Enter Password to View Case Study

Enter Password to View Case Study

Network Navigator: Visualizing Supply Chain Risk

Network Navigator: Visualizing Supply Chain Risk

Network Navigator: Visualizing Supply Chain Risk

Ark.ai's Network Navigator, a graph-based intelligence workflow that transforms how SCRM Analysts uncover risks, surfacing hidden multi-tier vulnerabilities through interactive network visualization.

Ark.ai's Network Navigator, a graph-based intelligence workflow that transforms how SCRM Analysts uncover risks, surfacing hidden multi-tier vulnerabilities through interactive network visualization.

Ark.ai's Network Navigator, a graph-based intelligence workflow that transforms how SCRM Analysts uncover risks, surfacing hidden multi-tier vulnerabilities through interactive network visualization.

About the project

Supply Chain Risk Management (SCRM) Analysts needed to identify hidden vulnerabilities across multi-tier supplier networks, but existing database tools required hours of manual queries to trace entity relationships. Analysts couldn't visualize how risks cascaded through their industrial base or quickly respond to leadership requests for information. Through extensive research with SCRM Analysts and collaboration with Implementation Engineers (IEs), I designed Network Navigator: a graph-based intelligence workflow that surfaces hidden multi-tier vulnerabilities through interactive visualization, enabling SCRM Analysts to investigate supply chain risks in minutes instead of hours.

Role:

Lead Product Designer and Researcher

Tools:

Figma, FigJam, Lucid, V0

Team:

2 Product Managers, 2 Data Scientists, 3 Software Engineers

Timeline:

June 2025 - December 2025

CONTEXT

CONTEXT

CONTEXT

CONTEXT

The Challenge

The Challenge

Traditional database querying created barriers to uncovering multi-tier supply chain risks and vulnerabilities.

SCRM Analysts struggled to identify hidden vulnerabilities across multi-tier supplier networks. Traditional database tools required dozens of manual queries to trace entity relationships- often requiring partnership with data scientists to write custom searches. This fragmented approach obscured critical patterns and turned investigations that should take minutes into hours-long processes.

The Objective

SCRM Analysts struggled to identify hidden vulnerabilities across multi-tier supplier networks. Traditional database tools required dozens of manual queries to trace entity relationships- often requiring partnership with data scientists to write custom searches. This fragmented approach obscured critical patterns and turned investigations that should take minutes into hours-long processes.

The Objective

Design an intuitive graph visualization workflow that enables SCRM analysts to explore multi-hop supply chain relationships and identify hidden risks without manual database queries.

Through research with SCRM Analysts and collaboration with Implementation Engineers, design and ship a graph-based intelligence workflow that transforms supply chain risk analysis. The workflow needed to surface hidden vulnerabilities across multi-tier supplier networks through interactive visualization, enabling analysts to explore entity relationships, identify risk clusters, and complete investigations in minutes instead of hours- eliminating the need for manual database queries and custom data science queries.

Research & Discovery

Research & Discovery

Research & Discovery

Research & Discovery

Understanding Our Users

We began by conducting interviews with our deployment IEs who work onsite with SCRM Analysts 3-4 days per week. Through these initial conversations and analyses of existing client workflows, we identified two distinct analyst personas with different needs and use cases.

Primary User Groups:

HQ Analysts: These analysts are laser-focused on keeping specific programs on schedule and budget by identifying supplier vulnerabilities before they become disruptions. They leverage network analysis to rapidly answer RFIs (Requests for Information) from directors and find vulnerabilities within their supply chain that could cause disruption.

Program-Led Analysts: Strategic oversight analysts who need to instantly see how a single risky supplier could cascade into program delays and cost overruns across their industrial base. They use nodal analysis to brief leadership with exported risk summaries that quantify systemic risk impact and cross-program exposure.

Uncovering Limitations and Pain Points

Through shadowing sessions with IEs and workflow analysis of both analyst types, we discovered that existing database tools forced both analyst personas into inefficient, fragmented workflows that undermined their core responsibilities.

The pain points revealed during early research were true for both personas:

Time-Intensive Manual Mapping

Analysts spend hours manually tracing supplier relationships tier-by-tier, missing indirect risks that could cause disruptions

Hidden Dependencies Go Undetected

Current tools can't detect hidden risks and dependencies across multiple supplier tiers, leaving vulnerabilities unaddressed

Different Roles, Different Needs

HQ analysts need quick tactical answers while Program-Led analysts need strategic oversight- one interface must serve both

These findings defined our design requirements: build a graph visualization workflow that could instantly surface multi-tier supplier vulnerabilities for HQ Analysts responding to rapid-fire RFIs, while simultaneously providing Program-Led Analysts the systemic network views needed for leadership risk briefings.

