Audra- Network Security Ecosystem

image 11

Project Overview

Audra is an B2B & B2C enterprise-grade and home-security networking solution designed to give users granular control over their digital environment. The project involved designing a multi-tier interface—ranging from high-level business administration to granular home device management—ensuring that complex networking protocols are accessible to both IT professionals and everyday users.

Project Snapshot

Type: Dashboard (Audra secure, Audra Safe).
Responsibilities: Research, UI, and Design system with team members.
Team Collaboration: Business, Tech, Product, Design team & Project manager
Timeline: 5 weeks
Status: Shipped (Live)

3 1

The Problem

Based on feedback and usage data shared by the product team, users were experiencing high complexity, longer-than-expected task completion times, and frequent errors while performing core workflows. Admin users also struggled to manage settings and governance efficiently at scale, while everyday users found it difficult to understand and apply security protections with confidence. This led to higher support tickets, lower feature adoption, and a weaker perception of product value after setup, making usability improvements a clear priority for the design team.
2 2

The Solution

We streamlined multi-tenant management through structured, table-first departmental views. To reduce technical friction, we redesigned advanced networking and security configurations with intuitive, guided forms and binary security toggles and so on. Finally, for home users, we shifted the focus from IP logic to human-centric device management, using visual category-blocking and icon-based scheduling. This unified design system ensures that whether managing an office network or family safety, users experience consistent interaction patterns that maximize control while minimizing configuration errors.

1 1

Impact

This work helped reduce support tickets by 39% by making troubleshooting and advanced settings clearer and easier to complete correctly, while also improving security feature activation through more approachable controls for protection and device restrictions.