User Experience is King at the Intersection of IT and SaaS
July 16, 2018

Patricia Diaz-Hymes
Lakeside Software

Share this

The question of SaaS-based technology over the past decade has quickly changed from "should we?" to "how soon can we?" even for the most customized and regulated of industries. And it's no surprise. The benefits of SaaS extend beyond the undeniable OPEX vs CAPEX conversation and into its byproduct — the opportunity to more productively and securely support business users.

As a result, critical business processes and resources are shifting to SaaS, beyond business applications for HR and Sales departments. Take for instance the much publicized Windows 10 "OS as a service" offering (a.k.a. Windows evergreen) that is shifting key aspects of the SaaS business model, namely its continuous feature and quality updates.

This macro move toward SaaS has brought many user and business-friendly features like frictionless authentication and mobility, not to mention its simpler onboarding that enables any line of business to procure software. However, this move has also encouraged a series of IT "best practices" that have potential impacts on the employee digital experience, organizational risk and ultimately, productivity. To get work done, users look and often find workarounds that improve their end-user experience.

I'm not suggesting IT needs to become an enforcer. Instead, I posit that IT can coexist with stellar end-user experience given endpoint visibility into the performance and usage of IT resources and services in the estate. By endpoint visibility, I'm referring to properly monitoring end-user experience and all the factors that may be impacting it directly from the endpoint.

Here are four major IT best practices:

1. Lock down corporate-issued laptops or mobile devices

User workaround: With a growing number of business-critical apps now running via the browser, the attractiveness of locking down corporate-issued devices becomes that much more appealing. While it is a security best practice, it also drives employees to bring unsanctioned devices into the workplace which, in turn, increases organizational risk.

Fix: Consider using a monitoring tool to either test a BYOD program or allowing for increased user rights to their corporate-issued devices. The right monitoring tool should be able to measure and alert in case of risk – be it app, data or access-related.

2. Offload management to SLA vendors

User workaround: Just as the shift to OPEX has very real budgetary benefits, many SaaS-based technologies also have real implications for user experience, namely when it comes to pushed updates bringing endpoint performance implications, unscheduled downtime, and slow time to resolution when SLA issues arise. As a result, users can, and often do, resort to uninstalling updates or even using their own devices until IT fixes the issue.

Fix: Track SLA performance and more specifically, the endpoint resources the service level agreement (SLA) solution is consuming (CPU, memory, you name it). Not only can responsibility for resolving the issue be assigned but it can help ensure transparency in the license agreement. This monitoring, if done properly, can reduce time to resolution and discourage users from having to uninstall performance-impacting updates.

3. Move all users to SaaS-based intranets and file sharing

Workaround: Given slow or complicated SaaS apps, some employees tend to save documents, sensitive or not, locally to "erase them later." Others continue to save files locally, but leave their laptops at the office in an effort to minimize the risk of data loss due to theft at home. But with SaaS apps helping provide an additional layer of access and data security, these user workarounds increase organizational risk.

Fix: Before rolling out these technologies, track user patterns and assign personas based on observed usage. Perhaps there are in-office employees that could save resources locally in a corporate desktop. After rollout, consider measuring how end-user experience has improved or declined and continue to track usage to see where improvements can be made.

4. Install high volumes of security software on endpoints

Workaround: Many times, security technologies slow down system performance and, in turn, employees seek and find ways of disabling those tools to enhance device performance.

Fix: Continuously monitor endpoint performance so that IT can be alerted when user experience declines due to any given (security) app using too many critical endpoint resources.

Takeaways

SaaS is here to stay and evolve. How we shape the workspace to use and consume them is, in large part, up to IT. Endpoint visibility into the environment using digital experience monitoring tools can play a role in making the transition to these technologies that much easier not just for IT but also for those working in them — our end-users.

Patricia Diaz-Hymes is Sr. Product Marketing Manager at Lakeside Software
Share this

The Latest

October 19, 2018

APM is becoming more complex as the days go by. Server virtualization and cloud-based systems with containers and orchestration layers are part of this growing complexity, especially as the number of data sources increases and continues to change dynamically. To keep up with this changing environment, you will need to automate as many of your systems as possible. Open APIs can be an effective way to combat this scenario ...

October 18, 2018

Two years ago, Amazon, Comcast, Twitter and Netflix were effectively taken off the Internet for multiple hours by a DDoS attack because they all relied on a single DNS provider. Can it happen again? ...

October 17, 2018

We're seeing artificial intelligence for IT operations or "AIOps" take center stage in the IT industry. If AIOps hasn't been on your horizon yet, look closely and expect it soon. So what can we expect from automation and AIOps as it becomes more commonplace? ...

October 15, 2018

Use of artificial intelligence (AI) in digital commerce is generally considered a success, according to a survey by Gartner, Inc. About 70 percent of digital commerce organizations surveyed report that their AI projects are very or extremely successful ...

October 12, 2018

Most organizations are adopting or considering adopting machine learning due to its benefits, rather than with the intention to cut people’s jobs, according to the Voice of the Enterprise (VoTE): AI & Machine Learning – Adoption, Drivers and Stakeholders 2018 survey conducted by 451 Research ...

October 11, 2018

AI (Artificial Intelligence) and ML (Machine Learning) are the number one strategic enterprise IT investment priority in 2018 (named by 33% of enterprises), taking the top spot from container management (28%), and clearly leaving behind DevOps pipeline automation (13%), according to new EMA research ...

October 09, 2018

Although Windows and Linux were historically viewed as competitors, modern IT advancements have ensured much needed network availability between these ecosystems for redundancy, fault tolerance, and competitive advantage. Software that offers intelligent availability enables the dynamic transfer of data and its processing to the best execution environment for any given purpose. That may be on-premises, in the cloud, in containers, in Windows, or in Linux ...

October 04, 2018

TEKsystems released the results of its 2018 Forecast Reality Check, measuring the current impact of market conditions on IT initiatives, hiring, salaries and skill needs. Here are some key results ...

October 02, 2018

Retailers that have readily adopted digital technologies have experienced a 6% CAGR revenue growth over a 3-year period, while other retailers that have explored digital without a full commitment to broad implementation experienced flat growth over the same period ...

October 01, 2018

As businesses look to capitalize on the benefits offered by the cloud, we've seen the rise of the DevOps practice which, in common with the cloud, offers businesses the advantages of greater agility, speed, quality and efficiency. However, achieving this agility requires end-to-end visibility based on continuous monitoring of the developed applications as part of the software development life cycle ...