Back

Oort’s New Identity Security Dashboard

Today, we’ve officially unveiled our new dashboard, now available to all existing customers. The dashboard has been much sought after across our customer base, so I’m excited to see this become available, and I’m also looking forward to all its future improvements.

In this blog, I’ll provide an overview of how you can make the most of this new dashboard today.

 

1. Access a unified view of your identities

First and foremost, the dashboard will provide a unified view of all your identities in your environment. This is typically an eye-opening view for new customers, who are often surprised by the number of identities in their populations, and the differences across systems. While security and IAM teams have a good idea of the number of employee accounts they manage, they are often unaware of inactive and guest accounts. 

Within the dashboard, you can see data and trends around

  • Identity Snapshot. Understand your total number of identities, including inactive and guest accounts. This also includes the different sources of your identities and any hygiene issues associated with those users.
  • Administrator Snapshot. See how many administrators you have across different identity platforms and their latest logins. This helps to protect your most targeted users, with our recent research finding that administrators encounter three times more attacks than regular users.
  • Threat Activity. Identify accounts experiencing threats like inactive account probing and MFA flood attacks.
  • Multi-Factor Authentication Status. See how many users have no MFA or weak MFA, as well as usage trends.
  • Login Geolocation. All user logins are displayed in a helpful map view, showing where your users are logging in from.
  • Unused Applications. Track applications with no or little usage. Removing access can reduce costs and reverse permission creep.

 

 

2. Drill down into the full data behind the dashboard

On top of displaying the most valuable data, our dashboard must help you to navigate users to where you need to concentrate your attention. 

We’ve ensured the dashboard is dynamic, so you can drill down into specific components to access the full data that form the charts and tables. For example, if you see that 20% of your users have no MFA configured, you can easily pivot to the dedicated check page. Here you can access all users. 

The dashboard will also display trend information, enabling you to focus on emerging issues.

 

 

3. Export data, charts, and images

Information on identities is often required for audit or reporting purposes. While we already enable you to create filters and exports within the Users tab, you can save a step by exporting the data straight from the dashboard. Furthermore, the dashboard has some cool visualizations and charts that can be exported. 

On the top right-hand side of the components, you can click to download the chart as .svg or .png. If you want the entire data behind the chart, you can also choose to export the .csv. 

Not only will this provide you with some time back in your day, but the dashboard may provide inspiration for data you might want to report on. 

 

 

4. Keep an eye on operationalization - view the latest collection details

We strive to provide the most up-to-date information about your identity population. Because we’re pulling in data from numerous sources, it’s helpful to see when Oort last collected data from each source. Instead of rooting through our system logs, you can easily see each integration's latest collection times and status. 

 

 

See your own data 

If you’re an existing Oort customer, you can start using the new dashboard from today. I’d love to hear what you enjoy most about it and what you’d like to see next.

Curious to see your company data in this new dashboard? Get in touch to chat with one of our experts and have a 15-minute demonstration.

Recent Blogs

Identity Security Posture Management (ISPM) is an essential aspect of an identity security programtrue

Identity has become the last best line of defense and phishing is back on the rise. We cantrue