The adoption of cloud computing among enterprises continues to accelerate. Seventy percent of organizations have at least one cloud-based application, and they are investing US $1.62 million in cloud computing on average, according to the latest 2016 IDG Enterprise Cloud Computing Study.
With cloud computing in position to become the standard for enterprise IT, many businesses around the world are using it as the cornerstone of their IT infrastructure, transforming traditional operations and processes as a result. However, this poses the challenge of maintaining a balance between optimizing the user experience and keeping data secure, either for employees or customers.
To increase productivity, enterprises nowadays tend to encourage workforce mobility by allowing employees to access business information and applications using mobile devices via the cloud. This migration to cloud-based storage does, however, magnify the security risks to a company's confidential data and resources. A recent Ponemon Institute Study showed that 83% of IT departments agree that employees' devices put an enterprise at risk, and a single mobile device can cost the victim organization an average of US $9,485 when infected with malware.
In addition to the rise of mobile security threats, the increasing number of cyber-attacks and hacking has pushed corporations to up the ante on their applications' security protocols, regardless of whether they are desktop or mobile-based. The downside lies in that more gateways and safety measures equal a larger impact on the speed and efficiency of an enterprise's cloud computing capabilities. Customers or employees lose patience with webpages or applications that are slow to load due to extensive security measures, especially with respect to online retail platforms or corporate websites.
Enterprises should strike a thoughtful compromise between ensuring a high-quality user experience, and maintaining network and cloud security. Most importantly, they should set up company policies that are in place with compliance regulations on data storage and privacy, such as HIPPA and SOX. Security should not be so rigid and cumbersome to make the user experience a grind, nor should it be so lax that an enterprise's data is put at risk to give users a completely hassle-free experience. It often helps to educate users that some safeguards are necessary to keep data secure, which will make them more willing to accept a slightly less than perfect user experience.