loader image
appcino-logo
Close

Appcino Challenge

Challenge us with your innovative ideas, don’t let people tell you they are not feasible because you don’t have the budget, technology or the people. Challenge us to see if we can come up with an offer you just can’t resist!


Address

User Activity Audit

 2018 AppMarket Award Winner in “App Innovation in Governance and Compliance”



The User Analytics, Compliance and Governance app offers the logs of a user's activity in the Appian environment with comprehensive analytics, proactive monitoring, and notifications. The audit feature is designed to meet the auditing, compliance, security, and governance policies of companies implementing applications on the Appian platform.

Overview of User Activity Audit

Mission & Vision To provide complete visibility of a user’s action with controls to report as well as prevent suspicious activities.

The User Activity Audit app offers the logs of a user’s activity in the appian environment with comprehensive analytics, proactive monitoring, and notification.

Business use case supports an organization’s data protection and compliance program by providing an audit for a range of user activities as they work with applications built on the Appian platform provides answers to how different business users, stakeholders are using the various applications and offers insights to most commonly asked business questions.

The application enables the development of data privacy assessment program, the design of operational controls and data protection safeguards.Provides easy to integrate API’s for exporting data to log discovery tools and enterprise logging applications (for pattern determination etc.)

Targeted Business Use Cases

Supports an organization's Data Protection and Compliance Program by providing an audit for a range of user activities as they work with applications built on the Appian platform.

Provides answers to how different business users, stakeholders are using the various applications and offers insights to most commonly asked business questions.

A robust set of out-of-the-box configurable Alerts to inform and control suspicious user behavior

The application enables the development of data privacy assessment program, the design of operational controls and data protection safeguards.

Provides the easy to integrate API for exporting the data to logs discovery tools, enterprise logging application for determining the patterns from the data.

What Makes Appcino's User Activity Audit App Unique

The app provides answers to common yet rarely answered questions that drive critical business decisions. No such app is available on Appian AppMarket.

The app provides clear visibility of user's activity with comprehensive analytics, proactive monitoring, and notifications.

The app will be of great interest to customers across all business verticals.

Key Features

  • Easy to Understand Audits - Bringing user activity logs in an easy to understand user interface with multiple reports to analyze user activity patterns. Every report in the application has the capability to drill down to a granular level of detail.
  • Powerful Analytics - Visibility for application stakeholders to view the user work patterns. The Application offers 20+ different reports focusing on different areas of the Appian platform.
  • Risk Compliance Dashboard - User Activity Audit Application provides out-of-the-box Governance & Risk Compliance (GRC) reports and dashboard to strengthen the organization's security posture, prevent data leaks and avoid compliance-related complexities.
  • User's Personalized Dashboard - User's personalized dashboards with multiple preferred reports and capability to lock report filters with relative timelines. Reports can be configured to change based on each user preference at any time.
  • Application & Manage Administrative Activities - Completely Configurable - Easy to use configuration page of the application to manage all the setup and administrative activities, such as an ability to turn on/off any category of logs on-demand basis, dump historic logs, etc.
  • Proactive Monitoring - Out-of-the-box pre-defined rules set which users can configure for automated alerts for suspicious activity. Example - User Failed Login attempt, log in with risky IP Address, Administrator activity, etc.