Why Choose Our Dashboards
Drawing on a decade of enterprise authentication deployment, we’ve built the tools identity administrators need but never have time to create—answering the questions that inevitably arise during deployment.
Real-Time Insight
Use a purpose-built solution to monitor your phishing-resistant deployment.
- Real-time adoption rates across departments and user groups
- Phishing-resistant auth methods (Windows Hello, Platform SSO, passkeys)
- Non-phishing-resistant auth methods (SMS, Authenticator Push, OTP)
Designed for Security Leaders
Perfect for CISOs, Identity & Access Management teams, and security administrators who need:
- Evidence of successful deployment
- Early identification of adoption challenges
- Clear metrics to guide implementation strategy
- Documentation for compliance and security reviews
Example Chart: WHFB users without passkey

One of the available charts visualizes the gap between Windows Hello for Business (WHFB) adoption and passkey registration:
- Primary Metric: Users with WHFB and at least one registered passkey
- Goal: For each department, drive up metric to maximize protected users
- Success Indicator: Increasing trends represent stronger phishing resistance
Why This Matters
WHFB protects enrolled devices, passkeys deliver additional security:
- Access from non-WHFB devices when needed
- Self-service account recovery capabilities
- Streamlined new device onboarding
Department-Level Insights
The dashboard reveals adoption patterns requiring different approaches:
- Support Team (Yellow): The steep upward trajectory demonstrates successful implementation, likely resulting from effective leadership support
- Engineering Team (Blue): The flat trend indicates potential resistance or implementation challenges requiring executive intervention
Specific To Auth Deployments
Our dashboards take into account several characteristics of auth deployments:
- Device Management: Decommissioned WHFB devices or replaced phones with passkeys may remain in Entra/Intune, skewing your metrics
- Regional Challenges: Teams in China face unique constraints with Google Play and Apple App Store limitations affecting mobile authentication options
- Deployment Phases: Adoption is typically driven in phases to spread helpdesk calls over a period of time.