Reimagining

Rule

Rule

When Security Fails, It's Rarely the Camera.

It's the Rules Behind It.

When Security Fails, It's Rarely the Camera.

It's the Rules Behind It.

Business

Business

Business

Certenity

Certenity

The Product

The Product

The Product

Certenity is an enterprise

Certenity is an enterprise

Certenity is an enterprise

AI video analytics SaaS platform.

AI video analytics SaaS platform.

AI video analytics SaaS platform.

It transforms live camera feeds into proactive threat detection.

It transforms live camera feeds into proactive threat detection.

It transforms live camera feeds into proactive threat detection.

Enhances

security across large-scale sites like

Warehouses

Warehouses

Warehouses

campuses

campuses

campuses

retail chains

retail chains

retail chains

industrial facilities

industrial facilities

industrial facilities

Role:

Role:

UX/UI Designer

UX/UI Designer

Duration:

Duration:

3 Months

3 Months

Product focus:

Product focus:

Enterprise UX

Enterprise UX

Deep ownership across:

Deep ownership across:

4/12 modules

4/12 modules

Uncovering User Needs through Research

Uncovering User Needs through Research

We Listened First

We Listened First

Age:

32

City:

Austin

#persona1

#persona1

Operator

Operator

Security Personnel

Jared Smith

Jared Smith

A security professional at a busy storage facility in Austin, monitors multiple cameras to track incidents and respond swiftly. He needs an intuitive system for real-time surveillance and alerts.

A security professional at a busy storage facility in Austin, monitors multiple cameras to track incidents and respond swiftly. He needs an intuitive system for real-time surveillance and alerts.

Pain Points

Pain Points

Frustrated by overly complex or unintuitive surveillance systems that make it challenging to perform essential tasks

Frustrated by overly complex or unintuitive surveillance systems that make it challenging to perform essential tasks

Difficulty in investigating and reviewing video footage in response to reported events or alarms

Difficulty in investigating and reviewing video footage in response to reported events or alarms

Pain Points

Difficulty in assigning access to specific cameras

Difficulty in assigning access to specific cameras

Lack of integration with other security systems

Lack of integration with other security systems

Lack of user-friendly interface

Lack of user-friendly interface

Security Admin

Alex Johnson

Alex Johnson

A security admin, manages access, defines rules, and coordinates teams. He needs a centralized platform to streamline security operations efficiently.

A security admin, manages access, defines rules, and coordinates teams. He needs a centralized platform to streamline security operations efficiently.

Age:

38

City:

Austin

#persona2

#persona2

#persona2

Admin

Admin

I M A G I N E

I M A G I N E

I M A G I N E

Inside an enterprise security operations room, operators monitor hundreds of camera feeds simultaneously. When an AI rule triggers an intrusion, a line crossed, a face recognized then system doesn't wait. It alerts instantly. The operator responds.

Inside an enterprise security operations room, operators monitor hundreds of camera feeds simultaneously. When an AI rule triggers an intrusion, a line crossed, a face recognized then system doesn't wait. It alerts instantly. The operator responds.

Inside an enterprise security operations room, operators monitor hundreds of camera feeds simultaneously. When an AI rule triggers an intrusion, a line crossed, a face recognized then system doesn't wait. It alerts instantly. The operator responds.

What is a Rule?

What is a Rule?

Without a rule, a camera just records. With one, it understands what to watch for, where to look, and when to act.

Without a rule, a camera just records. With one, it understands what to watch for,

where to look, and when to act.

Without a rule, a camera just records. With one, it understands what to watch for, where to look, and when to act.

A camera feed with no rules applied

A camera feed with no rules applied

A camera feed with no rules applied

The same feed, now actively detecting threats.

The same feed, now actively detecting threats.

The same feed, now actively detecting threats.

That's what Rule Configuration does.

That's what Rule Configuration does.

Rule Configuration is the

Rule Configuration is the

Rule Configuration is the

Admin's control center.

Admin's control center.

Admin's control center.

No Rules = No Detection.

No Rules = No Detection.

No Rules = No Detection.

No Detection = No Security.

No Detection = No Security.

No Detection = No Security.

