Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

3 Steps to Building User-Friendly and Secure Systems

Marrying Security and UX – The Unlikely Couple

By George Brostoff
password enews
March 28, 2017

Today organizations are faced with a dilemma when it comes to balancing the need to deliver an exceptional user experience on desktop and mobile devices and protecting company and personal data. Protection can run the gamut from no password needed, inputting a fingerprint or a litany of passwords every few minutes, or the use of more modern and secure innovations such as continuous biometric verification and recognition.

As a “security guy” myself, the idea of vulnerable data gives me cold sweats, but as a “regular guy” who buys tickets, sends email and checks my bank balance through my computer and mobile phone, I have to admit that a constant barrage of security measures is annoying. And it’s not just an inconvenience: companies lose billions of dollars a year as a result of customers not completing transactions because there are too many roadblocks – including security prompts.

Let’s be realistic – nobody likes to deal with remembering usernames and passwords or using multi-factor security. However, with the ever-increasing number of data and public network breaches, internet hacking and the proliferation of malicious software, companies can’t ignore security and the user experience.  

As more new security technologies like continuous biometric verification and recognition become more commonplace, IT and UX professionals need to work closer than ever before to create a consistent, scalable and secure solution that meets the needs of their organization and their end-user.

Two Worldviews

On one hand, you have the IT folks who are paid to be paranoid and risk averse. For them, the best way to fulfill those goals is to proceed with caution and, unless there is a strong business case, they are reluctant to change even though the established solutions may often lack the ability to cope with today’s usage models. Keeping an organization’s crown jewels safe, whether they’re proprietary financial data, customer login information, account numbers, snail mail addresses, billing information and other information that should be kept private, is the team’s priority.

On the flip side of the coin, you have the design teams and ultimately the business people who are focused on making it possible for all current and future customers (and in the enterprise, users) to interact with their products and services as easily, intuitively and quickly as possible.

Not surprisingly, it is common for two teams with equally valid viewpoints to find themselves on opposite sides of the security-versus-UX debate. In fact, this is such a problem that it actually has its own acronym. The link between user experience and security has been closely studied and is known as HCISec (also referred to as HCI-SEC or Human Computer Interaction and Security). Security professionals need to know that while their focus is on system security, they simply cannot overlook user experience.

While their primary objective is to allow authorized users to access to their company’s systems, they also need to keep in mind that the ways in which users interact with their system have broader business implications. Individual customers who have a negative user experience when interacting with a company’s security protocols may simply not log in, or if they do, they may not purchase anything and very likely they won’t return. From an enterprise perspective, intuitive and simplified security delivers improved workflow as well as increased efficiency. Both outcomes directly impact a company’s bottom line and ultimately its long-term success.

 

Finding Common Ground

Now that we’ve looked at the problem, it’s time for some good news. For most systems, applying smart user experience principles can actually improve their security. But it can only happen if all parties are aware of the overarching guidelines for the two stakeholder groups:

  • For user experience designers, the question is: How do you design the security experience to fit the needs of managing a secure digital identity?
  • For security professionals, the question is: How do you enable your customers to do business with speed and comfort while feeling secure?

There are three steps that I recommend for designing a state-of-the art security solution that will satisfy both end-user customers and enterprise clients.

  1. Capture the data – Where is your security solution impacting the company in financial terms – look at abandoned shopping carts, trending around repeat customers, number of related trouble tickets, etc. Post a survey if necessary, but get the information you need to determine the impact of UX on users’ security experience.
  2. Map the data to potential revenue and cost savings – If everyone who left your site because of a clumsy security process UX had in fact purchased a product or service, what is the potential revenue?
  3. Establish a Task Force to create an improved solution based on the data collected – Include everyone with skin in the game – line of business execs, IT, marketing, communications, finance, strategy– whoever has an interest in the security solution being successful.

The ultimate goal is twofold: creating an authentication system that provides robust security and that customers believe protects their information, while at the same time providing an easy way to securely do business with your organization through any internet-enabled device.

That’s more than a technical issue – it’s a philosophical one and an organizational one. Forward-thinking leaders need to recognize that security and user experience are not mortal enemies, and that they can actually coexist. And companies that don’t are going to get left behind.

KEYWORDS: data security password management user experience UX security

Share This Story

George Brostoff is Co-founder and CEO of Sensible Vision. He has been an industry-recognized entrepreneur in the computer, security, and communications industry for more than 20 years. He has founded three successful start-ups, including one public company.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

American flag

ICE Acting Director Todd Lyons to Resign

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing