SlideShare uma empresa Scribd logo
1 de 16
Five Facts About Application
Usage on Enterprise Networks
                   in the USA



     Application Usage and Risk Report
                        December 2011
Average number of social networking
      applications per organization?




A total of 69 different social networking applications were
 found in 96% of the 395 participating organizations with an
            average of 15 found on each network.
Which application is used more heavily?




 Based on the percentage of social networking bandwidth
  consumed, Zynga was used more heavily (7%) than
Linkedin (4%). Facebook and Twitter consumed 40% and
                   21% respectively.
Active social networking applications (games, plugins,
   posting) are used more heavily in the USA than they are
globally. Facebook is a clear dominant player with 40% of BW
                          consumed.
Average number of browser-based
filesharing applications per organization?




   A total of 55 different browser-based filesharing
 applications were found in 95% of the 395 participating
      organizations with an average of 11 in each.
Browser-based filesharing use cases: work or
entertainment. Both uses have a common set of business
   and security risks that organizations must address.
The number of applications
         using Port 80 (tcp/80) only?




The number of applications that ONLY use Port 80 is 270 or
  24% of the 1,121 applications found in the participating
                       organizations.
Percentage of total bandwidth consumed
    by applications not using tcp/80?




54% of the total bandwidth is being consumed by 534 (48%
of 1,121) applications that DO NOT USE port 80 at all. Ever.
Port 80 only security is shortsighted. The common
perception is that Port 80 (tcp/80) is where all the traffic and all
     the problems are. A port 80 emphasis is an absolute
       requirement; but too much focus is shortsighted.
Palo Alto Networks Application Usage
           and Risk Report

   www.paloaltonetworks.com/aur

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
Palo Alto Networks Application Usage and Risk Report - Key Findings for DachPalo Alto Networks Application Usage and Risk Report - Key Findings for Dach
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
Palo Alto Networks Application Usage and Risk Report - Key Findings for FrancePalo Alto Networks Application Usage and Risk Report - Key Findings for France
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for KoreaPalo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for TaiwanPalo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for SpainPalo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Palo Alto Networks Application Usage and Risk Report - Key Findings for ChinaPalo Alto Networks Application Usage and Risk Report - Key Findings for China
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for NordicsPalo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
 
Application Usage on Enterprise Networks, December 2011.
Application Usage on Enterprise Networks, December 2011.Application Usage on Enterprise Networks, December 2011.
Application Usage on Enterprise Networks, December 2011.
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Data As Air
Data As AirData As Air
Data As Air
 
Better Security Through Big Data Analytics
Better Security Through Big Data AnalyticsBetter Security Through Big Data Analytics
Better Security Through Big Data Analytics
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
Nuevas tecnologías a nivel de hogares
Nuevas tecnologías a nivel de hogaresNuevas tecnologías a nivel de hogares
Nuevas tecnologías a nivel de hogares
 
Smartphone User Persona Report 2015 - Malaysia (Infograph)
Smartphone User Persona Report 2015 - Malaysia (Infograph)Smartphone User Persona Report 2015 - Malaysia (Infograph)
Smartphone User Persona Report 2015 - Malaysia (Infograph)
 
Smartphone User Persona Report 2015 - Thailand (Infograph)
Smartphone User Persona Report 2015 - Thailand (Infograph)Smartphone User Persona Report 2015 - Thailand (Infograph)
Smartphone User Persona Report 2015 - Thailand (Infograph)
 
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
 
CPDone: Is the BPO Industry Ready for External Compliance Focus?
CPDone: Is the BPO Industry Ready for External Compliance Focus?CPDone: Is the BPO Industry Ready for External Compliance Focus?
CPDone: Is the BPO Industry Ready for External Compliance Focus?
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Avast Q1 Security Report 2015
Avast Q1 Security Report 2015Avast Q1 Security Report 2015
Avast Q1 Security Report 2015
 

Destaque

организация и методика выполнения проектов в физ ре
организация и методика выполнения  проектов в  физ реорганизация и методика выполнения  проектов в  физ ре
организация и методика выполнения проектов в физ ре
Анна Денисенко
 
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
FSU-ITS
 
Bb w ppt_content_conferencesession-ittakesa_village_final
Bb w ppt_content_conferencesession-ittakesa_village_finalBb w ppt_content_conferencesession-ittakesa_village_final
Bb w ppt_content_conferencesession-ittakesa_village_final
FSU-ITS
 

Destaque (17)

Vida
VidaVida
Vida
 
ош № 2 отчет презентация о недели обж,нвп и мсп
ош № 2 отчет презентация о недели обж,нвп и мспош № 2 отчет презентация о недели обж,нвп и мсп
ош № 2 отчет презентация о недели обж,нвп и мсп
 
Priority moments digital
Priority moments digitalPriority moments digital
Priority moments digital
 
Connected.
Connected.Connected.
Connected.
 