Early Workflow Mapping

Based on these insights, we mapped the core analyst investigation workflow that both personas follow: select an entity of interest → explore network relationships → identify vulnerabilities → share findings.

While HQ Analysts use this flow for rapid RFI responses and Program-Led Analysts apply it to broader systemic analysis, the fundamental interaction pattern remained consistent.

DESIGN PROCESS

DESIGN PROCESS

DESIGN PROCESS

DESIGN PROCESS

Exploring Interaction Patterns and Iterations

After solidifying the conceptual maps, I began exploring how to translate database relationships into an intuitive graph interface. Early concepts tested different approaches: Should analysts start with a search query or a visual overview? How do we surface risk indicators without overwhelming the network view? What interaction patterns enable seamless traversal across multiple relationship tiers?

Through iterative wireframing, I balanced visual clarity with the density of multi-tier supplier data, ensuring HQ Analysts could quickly drill into specific entities while Program-Led Analysts could zoom out to see systemic patterns.

Testing and Validating with Users

As designs evolved from lo-fi to hi-fi, I conducted validation sessions with Implementation Engineers and SCRM Analysts to test core interaction patterns. These sessions revealed critical refinements needed to support both investigation modes:

Key Feedback:

  • Robust filtering in context - Analysts needed granular filters accessible directly within the graph view to narrow relationships by risk type, entity attributes, or connection strength without disrupting their investigation flow. This was particularly critical for HQ Analysts responding to time-sensitive RFIs

  • Contextual expansion controls - "Expand by Risk" and "Expand by Relationship" options needed to be contextual to each entity, allowing analysts to explore different connection types (suppliers, investors, beneficial owners) based on their current investigation focus rather than expanding the entire network indiscriminately

  • Data table integration was critical - For dense networks, Analysts needed a complementary table view showing detailed entity metrics alongside the visualization. This dual-view approach enabled Program-Led Analysts to identify patterns for leadership briefings while maintaining the graph's spatial context

Adapting the Design Through Development

As we moved from prototype to implementation, two critical challenges emerged that required design adaptation.

Pivoting the Technical Approach

Initial development used Sigma.js as our rendering library, but testing revealed critical gaps: the library didn't support lasso selection, click-and-drag manipulation, or badge components on cluster nodes- all essential for the analyst workflows we'd validated. This discovery led us to pivot to a more flexible rendering library, D3.js that could support these interaction requirements.

Incorporating Accessibility

Given the complexity of graph interactions, I partnered with engineers to design comprehensive keyboard navigation patterns and documented interaction shortcuts that enable analysts using assistive technologies to traverse networks, expand nodes, and access filtering controls without a mouse.

SOLUTION

SOLUTION

SOLUTION

SOLUTION

The Solution

Through iterative design, technical pivots, and continuous validation with Implementation Engineers and DOD SCRM Analysts, we launched Network Navigator, a workflow that transformed how DOD supply chain analysts investigate vulnerabilities across defense industrial base suppliers.

Visual Intelligence Through Interactive Graphs

Network Navigator transforms complex supply chain data into an intuitive, explorable network. Analysts can click any entity to view comprehensive summary cards with key risk indicators, financial health metrics, and compliance information- providing immediate context without leaving the graph view.

Contextual Exploration and Risk Analysis

The context menu provides node-specific actions that adapt to the analyst's investigation focus. Analysts can expand entities by relationship type (suppliers, investors, beneficial owners, etc.) or by risk category (FOCI, financial health, compliance, etc.), allowing them to trace multiple tiers of connections and uncover hidden dependencies across their supply chain.

Data Table Integration for Dense Graphs

When graphs contain many nodes, the integrated data table provides a synchronized view of entity details and metrics. Analysts can explore information in tabular format, sort and filter data, and identify patterns that might be harder to see in the visual network—making it easier to extract insights and export findings for reporting.

IMPACT

IMPACT

IMPACT

IMPACT

From Concept to Critical Tool

Network Navigator launched to 5 customer deployments and quickly became an essential tool for SCRM Analysts. The pilot validated the need for visual supply chain intelligence and demonstrated strong user engagement and positive feedback.

Usage

155

Analyses conducted in first 30 days

Conversion

20%

Increase in WAU across pilot deployments

satisfaction

5/5

Positive sentiment from pilot deployments

Internal feedback from Implementation Engineers highlighted the tool's impact: "It is landing with clients. We had demos with 3 deployments in the last two days where it demoed incredibly well and user feedback was incredibly positive. 'This is what I was expecting from Ark.ai when we were first sold it.'"

The team actively responded to user feedback and bugs while shipping version 1.1 updates, demonstrating strong traction and the potential for expanded deployment across additional customer organizations.

© Ash Cieplensky 2026

© Ash Cieplensky 2026