authentication

  • How barriers in your IT service are discouraging your users' engagement

    Picture of a street in a southern country, rounded up by several trees

    Today I would like to kick-off on a slightly scholarly note by introducing the concept of transaction costs. The theory was first developed by R.H. Coase in his 1937 paper The Nature of the Firm and further elaborated by O.E. Williamson in The Economics of Organization: The Transaction Cost Approach. Both ended up winning the Nobel Prize in Economics for their contributions in analysing and describing the cost of participating in a market. I would like to apply this concept to using software and discuss some of the transaction costs that may prevent a person from using an IT system. When defining the concept, the economists were focussed on analysing transaction costs such as taxes or price controls. If you consider that economic behaviour is, at its core, the constant decision making of the actors in an economic system guided by the scarcity of certain resources (e.g. food, money, time, attention) and the corresponding incentives of controlling a chunk of said resources (e.g. financial gain, increase in autonomy, less pain), this concept can easily be applied to users of software. Anything that hinders or inconveniences the use of an IT service shall be considered a transaction cost for this exercise.

  • Mitigation Task View, Control Set PDFs and super-fast Risk Graphs

    Mitigation Task View

    Summary of Changes

    Mitigation Task View

    1. Mitigation Task View

    The Risk Management comes with a different view: Mitigation Tasks

    Control Set PDFs

    2. Control Set PDFs

    Control Sets can now be exported to nicely formatted PDF.

    Risk Graph

    3. Dagger

    All Risk Graph-related activities in the app are now 50 times faster.

  • Multi Factor Authentication and Funnel Updates

    different tools assembled

    Summary of Changes

    Multi Factor Authentication

    1. Multi Factor Authentication

    A second factor for authentication protects your Alyne organisation from a wide range of attacks.

    High Score Evaluation for Funnels

    2. High Score Evaluation for Funnels

    We added a second evaluation method for Funnels: High Score. It's a brother to the existing Weighted Answers method.

    Scatter Plot for Funnel Runs

    3. Scatter Plot for Funnel Runs

    We introduce a very cool visualisation of the Funnel runs you took.

  • New cool Report features and Radars for Responders

    different tools assembled

    Summary of Changes

    Risk Heatmap and Compliance Summary

    1. Report Updates

    We revamped the most popular Report sections: Risk Heatmap and Compliance Summary.

    Implement Control

    2. Implement control mitigation

    We introduce a new mitigation action type: "Implement Control".

    Responder Radar

    3. Responder Radar

    Assessment recipients can view their results in a private radar diagram (if you allow it).

  • Risk Tags 2.0 and PDF Reports

    different tools assembled

    Summary of Changes

    Risk Tags 2.0

    1. Risk Tags 2.0

    We made the handling of Risk Tags in the Risk Management more powerful and easier to use at the same time.

    PDF Risk Reports

    2. PDF Reports

    Our reports are now also available as a downloadable PDF.

    Scoped Risk Reports

    3. Scoped Reports

    Reports can be limited to a selection of Controls now.

  • Standards Radar for Responders and Realtime Access Control

    Standards Radar for Responders and Realtime Access Control

    Summary of Changes

    Sorted Radar Diagram

    1.... and again improved Radars

    Responder Radars now feature the standards radar. All Radars are sorted alphabetically now.

    Realtime Access Control

    2. Realtime Access Control

    Removing a user or changing the user type is enforced in realtime.

    Configurable Session Timeout

    3. Configurable Session Timeout

    Admins of an Alyne org can configure the inactivity timeout individually.