Go to website
Learn the features and functionality of the Cymatic platform
This document covers the various settings available within the Cymatic platform. Disabling this feature will stop all activity and incident generation. The script does not need to be removed from the web application Cymatic is protecting. This section controls the various rules for your web app password requirements. Along
The user intel page contains data on how your user base interacts with your web app and what risks they are posing. There are two different containers on this page; authentication and profiles. In this guide, we will cover what the different widgets on this page represent. In the upper right hand corner, there is a dropdown that allows you to define the search time period. The options range anywhere from the last day up to the last three months. The default filter is set to the last day. T
This guide will explain the four different types of activities, and what types of interaction is required for each to be populated. The landings page shows the initial request to your web app from a browser. The data shown includes: Destination URL Connecting IP address and its geolocation The type of device that made the request(operating system and browser) Threat flags Date and time of the request The available filters include: Browser type Opera
The analytics page contains various graphs and charts representing different detections Cymatic has made related to your user base and how they are interacting with your web application. In this guide, we will cover what the different graphs on this page represent. In the upper right hand corner, there is a dropdown that allows you to define the search time period. The options range anywhere from the last day up to the last three months. The default filter is set to the last day. This time
This guide explains what a profile is and what data each profile contains. A profile is an account that is automatically created in Cymatic once an entity authenticates via your login form. The purpose of the profile is to tie different attributes of the entity together in a single location. Each legitimate username will be assigned a Cymatic ID and its own profile. The username itself is referred to as an alias. The available search filters on the profile
This guide explains how Cymatic scores and displays IP Reputation and Fraud data.