SlideShare uma empresa Scribd logo
1 de 16
Five Facts About Application Usage on
        Canadian Enterprise Networks



             Application Usage and Risk Report
                                December 2011
Average number of social networking
     applications per organization?




A total of 58 different social networking applications were
 found in 94% of the 49 participating organizations with an
             average of 15 found in each network.
Which application is used more heavily?




Based on the percentage of social networking bandwidth
consumed in the 49 participating Canadian organizations,
Zynga games were used more heavily than Linkedin.
Social networking is more active in Canada with games, plugins, posting
  used more heavily than they are globally. Organizations must balance
   social networking application use with the associated risks – setting
appropriate enablement policies and more importantly educate users what
                            those policies are.
Average number of browser-based
filesharing applications per organization?




   A total of 36 different browser-based filesharing
 applications were found in 86% of the 49 participating
      organizations with an average of 10 in each.
Browser-based filesharing use cases: work or
entertainment. Both uses have a common set of business
   and security risks that organizations must address.
The number of applications
         using Port 80 (tcp/80) only?




The number of applications that ONLY use Port 80 is 187 or
   27% of the 703 applications found in the participating
                Canadian organizations.
Percentage of total bandwidth consumed
    by applications not using tcp/80?




65% of the total bandwidth is being consumed by 282 (40%
 of 703) applications that DO NOT USE port 80 at all. Ever.
Port 80 only security is shortsighted. The common
perception is that Port 80 (tcp/80) is where all the traffic and all
     the problems are. A port 80 emphasis is an absolute
       requirement; but too much focus is shortsighted.
Palo Alto Networks Application Usage
           and Risk Report

   www.paloaltonetworks.com/aur

Mais conteúdo relacionado

Mais procurados

Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
Cindy Kim
 

Mais procurados (20)

Palo Alto Networks Application Usage and Risk Report - Key Findings for France
Palo Alto Networks Application Usage and Risk Report - Key Findings for FrancePalo Alto Networks Application Usage and Risk Report - Key Findings for France
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for KoreaPalo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for NordicsPalo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for TaiwanPalo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for SpainPalo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
Palo Alto Networks Application Usage and Risk Report - Key Findings for UKPalo Alto Networks Application Usage and Risk Report - Key Findings for UK
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Palo Alto Networks Application Usage and Risk Report - Key Findings for ChinaPalo Alto Networks Application Usage and Risk Report - Key Findings for China
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
 
Application Usage on Enterprise Networks, December 2011.
Application Usage on Enterprise Networks, December 2011.Application Usage on Enterprise Networks, December 2011.
Application Usage on Enterprise Networks, December 2011.
 
Data As Air
Data As AirData As Air
Data As Air
 
Retail Industry Application Security Survey Insights
Retail Industry Application Security Survey InsightsRetail Industry Application Security Survey Insights
Retail Industry Application Security Survey Insights
 
Nuevas tecnologías a nivel de hogares
Nuevas tecnologías a nivel de hogaresNuevas tecnologías a nivel de hogares
Nuevas tecnologías a nivel de hogares
 
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security Infographic
 
Unisys Security Insights Infographic: Global
Unisys Security Insights Infographic: GlobalUnisys Security Insights Infographic: Global
Unisys Security Insights Infographic: Global
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
 
Secure your network to secure your reputation and your income
Secure your network to secure your reputation and your incomeSecure your network to secure your reputation and your income
Secure your network to secure your reputation and your income
 
Smartphone User Persona Report 2015 - Malaysia (Infograph)
Smartphone User Persona Report 2015 - Malaysia (Infograph)Smartphone User Persona Report 2015 - Malaysia (Infograph)
Smartphone User Persona Report 2015 - Malaysia (Infograph)
 
IRJET- Authentic News Summarization
IRJET-  	  Authentic News SummarizationIRJET-  	  Authentic News Summarization
IRJET- Authentic News Summarization
 
Avast Q1 Security Report 2015
Avast Q1 Security Report 2015Avast Q1 Security Report 2015
Avast Q1 Security Report 2015
 

Destaque

Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
FSU-ITS
 
ззт ехнологии царинная зош№1г.Харцызск
ззт ехнологии  царинная зош№1г.Харцызскззт ехнологии  царинная зош№1г.Харцызск
ззт ехнологии царинная зош№1г.Харцызск
Анна Денисенко
 
Bb w ppt_content_conferencesession-ittakesa_village_final
Bb w ppt_content_conferencesession-ittakesa_village_finalBb w ppt_content_conferencesession-ittakesa_village_final
Bb w ppt_content_conferencesession-ittakesa_village_final
FSU-ITS
 
здоров'я – найвища цінність життя людини
здоров'я – найвища цінність життя людиниздоров'я – найвища цінність життя людини
здоров'я – найвища цінність життя людини
Анна Денисенко
 
организация и методика выполнения проектов в физ ре
организация и методика выполнения  проектов в  физ реорганизация и методика выполнения  проектов в  физ ре
организация и методика выполнения проектов в физ ре
Анна Денисенко
 

Destaque (17)

iPad Pilot Projects at Framingham State University: Three Use Cases
iPad Pilot Projects at Framingham State University:  Three Use Cases iPad Pilot Projects at Framingham State University:  Three Use Cases
iPad Pilot Projects at Framingham State University: Three Use Cases
 
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
 
Jamaica
JamaicaJamaica
Jamaica
 
Apuntes
ApuntesApuntes
Apuntes
 
Apuntes
ApuntesApuntes
Apuntes
 
ззт ехнологии царинная зош№1г.Харцызск
ззт ехнологии  царинная зош№1г.Харцызскззт ехнологии  царинная зош№1г.Харцызск
ззт ехнологии царинная зош№1г.Харцызск
 
