User Login Analytics & Metrics: The Deeper Dive
As login journeys become more complex, the need to effectively monitor their performance becomes more important. In our last Intelligent Authentication blog post and video (include link), we covered how User Login Analytics (ULA) provide the necessary tools to deliver metrics and insight that improve login experiences. Using that as a jumping off point, we now do a deep dive into ULA and monitoring the performance of those login journeys. Understanding patterns in how users and devices access services is critical. This can be driven by breach prevention initiatives, however it is increasingly driven by a need to deliver a more personalised user experience with the benefit of a low touch, friction-free interaction.
Check out the latest and final video in our Intelligent Authentication series where we cover in more detail the monitoring of login performance and the tools we’ve introduced to improve it:
User Login Analytics
In speaking with our customers, it is clear there are two new areas to the authentication journey that many vendors fail to deliver: the ability to measure time and the ability to count interactions.
To help solve some new use cases, we introduced a Meter node - a simple drag and drop component that allows for the counting of any particular part of the authentication journey. Numbers can then be analysed in real time using tools like Grafana dashboards.
We also introduced a set of timer nodes: Timer Start and Timer Stop. They are just as simple as they sound. Drop them at the start of the login, or even half through the login journey to calculate journey or part-journey completion times.
So why is this good news for user login?
Service Level Agreements
Many of our customers create login journeys with in-house and third party data sources, which are often used for things like fraud analytics, threat intelligence analysis, malware detection, and botnet correlation. These services were often SaaS based and integrated using a REST API. Our timer and metric nodes help to compare SLA characteristics, licensing cost effectiveness and general RoI analysis.
That Dreaded Abandoned Shopping Cart
Another major area of concern, especially in industries such as retail, financial services or the media, is that of the login journey being so inhibitive that the service sees end user disengagement. . . the cardinal sin of the abandoned shopping cart. By correlating login context - such as which MFA was being used on what particular device in what region - with login times service designers are then able to identify the most effective login journey for their users.
The net net? Better user journeys result in happier and more engaged users.
This is the last video in this series; let us know what you think. To find out more about logins that users love and Intelligent Authentication in general, visit us here.