Vulnerability Remediation

Reducing vulnerability remediation complexity by designing around user tasks

Client: ConnectWise

Project Summary

The project
This effort focused on redesigning the Vulnerability Remediation experience within the ConnectWise Asio security platform. Although positioned as “Vulnerability Management,” the existing experience was architected around managing vulnerability scans, requiring users to navigate system structure before they could take action.

The redesign shifted the experience from scan-centric navigation to a vulnerability-first workflow, enabling users to understand risk and remediate issues without drilling through multiple layers of hierarchy.

Core user problem
Users needed a fast, clear way to remediate vulnerabilities across devices, but the platform forced them to work backwards through scan data, organizational structures, and device hierarchies. Remediation actions were buried behind scan details, increasing cognitive load and turning a time-sensitive security task into a navigation problem.

My role, scope, and collaborators

I led UX design for the remediation experience, owning information architecture, task flows, responsive layouts, and remediation workflows. I produced user flows, interactive Figma prototypes, and usability tests, and worked closely with a product manager and an embedded scrum team.

Throughout the project, I partnered with engineering to validate designs against the design system, API availability, and MVP constraints, ensuring the solution was both usable and buildable.

Before-and-after flow diagrams showing a complex scan-based vulnerability remediation process compared to a simplified vulnerability-first remediation workflow.
Comparison of the previous scan-driven remediation flow and the redesigned vulnerability-first workflow, illustrating how multiple layers of navigation were collapsed into a single remediation decision point.

Constraints and challenges that shaped the work

Scan-first architecture

The product was fundamentally organized around vulnerability scans rather than vulnerabilities themselves, requiring a structural UX shift rather than incremental UI changes.

Fragmented remediation tooling

Patch deployment already existed elsewhere in the platform. The new experience needed to feel intuitive and aligned without duplicating or conflicting with the existing patching workflow, all while operating with limited API access during MVP.

Top-down dashboard decisions

Leadership mandated that security features be consolidated into categorized dashboard tabs. The redesign needed to fit within this framework while still solving core usability problems.

Quantitative Data

Several years of behavioral data from Pendo showed low engagement with scan-level pages and significant drop-off during remediation flows. Users rarely explored scan details unless forced, confirming that scans were not a meaningful decision surface for remediation tasks.

Qualitative insights

I gathered continuous feedback from early access users who consistently expressed frustration with deep navigation, lack of visibility into impacted devices, and uncertainty about where to begin remediation. Stakeholders echoed these concerns, emphasizing the need for clearer prioritization and faster paths to action.

Design Approach

Designing around the vulnerability, not the scan
The core design decision was to make vulnerabilities the primary unit of work. The redesigned dashboard aggregates detected vulnerabilities up front, allowing users to assess risk immediately rather than navigating through scans, companies, sites, and devices.

Reducing navigation and decision fatigue
Remediation workflows were streamlined into a single decision point: deploy a fix to selected devices or all affected devices. This collapsed multiple repetitive flows into one clear action, reducing context switching and cognitive load.

Placing scans in the background
The vulnerability scans were folded into the setup process. Users could still view individual scans and set the cadence. Once scans were set up though, we observed that the schedule controls were rarely accessed.

Balancing consistency with platform constraints
Because patch deployment existed elsewhere in the platform, the remediation flow was designed to feel familiar without being identical. Component usage, language, and interaction patterns aligned with the broader system while accommodating API and MVP limitations.

Outcome/Reflection

Lessons learned
The redesigned vulnerability remediation experience became the primary way users move from detection to action within the platform. By shifting the workflow to a vulnerability-first model, the experience reduced navigation depth, clarified decision-making, and aligned remediation with real-world security tasks.
The work established a clearer, more scalable foundation for vulnerability management and helped position remediation as a core capability.