Culture Eats UX Strategy for Breakfast
The article summarizes 8 key programs that UX leaders employ in order to build and sustain strong UX cultures within their companies. These programs can be viewed as a “UX culture palette”. Each program in the palette is composed of activities which UX leaders can use to engage with the various stakeholders, teams, and business functions at their companies. The palette is a tool for thinking more broadly and systematically about practicing UX at scale within a business organization.
Culture Eats UX Strategy for Breakfast
The article summarizes 8 key programs that UX leaders employ in order to build and sustain strong UX cultures within their companies. These programs can be viewed as a “UX culture palette”. Each program in the palette is composed of activities which UX leaders can use to engage with the various stakeholders, teams, and business functions at their companies. The palette is a tool for thinking more broadly and systematically about practicing UX at scale within a business organization.
Secure@Source (S@S) provides 360 degree visibility of sensitive data within an enterprise. It automates the intelligent discovery of sensitive and private data by analyzing values across fields and metadata in targeted database sources.
The tool delivers a rich array of dashboards, visualizations, reports, and alerts that allow security operators to drill-down to understand sensitive data risks and relationships.
![](https://static.wixstatic.com/media/e6f14f_ff3275a5ae24443e8eeaf3558cc5b79b~mv2.png/v1/crop/x_84,y_119,w_845,h_294/fill/w_742,h_266,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/e6f14f_ff3275a5ae24443e8eeaf3558cc5b79b~mv2.png)
Primary Personas
![](https://static.wixstatic.com/media/e6f14f_65856e9953ce4b309d4233dfe9605d1f~mv2.png/v1/crop/x_22,y_216,w_143,h_152/fill/w_122,h_130,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/e6f14f_65856e9953ce4b309d4233dfe9605d1f~mv2.png)
Sean Andrews
Security Analyst
Responsible for discovering sensitive information, high risk situations, or violations of corporate standards and applying security policies.
Monitors security events and creates security & compliance reports for his manager
![](https://static.wixstatic.com/media/e6f14f_65856e9953ce4b309d4233dfe9605d1f~mv2.png/v1/crop/x_519,y_210,w_148,h_147/fill/w_126,h_124,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/e6f14f_65856e9953ce4b309d4233dfe9605d1f~mv2.png)
Samuel Manteen
Security Manager
Responsible for overseeing one or more security systems. He manages a team of security analysts.
Reviews general security product metrics for operational KPI's and new organizational insights. Generates security reports for senior management (CISO/CSO/CIO)
Concept Scenario
![](https://static.wixstatic.com/media/e6f14f_1b2c2c509e3a4e0abbc2be1aa0c4b447~mv2.png/v1/fill/w_660,h_486,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/e6f14f_1b2c2c509e3a4e0abbc2be1aa0c4b447~mv2.png)
Concept Design
![](https://static.wixstatic.com/media/e6f14f_bbfd00bc4fb04e7383ab5ef40749c902~mv2.png/v1/crop/x_27,y_100,w_977,h_509/fill/w_833,h_434,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/e6f14f_bbfd00bc4fb04e7383ab5ef40749c902~mv2.png)
Our concept demo was showcased in Informatica World in the CEO's keynote talk and was later used for customer discussions. Customers enjoyed helping to define requirements for the product they will use in the future.