It is the most operationally critical module in the platform.

It is the most operationally critical module in the platform.

It is the most operationally critical module in the platform.

The Core Tension

Enterprise security runs on scale. A single site can have 50, 100, even 200+ cameras. Each camera needs rules. Each rule needs configuration.

Previous Certenity’s Rule Configuration design

Limited to single devices

Ignoring multi-camera realities in large sites.

No built-in guidance

Frustrating mixed-skill users (tech-savvy admins vs. on-site operators).

The rule creation flow is

packed into a small, long-scroll popup.

Built for simplicity, not scale.

The

Business

Problem

The

Business

Problem

The platform was growing.

The platform was growing.

More clients. More sites. More cameras.

More clients. More sites. More cameras.

More rule types including premium AI rules that clients had to purchase.

But the configuration tool hadn't grown with it.

More rule types including premium AI rules that clients had to purchase. But the configuration tool hadn't grown with it.

More rule types including premium AI rules that clients had to purchase.

But the configuration tool hadn't grown with it.

1

Admins weren't using advanced rule types, reducing platform value

Admins weren't using advanced rule types, reducing platform value

Admins weren't using advanced rule types, reducing platform value

2

Setup errors were costly. Assigning a rule to the wrong camera could waste a limited premium license

Setup errors were costly. Assigning a rule to the wrong camera could waste a limited premium license

Setup errors were costly. Assigning a rule to the wrong camera could waste a limited premium license

3

That friction silently discouraged admins from using premium rules at all

That friction silently discouraged admins from using premium rules at all

That friction silently discouraged admins from using premium rules at all

The goal wasn't just better UX.

The goal wasn't just better UX.

It was removing the friction that was silently limiting what the platform could do.

It was removing the friction that was silently limiting what the platform could do.

It was removing the friction that was silently limiting what the platform could do.

Four decisions.

Each one shaped the product. Here's what we chose, what we rejected, and why.

Rule configuration isn't a quick action. It's a deliberate, multi-step process with real operational consequences. It deserved its own space.

Popup to Full Screen

"One-click convenience was costing us clarity."

Many-to-many felt powerful from the top level became an infinite loop the deeper you went.


What we kept:

1-to-1 — One rule, one device. Simple, precise, no ambiguity.

1-to-Many — One rule, multiple devices. Scalable without losing control.

Rejecting Many-to-Many

"More flexibility isn't always more power."

Configure, Schedule, Notification.


Each stage has one job. One mental goal.

The stepper makes it visible, admins always know where they are, what they've completed, and what's next. No guessing.

The CSN Framework

"A rule isn't just a trigger. It's a lifecycle."

Configure

Notification

Schedule

It's a quality control layer embedded into the workflow. Don't assume expertise. Design for the moment when expertise is absent.

Guidance over Knowledge

"An incorrectly drawn zone doesn't just look wrong. It counts wrong."

Four decisions.

Each one shaped the product. Here's what we chose, what we rejected, and why.

Popup to Full Screen

"One-click convenience was costing us clarity."

Rejecting Many-to-Many

"More flexibility isn't always more power."

The CSN Framework

"A rule isn't just a trigger. It's a lifecycle."

Configure

Schedule

Notification

Guidance over Knowledge

"An incorrectly drawn zone doesn't just look wrong. It counts wrong."

Four decisions.

Each one shaped the product. Here's what we chose, what we rejected, and why.

Rule configuration isn't a quick action. It's a deliberate, multi-step process with real operational consequences. It deserved its own space.

Popup to Full Screen

"One-click convenience was costing us clarity."

Many-to-many felt powerful from the top level became an infinite loop the deeper you went.


What we kept:

1-to-1 — One rule, one device. Simple, precise, no ambiguity.

1-to-Many — One rule, multiple devices. Scalable without losing control.

Rejecting Many-to-Many

"More flexibility isn't always more power."

Configure, Schedule, Notification.


Each stage has one job. One mental goal.

The stepper makes it visible, admins always know where they are, what they've completed, and what's next. No guessing.

The CSN Framework

"A rule isn't just a trigger. It's a lifecycle."

