July 26, 2022
Optimizing Security and Digital Experiences: Why User Experience Monitoring is Key

Written by: Randy Budde
For just about any organization, there’s a balance that has to be struck between absolute security and absolute convenience. Seemingly, every new innovation that increases convenience also introduces new risks. On the other hand, every safeguard instituted can also create complexity, delays, or in some other way diminish the user experience. Either way, businesses are exposed, whether to the catastrophic consequences of breaches, or of an erosion of user productivity and customer retention.
For any enterprise operating in today’s digital world, navigating this tension between security and user experience represents an increasingly difficult balancing act.
New Report Examines How Teams Balance Security and Experience
How are companies balancing the competing demands of security and the user experience? A recent report draws on some research to provide a current examination of these topics. Produced by Dimensional Research and sponsored by Broadcom Software, the report is entitled How to Avoid Tradeoffs Between Security and the User Experience. The report’s authors surveyed more than 500 people, and respondents came from a range of industries and five different continents. Following are a few key takeaways from the report.
1. Security is a Priority, But Compromises are Being Made
In the tension between security and experience, survey respondents had a pretty consistent bias: When forced to pick, a significant percentage said they’d choose security, even if it compromised the user experience. (For the purposes of this report, the term “users” is defined in a broad fashion, explicitly including customers, employees, and partners.)
For example, 40% of respondents say security is more important than end users’ satisfaction and productivity. In addition, 54% of respondents said it is ok to negatively affect the user experience in an effort to improve security. Almost half (46%) feel it is acceptable to have user productivity diminished in exchange for improved security.
Given the limitations in place, teams have come to accept that compromises have to be made for the sake of security, but there are consequences. As the report authors write, “Applications and services that are difficult to use often result in customers leaving to find easier to use solutions, thus companies may be trading customers for increased security.”
Executives Prioritizing Security
When it comes to advocating for security within an organization, there’s often the perception that front-line security teams are on their own. However, the message on the need for security has definitely made it to the C-suite. Demands for security are coming from the top of organizations, and executives are accepting of the fact that security may have an adverse impact on users.
The survey found that, when asked about the acceptability of having security negatively impact the user experience and user productivity, it was executives who had the highest percentage of affirmative responses.

Compromises are Being Made
Given the prioritization of security, especially among top-level executives, it is somewhat surprising to see that many see they’re falling short of these ideals in practice. In fact, nearly half (46%) say they’ve resorted to bypassing security to improve the user experience.
2. User Experience Visibility a Requirement, and a Growing Challenge
Among survey respondents, there was remarkable consensus that establishing visibility of the user experience is key. 92% said they must monitor the impact security initiatives and solutions have on the user experience. In addition, 90% stated end-to-end paths for cloud-based applications must be monitored.
However, respondents made it clear that gaining the full visibility they require is getting more challenging. Across organizations, teams are seeing more remote users, more cloud services, and more third-party networks entering the mix. With the expansion of remote and hybrid work and the growing complexity of the networks relied upon, it gets more difficult to establish the visibility required. In fact, these increasingly complex network paths have the potential to erode both security and the user experience.
Survey respondents said hybrid workers (44%), third-party networks and ISPs (43%), and public cloud resources (41%) directly limit their visibility into the user experience. Further compounding the challenges is that virtually all respondents, 97%, have plans to adopt zero-trust strategies and 96% plan to employ secure access service edge (SASE) approaches, which can further obscure visibility into the user experience. 91% say visibility into the end-user experience is critical to the successful adoption of SASE. Fundamentally, respondents understand SASE will have an impact on the user experience, and know they need to understand how.

The vast majority, 83%, of companies are running a hybrid mix of security solutions, with some tools deployed on premises and some in the cloud. Therefore, it will be vital for teams to leverage solutions that deliver SASE visibility, and that are also aligned with these hybrid deployment realities.
3. New Capabilities are Urgently Required
Survey respondents were asked about features that were important in selecting a user experience monitoring solution, and the responses can be best summarized as “all of the above.”
Respondents were asked about a total of nine capabilities. Five out of the nine categories received 50% or higher responses, and even the lowest-rated category, “threshold alerts,” was selected by more than one-third (36%) of respondents.
Top responses included support for remote workers (55%), ease of deployment (53%), integration with network security solutions (51%), and scalability (51%). There was also near unanimous acknowledgement on the importance of managing network security solutions in the context of the larger network, such as routers, switches, DNS, and so on. 92% indicated this was very or moderately important. In addition, 94% said it was very or moderately important to monitor network security in the context of the larger ecosystem, including infrastructure, networks, applications, and services.

Broadcom Software Can Help
Broadcom Software makes it easier for customers to find the right balance between security and the user experience. Broadcom solutions feature AppNeta, which is a user-centric monitoring solution that provides comprehensive visibility for cloud, SASE, and modern networks, including those that are not owned by the enterprise. Plus, AppNeta features integration with Symantec products, offering an optimal complement to these solutions’ industry-leading security capabilities. To learn more, be sure to visit the AppNeta product page.
To learn more about how organizations around the world are managing the impact of security on user productivity and customer satisfaction, be sure to download the report, How to Avoid Tradeoffs Between Security and the User Experience.
Randy Budde
A freelance writer and editor, Randy has been developing content extensively in the enterprise security and software markets for more than 25 years. Over the years, he’s written on a wide range of technologies and topics, including artificial intelligence, automation and orchestration, BizOps, encryption, IT service...
Other resources you might be interested in
Top 3 Trends Defining Network Observability in 2026
Discover the three specific trends that will define network observability in 2026. See how unified observability and predictive AI will shape the landscape.
Rally Office Hours: December 18, 2025
Rally Office Hours features an AI-driven artifact breakdown tool that creates child items from features/stories. The Q&A covers capacity planning, forecasting and burnup charts.
Why 2025 Shattered the Old Rules of Network Management
This post reveals the five key lessons network operations leaders learned in 2025—and how they need to respond to be successful in 2026.
The 2026 VMUG Report: Why Network Observability is the Heart of the New VCF Era
Get the top takeaways from the VMUG Cloud Operations and VCF User Experience Report 2026. See why network observability is key to successful VCF 9 migrations.
Automic Automation Cloud Integration: SAP S/4 HANA Application Jobs Integration
Simplify your SAP S/4HANA job management. Integrate with Automic Automation for central configuration, monitoring, and orchestration of all your enterprise jobs.
Automic Automation Cloud Integration: OpenSSH Integration
Master Open SSH automation. Use Automic Automation for centralized control, secure file transfer, command execution, and full job monitoring.
Rally Office Hours: December 11, 2025
Discover Rally's new Ancestors field, static query box deprecation, non-conflicting saves, plus a dashboard demo and query writing tips.
3 Questions I Expect You to Ask Me
Ask these questions to gain a deeper understanding of a vendor. Find a partner who can solve today’s challenges and prepare you for what’s next.
Carrier-Grade Network Observability: A Technology Brief for Telco Network Operations
Network Observability by Broadcom unifies data to provide contextual, AI-enabled insights for superior service availability, accelerated MTTR and improved MTTI, reduced operational costs, and the...