Product Design
Story maps + Kano analysis were done with all stakeholders
![](https://static.wixstatic.com/media/e6f14f_53d563de1016448e8ef263cade721052~mv2.png/v1/crop/x_52,y_148,w_924,h_405/fill/w_817,h_358,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/e6f14f_53d563de1016448e8ef263cade721052~mv2.png)
Kano Analysis
5
Delighters
17
Satisfiers
58
Must Haves
![](https://static.wixstatic.com/media/e6f14f_07dc2d7dedc64bff8d38f3087992e664~mv2.png/v1/crop/x_77,y_124,w_852,h_513/fill/w_820,h_494,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/e6f14f_07dc2d7dedc64bff8d38f3087992e664~mv2.png)
![](https://static.wixstatic.com/media/e6f14f_de9d3cb973354d9894f184947e76b650~mv2.png/v1/crop/x_0,y_167,w_1018,h_487/fill/w_830,h_397,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/e6f14f_de9d3cb973354d9894f184947e76b650~mv2.png)
![](https://static.wixstatic.com/media/e6f14f_595a0613db0e4af8b222dd67e83efa6c~mv2.png/v1/crop/x_0,y_189,w_1020,h_468/fill/w_848,h_389,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/e6f14f_595a0613db0e4af8b222dd67e83efa6c~mv2.png)
![](https://static.wixstatic.com/media/e6f14f_29ba9b72e1e547c9977e25f4852cc04e~mv2.png/v1/crop/x_87,y_77,w_846,h_625/fill/w_814,h_601,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/e6f14f_29ba9b72e1e547c9977e25f4852cc04e~mv2.png)
Product Screens
![](https://static.wixstatic.com/media/e6f14f_f92e198a347043a2b8b2b0d650479b57~mv2.png/v1/fill/w_806,h_602,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/e6f14f_f92e198a347043a2b8b2b0d650479b57~mv2.png)
![](https://static.wixstatic.com/media/e6f14f_4c459cb331a14eef953fc1983e4bed0a~mv2.png/v1/fill/w_806,h_603,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/e6f14f_4c459cb331a14eef953fc1983e4bed0a~mv2.png)
![](https://static.wixstatic.com/media/e6f14f_ad3d130f8f7b4ead9b32d253527e371e~mv2.png/v1/crop/x_222,y_64,w_551,h_633/fill/w_611,h_702,al_c,lg_1,q_90,enc_avif,quality_auto/e6f14f_ad3d130f8f7b4ead9b32d253527e371e~mv2.png)
![](https://static.wixstatic.com/media/e6f14f_cabc3ff9e8c8440f9d24d5bcbe6900b5~mv2.png/v1/crop/x_62,y_99,w_899,h_586/fill/w_719,h_469,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/e6f14f_cabc3ff9e8c8440f9d24d5bcbe6900b5~mv2.png)
Feedback
10
Concept Validations
Fortune company customers including top banks & financial institutions, retail, and health care
![](https://static.wixstatic.com/media/e6f14f_dc52c0c5db744f74babcbb9e25a8a6eb~mv2.png/v1/crop/x_66,y_165,w_329,h_312/fill/w_259,h_246,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/e6f14f_dc52c0c5db744f74babcbb9e25a8a6eb~mv2.png)
3
Heuristic / Expert Evaluations
3 very senior experts moderated by a UX Researcher
20
Alpha Tests
More than 7 internal departments from North America & India participated in reviewing the product and providing detailed feedback
4
Internal Usability Study
Informatica security team used the product and provided detailed feedback
6
External Usability Study
Security analyst, Security manager, Security architect, Chief information security officer (CISO)
2
Beta Tests
External with very large prospective customers
![](https://static.wixstatic.com/media/e6f14f_e07f0b4b635948bb8695c6f5d98b225e~mv2.png/v1/crop/x_126,y_131,w_782,h_325/fill/w_627,h_261,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/e6f14f_e07f0b4b635948bb8695c6f5d98b225e~mv2.png)
Secure@Source received a gold award in the New Products and Services category from the Info Security Products Guide
Secure@Source won the 2015 Ventana Research Technology Innovation Award for overall Information Technology
Praveen
CTO Office
Western Union
![](https://static.wixstatic.com/media/e6f14f_ca876a971bb74d8785ed71e3ae60db5f~mv2.png/v1/crop/x_253,y_116,w_138,h_152/fill/w_132,h_145,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/e6f14f_ca876a971bb74d8785ed71e3ae60db5f~mv2.png)
Our CTO showcased your S@S dashboard at the Western Union all-hands meeting and praised your product design quality for a V1 product. You guys rock!
Audience Feedback
S@S Pavillion
Informatica World '14
![](https://static.wixstatic.com/media/e6f14f_ca876a971bb74d8785ed71e3ae60db5f~mv2.png/v1/crop/x_253,y_456,w_138,h_146/fill/w_132,h_140,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/e6f14f_ca876a971bb74d8785ed71e3ae60db5f~mv2.png)
What really caught my eye was the Secure@Source demo. It's the most innovative offering we've seen from Informatica.