking a user’s access to an application

View UX Case Study

Joseph Dzubina

Product (UX) Designer

Site designed and built by Joseph Dzubina | Copyright © 2026. All rights reserved.

OKTA

Security Access Reviews

Helping security teams detect and remediate risky access faster with AI-driven insights.

Design challenge

Access Certifications satisfy audit and compliance needs well, but follow a reactive, scheduled cadence - typically quarterly - rather than responding dynamically to identity-based security incidents. Security teams have threat detection tools, but lack a direct way to act on identity threats in real time, leaving access reviews disconnected from real-time risk detection.

How might we bridge the gap between threat detection and access certifications to enable timely, risk-aware access decisions and support a more proactive security posture?

View case study

Skills applied

User research

User interface design

Usability testing

Artificial Intelligence

Prototyping

Product strategy

Home page

List of all active and closed access reviews

Active review

Reviewing user access and permissions for a specific employee

Active review

AI LLM summary & application details

Remediation actions

Revoking a user’s access to an application

View UX Case Study

Joseph Dzubina

Product (UX) Designer

Site designed and built by Joseph Dzubina | Copyright © 2026. All rights reserved.

OKTA

Security Access Reviews

Helping security teams detect and remediate risky access faster with AI-driven insights.

Design challenge

Access Certifications support audit and compliance, but operate on a reactive, scheduled cadence rather than responding to identity-based security incidents in real time. Security teams can detect threats, but lack a direct way to turn those signals into timely access decisions.

How might we bridge the gap between threat detection and access reviews to enable tto enable faster, risk-aware remediation actions?

View UX case study

Skills applied

User research

User interface design

Usability testing

Artificial Intelligence

Prototyping

Product strategy

Home page

List of all active and closed access reviews

Active review

Reviewing user access and permissions for a specific employee

Active review

AI LLM summary & application details

Remediation actions

Revoking a user’s access to an application

View UX Case Study