Configure

Notification

Schedule

It's a quality control layer embedded into the workflow. Don't assume expertise. Design for the moment when expertise is absent.

Guidance over Knowledge

"An incorrectly drawn zone doesn't just look wrong. It counts wrong."

Solution Highlights

Solution Highlights

Five features. Each one a direct answer to a real problem.

Five features. Each one a direct answer

to a real problem.

Adaptive Configuration Modes

Choose your device,

your way.

Selecting one device (One to One)

Selecting one device (One to One)

Selecting one device (One to One)

Selecting multiple device (One to Many)

Selecting multiple device (One to Many)

Selecting multiple device (One to Many)

Set rule on one device or..

Set rule on one device or..

Set rule on one device or..

..on many devices, effortlessly

..on many devices, effortlessly

..on many devices, effortlessly

A spacious canvas that empowers admins to define rules effortlessly and with precision.

A spacious canvas that empowers admins to define rules effortlessly and with precision.

A spacious canvas that empowers admins to define rules effortlessly and with precision.

Built-in guidebook with smart Do’s and Don’ts to ensure accurate rule setup.

Built-in guidebook with smart Do’s and Don’ts to ensure accurate rule setup.

Built-in guidebook with smart Do’s and Don’ts to ensure accurate rule setup.

From Logic to Interface:

Visualizing CSN

Configure - Defining the response

Setting what happens when an event triggers.

Schedule - Timing the watch

Notification - Alerting the right eyes

From Logic to Interface:

Visualizing CSN

Configure - Defining the response

Setting what happens when an event triggers.

Schedule - Timing the watch

Notification - Alerting the right eyes

From Logic to Interface:

Visualizing CSN

Defining the response

Setting what happens when an event triggers.

Timing the watch

Setting what happens when an event triggers.

Alerting the right eyes

Deciding who gets notified instantly.

Configure

Schedule

Notification

Estimated Design Impact

Estimated Design Impact

Based on structural changes, not measured data

Based on structural changes, not measured data

Single endless form →

6 structured steps

Single endless form →

6 structured steps

Single endless form →

6 structured steps

Estimated 40–50% reduction in setup time

Estimated 40–50% reduction in setup time

1-to-1 only →

1-to-Many mode

1-to-1 only →

1-to-Many mode

1-to-1 only →

1-to-Many mode

One session now covers what previously took many.

One session now covers what previously took many.

Zero guidance →

Contextual guidebook per rule

Zero guidance →

Contextual guidebook per rule

Zero guidance →

Contextual guidebook per rule

Measurable reduction in misconfiguration risk

Measurable reduction in misconfiguration risk

*

These are design intent estimates, not tracked metrics. The platform was not instrumented for usage analytics at this stage.

These are design intent estimates, not tracked metrics. The platform was not instrumented for usage analytics at this stage.

What’s Next..

What’s Next..

System will suggest rules by analyzing device feeds, tailored to the selected rule type.

System will suggest rules by analyzing device feeds, tailored to the selected rule type.

Simplify the entire rule creation into two steps — just prompt and confirm.

Simplify the entire rule creation into two steps — just prompt and confirm.

mandarghayalkar@gmail.com

+91 91567 49895

© Mandar Ghayalkar | 2026

mandarghayalkar@gmail.com

+91 91567 49895

© Mandar Ghayalkar | 2026

mandarghayalkar@gmail.com

+91 91567 49895

© Mandar Ghayalkar | 2026

The Core Tension

Enterprise security runs on scale. A single site can have 50, 100, even 200+ cameras. Each camera needs rules. Each rule needs configuration.

Previous Certenity’s Rule Configuration design

Limited to single devices

No built-in guidance

Packed into a small, long-scroll popup.

Built for simplicity, not scale.

The Core Tension

Enterprise security runs on scale. A single site can have 50, 100, even 200+ cameras. Each camera needs rules. Each rule needs configuration.

Previous Certenity’s Rule Configuration design

Limited to single devices

Ignoring multi-camera realities in large sites.

No built-in guidance

Frustrating mixed-skill users (tech-savvy admins vs. on-site operators).

The rule creation flow is

packed into a small, long-scroll popup.

Built for simplicity, not scale.