Apuntes
ApuntesApuntes
Apuntes
 
организация и методика выполнения проектов в физ ре
организация и методика выполнения  проектов в  физ реорганизация и методика выполнения  проектов в  физ ре
организация и методика выполнения проектов в физ ре
 
Apuntes
ApuntesApuntes
Apuntes
 
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
 
في الفصل
في الفصلفي الفصل
في الفصل
 
Future makers
Future makersFuture makers
Future makers
 
Future makers
Future makersFuture makers
Future makers
 
вич спид
вич спидвич спид
вич спид
 
Be the Hero
Be the HeroBe the Hero
Be the Hero
 
iPad Pilot Projects at Framingham State University: Three Use Cases
iPad Pilot Projects at Framingham State University:  Three Use Cases iPad Pilot Projects at Framingham State University:  Three Use Cases
iPad Pilot Projects at Framingham State University: Three Use Cases
 
Aus cert event_2010
Aus cert event_2010Aus cert event_2010
Aus cert event_2010
 
Jamaica
JamaicaJamaica
Jamaica
 
Bb w ppt_content_conferencesession-ittakesa_village_final
Bb w ppt_content_conferencesession-ittakesa_village_finalBb w ppt_content_conferencesession-ittakesa_village_final
Bb w ppt_content_conferencesession-ittakesa_village_final
 

Semelhante a Application Usage and Risk Report - Key Findings for US

State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
Mbradber
 
Kjvg hit2008eng
Kjvg hit2008engKjvg hit2008eng
Kjvg hit2008eng
sng
 
Web 2.0 @ Work Survey
Web 2.0 @ Work SurveyWeb 2.0 @ Work Survey
Web 2.0 @ Work Survey
TJ Rains
 

Semelhante a Application Usage and Risk Report - Key Findings for US (19)

Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
 
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
PALO ALTO -NETWORKS  Application Usage & Threat Report 2014PALO ALTO -NETWORKS  Application Usage & Threat Report 2014
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
 
Application usage risk_report_2011-05-countries
Application usage risk_report_2011-05-countriesApplication usage risk_report_2011-05-countries
Application usage risk_report_2011-05-countries
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
 
Estado del ransomware en 2020
Estado del ransomware en 2020Estado del ransomware en 2020
Estado del ransomware en 2020
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
 
2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurity
 
Software piracy in Bangladesh
Software piracy in BangladeshSoftware piracy in Bangladesh
Software piracy in Bangladesh
 
Kjvg hit2008eng
Kjvg hit2008engKjvg hit2008eng
Kjvg hit2008eng
 
Web 2.0 @ Work Survey
Web 2.0 @ Work SurveyWeb 2.0 @ Work Survey
Web 2.0 @ Work Survey
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Application Usage and Risk Report - Key Findings for US

  • 1. Five Facts About Application Usage on Enterprise Networks in the USA Application Usage and Risk Report December 2011
  • 2.
  • 3. Average number of social networking applications per organization? A total of 69 different social networking applications were found in 96% of the 395 participating organizations with an average of 15 found on each network.
  • 4.
  • 5. Which application is used more heavily? Based on the percentage of social networking bandwidth consumed, Zynga was used more heavily (7%) than Linkedin (4%). Facebook and Twitter consumed 40% and 21% respectively.
  • 6. Active social networking applications (games, plugins, posting) are used more heavily in the USA than they are globally. Facebook is a clear dominant player with 40% of BW consumed.
  • 7.
  • 8. Average number of browser-based filesharing applications per organization? A total of 55 different browser-based filesharing applications were found in 95% of the 395 participating organizations with an average of 11 in each.
  • 9. Browser-based filesharing use cases: work or entertainment. Both uses have a common set of business and security risks that organizations must address.
  • 10.
  • 11. The number of applications using Port 80 (tcp/80) only? The number of applications that ONLY use Port 80 is 270 or 24% of the 1,121 applications found in the participating organizations.
  • 12.
  • 13. Percentage of total bandwidth consumed by applications not using tcp/80? 54% of the total bandwidth is being consumed by 534 (48% of 1,121) applications that DO NOT USE port 80 at all. Ever.
  • 14. Port 80 only security is shortsighted. The common perception is that Port 80 (tcp/80) is where all the traffic and all the problems are. A port 80 emphasis is an absolute requirement; but too much focus is shortsighted.
  • 15.
  • 16. Palo Alto Networks Application Usage and Risk Report www.paloaltonetworks.com/aur