July 20, 2022
More Than Half of Organizations Prioritize Security Over User Experience
Network visibility demands holistic approach to balance user experience with security

Written by: Broadcom Software Academy
July 20, 2022 – Modern organizations are challenged by conflicting demands to secure the enterprise while delivering excellent end-user experiences, according to new research sponsored by Broadcom Software. The survey found more than half of respondents prioritize security over the end-user experience, often at the expense of productivity and customer satisfaction. Further highlighting this conflict is the finding that 46 percent of respondents have bypassed security to improve user experiences.
The rapid rise of hybrid workers and increasing reliance on cloud applications is changing the way businesses operate. As a result, the traditional concept of a defense perimeter has also changed, adding significant complexity to an already complex challenge.
At the same time, visibility into the user experience is becoming more challenging. Respondents cited hybrid workers (44%), 3rd-party networks and ISPs (43%), and public cloud resources (41%) as the biggest impediments to full visibility. Interestingly, newer security initiatives such as Zero-Trust (26%) and SASE (23%) were also identified as contributing to the problem.
Respondents call for measurement of security’s impact on end-users
Survey respondents are largely united (92%) in their belief that monitoring the impact of security solutions on user experiences is critical. Further, 90 percent agree end-to-end user access paths for cloud-based applications should be monitored. And 68 percent state it is very important to monitor network security within the context of the entire system.
“There is no question security is critically important, but in a world made more competitive by digitalization, user experience is an equally critical driver of business success,” said Matt Stevens, Head of Network Observability, Agile Operations Division, Broadcom. “The complexity of modern business network infrastructure makes it very difficult for organizations to gain the visibility necessary to understand security’s impact on the end-user experience. As this research shows, this is driving a real need for visibility, measurement, and monitoring to help reverse the harmful tradeoff between security and user experience.”
Network security visibility demands holistic approach
When considering the impact of network security on the user experience, organizations demand a holistic approach. In fact, 66 percent believe network security solutions must be managed within the full context of the larger network including routers, switches, DNS, etc. Similarly, 68 percent stated it is very important to have the context of the larger system such as other infrastructure, applications, and services.
In a sign of growing user experience visibility issues, 97 percent of companies are planning on deploying Zero-Trust. Similarly, 96 percent plan to adopt SASE. Interestingly, while security professionals and executives may be at odds over the issue of security and user experience, 91 percent agree that having visibility into the user-experience is key for successfully adopting SASE.
Even as organizations adopt SASE, 83% of companies still employ a hybrid network security approach that utilizes both on-premises and cloud-based solutions. This means that digital experience monitoring solutions must span both traditional secure web gateway and SASE deployments to provide complete end-to-end visibility and meet the needs of most organizations.
User experience monitoring capabilities must evolve
When asked what features are required for a modern user experience monitoring solution, respondents cited several capabilities that directly support the need for holistic visibility and measurement, including:
- the ability to monitor users when working remotely (55%)
- easy to deploy (53%)
- integrate with network security solutions (51%)
- scalability (51%)
To learn more about the survey findings, download the full report: Dimensional Research: How to Avoid Tradeoffs Between Security And The User Experience.
Methodology:
Technology and security leaders at enterprise companies were invited to participate in a survey on their company's security practices. Participants were selected at random from an independent market resource. The survey was administered electronically by a third party, and participants were offered a token compensation for their participation. A total of 503 qualified participants from three continents completed the global survey.
About Broadcom
Broadcom Software is a world leader in business-critical software, delivering category-leading solutions with unmatched scale.
The Broadcom Software portfolio includes intelligent software solutions in infrastructure and security. Solutions from our CA Technologies and Symantec portfolios, and recently acquired AppNeta help companies worldwide transform their businesses.
Specifically, the portfolio spans AIOps, AppNeta, Cyber Security, Value Stream Management, DevOps, Mainframe, and Payment Security.
For more information, go to https://software.broadcom.com.
###
Other resources you might be interested in
Automic Automation Cloud Integration: DBT
This video explains the Automic Automation DBT agent integration and its benefits. Learn about the agent and find out how to install, configure, and use it.
Automic Automation Cloud Integrations: Cloud Foundry Agent Integration
This video explains the Automic Automation Cloud Foundry agent integration and its benefits. Learn how to install, configure, and use the agent.
Rally Office Hours: April 30, 2026
This Rally office hours video covers a new milestone delivery confidence framework, user Q&A on features like ranking, and upcoming event news.
Clarity: Objects, Attributes, and Views
In this course, you will master the five core functional areas of Clarity Admin Studio configuration that form the backbone of the user experience.
Enabling Secure HTTPS Communication with TLS Encryption for AutoSys Components
Workload Automation Administrators can gain essential knowledge on enabling secured HTTPS communication between AutoSys components using TLS encryption.
Automic Automation: Getting Started with the Automic Web Interface Version 26
Get started with the v26 Automic Web Interface (AWI). Learn how to navigate the modernized UI, customize your workspace, and move between perspectives.
Automic Automation v26: Zero Downtime Upgrade (ZDU)
Learn how to employ the Zero Downtime Upgrade (ZDU) process. Transition from Automic v24 to v26 while your mission-critical workflows continue to execute.
Rally Office Hours: April 23, 2026
Learn about new tools Rally provides for moving legacy pages to custom views. Listen to technical Q&A and find out about upcoming events.
ValueOps ConnectALL: Synchronize Jira and Rally for Frictionless Cost Accounting
This course teaches you how to integrate Jira data into Rally for the purpose of frictionless cost accounting in Clarity.