As a client of Integrated Cyber, the IC360 gives you a single pane of glass from which you can access, view, and manage the potentially numerous different capabilities and applications you require to keep your company safe. The goal of the portal is to provide ‘context fusion’ between different views of the cyber lifecycle both in traditional high-level summary form – but through the easy inclusion of all the native applications and tools so you have one integrated experience.
This also ensures user administration is kept as simple as possible so that your users don’t even require direct access to some of these tools if you prefer it that way.
Though Integrated Cyber will set up your portal with the appropriate applications, tools, configurations and initial users, you are also able to customize it, extend it and add users directly as a Client Admin.
Getting to the Client Admin Panel
Only if your user account is set up as an Admin, will you be able to access Client Administration. Under the menu arrow next to your login avatar, you will see Edit Profile, Change Password, AND Administration.
Clicking on it will take you directly to the Client Admin Panel where you will see a set of tabs from User Authentication and Applications to Client-Specific Feeds. We will cover each in the following sections.
There are three types of User Authentication and we will typically set this up initially – but we recognize things may change after initial implementation:
IC360 Credentials – this is the default: a username and password scheme for basic authentication
Enable Two Factor Authentication – when this is set, the user will enter a One-Time Password sent to the mobile number configured in the application.
Single Sign-On (SSO) – if requested, Integrated Cyber can integrated with existing SSO services.
Integrated Cyber will initially configure basic personalization for each of our clients – but the client administrator may adjust these settings at any time directly in the admin console. The personalization settings are aimed at basic colors and logos consistent with each of our client’s branding.
To Change your Logo in the Title Panel of the portal, simply click on the Browse Logo button and search your local computer for a logo file. Logo files should be small but appropriate resolution and please find a transparent logo to avoid a white box when displayed.
To Change your Colors, click on the small pencil (edit) icon next to each item; Text, Button, or Tab.
A small popup window will help you adjust background or text colors with standard pre-defined colors, an adjustable palette, a slidebar, or an explicit HEX Code.
We recommend getting your company’s standard HEX codes in your marketing branding guidelines. This will ensure the colors are aligned accurately.
We have made it extremely easy to add applications to your portal, whether they are managed by Integrated Cyber or by your own team. We believe that a good cyber portal should bring all relevant applications into one platform, including local web applications, websites or third-party SaaS solutions.
The concept is simple: Each tab is associated with a name and a corresponding URL. This means your tabs could be websites or SaaS applications or even local web applications run by your own IT department. They are easy to add and configure to make your portal as relevant as possible.
To Add an Application, simply press the button. Standard Applications are pre-configured by Integrated Cyber but you can also add your own applications at any time.
Each application consists of a logical name which appears as a Tab in your portal. If you make your names too long, your tabs may wrap-around so think about conciseness.
The URL is either the third-party SaaS URL or the address of any non-application website.
You may specify the order of your tab during initial setup or re-arrange them using the up/down arrows to the left of each Application Name in the main view.
Applications may be edited or deleted or disabled at any time.
Additional Setup - Seamless Login
While the portal itself can integrate with an Enterprise SSO or offer two-factor authentication, IC360 also offers the option of a seamless login experience to whatever SaaS application is configured in its tabs. In doing so, the user needs only log in once to the main IC360 portal and any additional login steps are configured to occur seamlessly.
Note: Seamless is not the same as SINGLE Sign-On. Single sign-on is supported and enables our portal to be integrated into existing credentials in your company. Seamless Login refers to an automated insertion of traditional usernames in non-SSO-enabled applications you might include in the portal.
Only Admins have the rights to configure seamless login. The Integrated Cyber admin can pre-configure standard applications to work in ‘seamless mode’ across all clients – and Client Admins can configure their own applications to work in this fashion as well.
To enable Seamless Login, you will see an Action option called Additional Setup next to each application row in the Application tab. Click on it – and select the Enable Seamless Sign On (login) option.
The other fields are described below – which basically instructs which fields correspond to which login variables to be securely encrypted and stored for Seamless Login.
Discovering the Username and Password (and submission) variables
To obtain the Username, Password, and Submit Selectors, open the application website in a browser, and go to the application’s sign-in page. (The screenshots below are from Google Chrome, but the process in other browsers is similar.)
The example starting on the next page uses the “Incident Detection and Response for Small Business” () application, but the process is the same for any web application. Open a separate browser and navigate to the SaaS URL you wish to configure and follow these directions.
1. On the sign-in page, right-click the username field, and select Inspect:
A detailed inspection window will appear to the right of your web page, showing you a lot of detailed HTML code. You will notice that part of that detail is highlighted, corresponding to the field you were on originally when you ’right-clicked’ the Inspect option.
