User Experience is King at the Intersection of IT and SaaS
July 16, 2018

Patricia Diaz-Hymes
Lakeside Software

Share this

The question of SaaS-based technology over the past decade has quickly changed from "should we?" to "how soon can we?" even for the most customized and regulated of industries. And it's no surprise. The benefits of SaaS extend beyond the undeniable OPEX vs CAPEX conversation and into its byproduct — the opportunity to more productively and securely support business users.

As a result, critical business processes and resources are shifting to SaaS, beyond business applications for HR and Sales departments. Take for instance the much publicized Windows 10 "OS as a service" offering (a.k.a. Windows evergreen) that is shifting key aspects of the SaaS business model, namely its continuous feature and quality updates.

This macro move toward SaaS has brought many user and business-friendly features like frictionless authentication and mobility, not to mention its simpler onboarding that enables any line of business to procure software. However, this move has also encouraged a series of IT "best practices" that have potential impacts on the employee digital experience, organizational risk and ultimately, productivity. To get work done, users look and often find workarounds that improve their end-user experience.

I'm not suggesting IT needs to become an enforcer. Instead, I posit that IT can coexist with stellar end-user experience given endpoint visibility into the performance and usage of IT resources and services in the estate. By endpoint visibility, I'm referring to properly monitoring end-user experience and all the factors that may be impacting it directly from the endpoint.

Here are four major IT best practices:

1. Lock down corporate-issued laptops or mobile devices

User workaround: With a growing number of business-critical apps now running via the browser, the attractiveness of locking down corporate-issued devices becomes that much more appealing. While it is a security best practice, it also drives employees to bring unsanctioned devices into the workplace which, in turn, increases organizational risk.

Fix: Consider using a monitoring tool to either test a BYOD program or allowing for increased user rights to their corporate-issued devices. The right monitoring tool should be able to measure and alert in case of risk – be it app, data or access-related.

2. Offload management to SLA vendors

User workaround: Just as the shift to OPEX has very real budgetary benefits, many SaaS-based technologies also have real implications for user experience, namely when it comes to pushed updates bringing endpoint performance implications, unscheduled downtime, and slow time to resolution when SLA issues arise. As a result, users can, and often do, resort to uninstalling updates or even using their own devices until IT fixes the issue.

Fix: Track SLA performance and more specifically, the endpoint resources the service level agreement (SLA) solution is consuming (CPU, memory, you name it). Not only can responsibility for resolving the issue be assigned but it can help ensure transparency in the license agreement. This monitoring, if done properly, can reduce time to resolution and discourage users from having to uninstall performance-impacting updates.

3. Move all users to SaaS-based intranets and file sharing

Workaround: Given slow or complicated SaaS apps, some employees tend to save documents, sensitive or not, locally to "erase them later." Others continue to save files locally, but leave their laptops at the office in an effort to minimize the risk of data loss due to theft at home. But with SaaS apps helping provide an additional layer of access and data security, these user workarounds increase organizational risk.

Fix: Before rolling out these technologies, track user patterns and assign personas based on observed usage. Perhaps there are in-office employees that could save resources locally in a corporate desktop. After rollout, consider measuring how end-user experience has improved or declined and continue to track usage to see where improvements can be made.

4. Install high volumes of security software on endpoints

Workaround: Many times, security technologies slow down system performance and, in turn, employees seek and find ways of disabling those tools to enhance device performance.

Fix: Continuously monitor endpoint performance so that IT can be alerted when user experience declines due to any given (security) app using too many critical endpoint resources.

Takeaways

SaaS is here to stay and evolve. How we shape the workspace to use and consume them is, in large part, up to IT. Endpoint visibility into the environment using digital experience monitoring tools can play a role in making the transition to these technologies that much easier not just for IT but also for those working in them — our end-users.

Patricia Diaz-Hymes is Sr. Product Marketing Manager at Lakeside Software
Share this

The Latest

April 18, 2019

A vast majority of organizations are still unprepared to properly respond to cybersecurity incidents, with 77% of respondents indicating they do not have a cybersecurity incident response plan applied consistently across the enterprise, according to The 2019 Study on the Cyber Resilient Organization, a study conducted by the Ponemon Institute on behalf of IBM ...

April 17, 2019

People and businesses today make mistakes similar to Troy, when they get too enamored by the latest, flashiest technology. These modern Trojan Horses work through their ability to "wow" us. Cybercriminals find IoT devices an easy target because they are the cool new technology on the block ...

April 16, 2019

Software security flaws cause the majority of product vulnerabilities, according to the 2019 Security Report from Ixia's Application and Threat Intelligence (ATI) Research Center ...

April 15, 2019

The majority of organizations (nearly 70 percent) do not prioritize the protection of the applications that their business depend on — such as ERP and CRM systems — any differently than how low-value data, applications or services are secured, according to a new survey from CyberArk ...

April 12, 2019

While 97 percent of organizations are currently undertaking or planning to undertake digital transformation initiatives, integration challenges are hindering efforts for 84 percent of organizations, according to the 2019 Connectivity Benchmark Report from MuleSoft ...

April 11, 2019

Companies have low visibility into their public cloud environments, and the tools and data supplied by cloud providers are insufficient, according to The State of Public Cloud Monitoring, a report sponsored by Ixia ...

April 10, 2019

Without improvement in time and budget constraints, the majority of tech pros (75 percent) say they will be unable to confidently manage future innovations, according to IT Trends Report 2019: Skills for Tech Pros of Tomorrow, a new report from SolarWinds. This reality ultimately puts businesses at risk of performance and competitive advantage losses, making the prioritization of skills and career development for tech pros paramount ...

April 09, 2019

Tech pros have one foot grounded in today's hybrid IT realities while also setting their sights on emerging technology, according to IT Trends Report 2019: Skills for Tech Pros of Tomorrow ...

April 08, 2019

This Thursday EMA will be presenting a webinar — Automation, AI and Analytics: Reinventing ITSM — covering recent research. There were quite a few surprises. And in fact, many of the surprises indicated a yet-more-positive outlook than we expected ...

April 05, 2019

Almost three-fourths (69 percent) of organizations have plans to deploy 5G by 2020, according to a new 5G use case and adoption survey by Gartner. Organizations expect 5G networks to be mainly used for IoT communications and video, with operational efficiency being the key driver ...