![Purple to blue gradient.](/design/static/fb0b7c71a7a06b10a09abc339306c78c/d6c9b/Image_1.jpg)
Security
Cybersecurity is often thought of as a predominantly technical problem space. In reality, however, security is a complex web of interdependent factors, many of which are directly tied to human behaviors and habits.
Designing for security means constantly considering the high-pressure, high-risk environment in which these tools are actually being used.
For a security professional, the best user experience is one that is predictable, transparent and explicit about exactly what’s going on at all times. The ultimate goal: to take complex, sensitive operations and make them clear, consistent, and reliable for our end users.
↓
![Security badge for IBM Security event.](/design/static/55c5d806b9c16853bc24f565f6380027/d6c9b/Image_2.jpg)
![X-Force Command semi-truck.](/design/static/387d6d1a1fb0fd47e0c141fc8fce756f/7f2dd/Image_3.jpg)
![IBM Security.](/design/static/072518733c4e24d67ea9953ea9177894/2db66/Image_4.jpg)
![Security Logo.](/design/static/ffee046ad5c8b9949194fb95ca8913cc/2db66/Image_6.jpg)
![IBM Security Connect dashboard.](/design/static/79bdc0c8d46164365bfde6b3b427c644/d6c9b/Image_5.jpg)
![IBM Security Connect - My applications interface.](/design/static/a8bb61aa5d37a887d1a27b0c88c31b1f/d6c9b/Image_8.jpg)
![Fear Less.](/design/static/fa0e4f46b4ae67e6fa39acc06eb25470/7f2dd/Image_7.jpg)
![Green to blue gradient.](/design/static/985390e89f7859d5e593efe93074ac31/2db66/Image_10.jpg)
![Blue and purple gradient circles on top of each other.](/design/static/da807578aae30f3f044151e80c5b7875/7f2dd/Image_9.jpg)