You will see ‘Input Placeholder – ‘Username or email address’ below which is the section we will focus on.
2. Now, Right-click the highlighted <input> tag and select “Copy > Copy JS path”.
3. Paste the JS path into Notepad or Mac equivalent.
4. Copy the querySelector value (in this example #edit-name) and paste it into the Username Selector field in the Additional Setup dialog box.
5. Repeat this process using the sign-in page password field to obtain the Password Selector.
6. Many websites have an automatic ‘submission’ effect once the password is set… Other websites have an explicit ‘login or sign-in’ button. To make sure the equivalent of a ‘return’ or ‘submission’ occurs, follow the same process for the submission button.
While the portal itself can integrate with an Enterprise SSO or offer two-factor authentication, IC360 also offers the option of a seamless login experience to whatever SaaS application is configured in its tabs. In doing so, the user only needs to log in once to the main IC360 portal and any additional login steps are configured to occur seamlessly.
Only Admins have the rights to configure seamless login. The Integrated Cyber admin is able to pre-configure standard applications to work in ‘seamless mode’ across all clients – and Client Admins are able to configure their own applications to work in this fashion as well.
You can easily add users to your Portal environment or manage those users previously added. Users may be set up as ADMIN or as regular users and there are no limits to how many users you may add.
To Add a User, simply press the corresponding button and insert the information as shown here on the right. A user may belong to more than one company (for instance, if you want to set up two portal environments).
The email address and mobile phone are important as they are used to authenticate. The First and Last Names are not used in authentication, so nicknames are allowed.
New users will receive an invitation in an email to download the portal on their computer. At any point, you may also Reinvite a user if they require a new download.
Integrated will pre-complete this section of the administration process, but you may adjust your Client details at any time in this tab – changing contact name or any other details.
The Contact Name should be the primary person responsible for the administration of the Portal in case of support issues.
The email is required on all accounts.
Client Specific Feeds
Once again, Integrated Cyber will typically manage this section of the administration portal, configuring a specific news feed for each client. This allows Integrated Cyber to send weekly account information, threat alerts and other formatted newsfeeds directly to the right-hand-side panel in the portal.
The format is a JSON file and, if desired, the client may also manage this file – specifying the correct URL in the field shown below.
We do NOT recommend adjusting this unless you have established a process for formatting and managing the content of the JSON file.
This is a new feature in BETA and will be enhanced over the following quarters. The intention of this page is to provide an aggregation point of newsfeeds, contact information (client teams and key contacts at Integrated Cyber) as well as a clean executive dashboard of the most important reports or information.
The reporting capability, which will eventually allow aggregation of data from across multiple Cyber applications, is still in development and not available at this time.
On the left side, you will see that the layout of the homepage can be easily adjusted with multiple widget windows and layout styles based on the amount of content and your preference.
Think of each rectangle as a separate panel with separate content. Each panel can then be configured to contain one of four different types of information. We will continue to create new panel types on a regular basis:
Team Roster – for capturing your own team or Integrated Cyber’s team or both
RSS Feed – either JSON feeds or online RSS Feeds for threat intelligence or news
Reporting – in development!
This Panel type stores contact names, contact information and photos of teams. You can create as many teams as you wish with as many people per team as you required. The goal of this panel type is to make it easy to find people relevant to the cyber operations – whether they are key members of your own cyber team, perhaps other colleagues in IT or elsewhere or even the Integrated Cyber contacts.
Depending on your Panel Layout, you can drag the TEAM MEMBERS Content Template into any space on the right-hand side under Home Preview.
To Edit the Content Template, click on the small edit icon. You will then have the ability to specify a JSON file that contains whatever information you would like for each person, from name to role to a photo.
Depending on your JSON file, you will be able to set the keys and associate them with friendly names in the panel itself.
Please don’t hesitate to ask for support from Integrated Cyber to set this up. We will provide our own team as an example to help you set up your own. For those familiar with the JSON format, this should be very straightforward.
Names can then be added in the JSON file as you require. This is simply the display of that file.
This Panel type lets you add specific RSS Feeds OR a customized JSON file of any format you wish. This gives you unlimited flexibility to either add popular news feeds or create your own newsletters, educational content or other announcements.
To Edit the Content Template, click on the small edit icon. You can then specify one of our pre-configured RSS feeds or create your own JSON file formats. We will also create pre-formatted files for your convenience.
At this point, this feature is still in early Beta as we work through use-cases and customer requirements. Please share input and ideas for us to improve this feature.
The JSON Files behave similarly to the Team Roster by allowing you to manage the keys in the file, edit friendly names and hide sections if desired. These feeds can include logos and graphics and provide extensive flexibility for publishing newsletters and intel.
Integrated Cyber will continue to create content for use by all of our clients.