Aus cert event_2010
Aus cert event_2010Aus cert event_2010
Aus cert event_2010
 
في الفصل
في الفصلفي الفصل
في الفصل
 
Bb w ppt_content_conferencesession-ittakesa_village_final
Bb w ppt_content_conferencesession-ittakesa_village_finalBb w ppt_content_conferencesession-ittakesa_village_final
Bb w ppt_content_conferencesession-ittakesa_village_final
 
Future makers
Future makersFuture makers
Future makers
 
здоров'я – найвища цінність життя людини
здоров'я – найвища цінність життя людиниздоров'я – найвища цінність життя людини
здоров'я – найвища цінність життя людини
 
вич спид
вич спидвич спид
вич спид
 
Connected.
Connected.Connected.
Connected.
 
Vida
VidaVida
Vida
 
Be the Hero
Be the HeroBe the Hero
Be the Hero
 
Priority moments digital
Priority moments digitalPriority moments digital
Priority moments digital
 
организация и методика выполнения проектов в физ ре
организация и методика выполнения  проектов в  физ реорганизация и методика выполнения  проектов в  физ ре
организация и методика выполнения проектов в физ ре
 

Semelhante a Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada

State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 

Semelhante a Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada (20)

Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
 
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo.
 
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
 
Application usage risk_report_2011-05-countries
Application usage risk_report_2011-05-countriesApplication usage risk_report_2011-05-countries
Application usage risk_report_2011-05-countries
 
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
PALO ALTO -NETWORKS  Application Usage & Threat Report 2014PALO ALTO -NETWORKS  Application Usage & Threat Report 2014
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
 
Infosecurity Europe - Infographic
Infosecurity Europe - InfographicInfosecurity Europe - Infographic
Infosecurity Europe - Infographic
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Globalpiracy2008
Globalpiracy2008Globalpiracy2008
Globalpiracy2008
 
Global Piracy
Global PiracyGlobal Piracy
Global Piracy
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurity
 
GDPR and Open Source: Security by the Numbers
GDPR and Open Source: Security by the NumbersGDPR and Open Source: Security by the Numbers
GDPR and Open Source: Security by the Numbers
 
50 Software Development Stats Market Trends and Insights for the Year 2024
50 Software Development Stats Market Trends and Insights for the Year 202450 Software Development Stats Market Trends and Insights for the Year 2024
50 Software Development Stats Market Trends and Insights for the Year 2024
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada

  • 1. Five Facts About Application Usage on Canadian Enterprise Networks Application Usage and Risk Report December 2011
  • 2.
  • 3. Average number of social networking applications per organization? A total of 58 different social networking applications were found in 94% of the 49 participating organizations with an average of 15 found in each network.
  • 4.
  • 5. Which application is used more heavily? Based on the percentage of social networking bandwidth consumed in the 49 participating Canadian organizations, Zynga games were used more heavily than Linkedin.
  • 6. Social networking is more active in Canada with games, plugins, posting used more heavily than they are globally. Organizations must balance social networking application use with the associated risks – setting appropriate enablement policies and more importantly educate users what those policies are.
  • 7.
  • 8. Average number of browser-based filesharing applications per organization? A total of 36 different browser-based filesharing applications were found in 86% of the 49 participating organizations with an average of 10 in each.
  • 9. Browser-based filesharing use cases: work or entertainment. Both uses have a common set of business and security risks that organizations must address.
  • 10.
  • 11. The number of applications using Port 80 (tcp/80) only? The number of applications that ONLY use Port 80 is 187 or 27% of the 703 applications found in the participating Canadian organizations.
  • 12.
  • 13. Percentage of total bandwidth consumed by applications not using tcp/80? 65% of the total bandwidth is being consumed by 282 (40% of 703) applications that DO NOT USE port 80 at all. Ever.
  • 14. Port 80 only security is shortsighted. The common perception is that Port 80 (tcp/80) is where all the traffic and all the problems are. A port 80 emphasis is an absolute requirement; but too much focus is shortsighted.
  • 15.
  • 16. Palo Alto Networks Application Usage and Risk Report www.paloaltonetworks.com/aur

Notas do Editor

  1. The average number of social networking applications on each network observed is higher or lower than 12? Canada: The average number of social networking applications found in each organization is higher – an AVERAGE of 15 social networking applications per organization were found in 94% of the 49 Canadian organizations observed. In total, 58 DIFFERENT social networking applications were found in Canada. Globally: The average number of social networking applications found in each organization is higher – an AVERAGE of 16 social networking applications per organization were found. In total, 71 DIFFERENT social networking applications were found.
  2. The average number of social networking applications found in each organization is higher – an AVERAGE of 15 social networking applications per organization were found in 94% of the 49 Canadian organizations observed. In total, 58 DIFFERENT social networking applications were found in Canada. Globally: The average number of social networking applications found in each organization is higher – an AVERAGE of 16 social networking applications per organization were found. In total, 71 DIFFERENT social networking applications were found.
  3. For comparison: Globally, Twitter usage (based on % of bandwidth consumed) is up 700% in year over year usage. Reasons: Twitter is a news source; companies are using it as a communications vehicle, graphics and pictures now supported by Twitter (added mid 2011). Social networking has become more active in a year over year comparison. Facebook applications, games, plugins and posting all show increases in volume of use as measured by percentage of social networking bandwidth Organizations will need to balance the corporate use of social networking applications with the associated risks – setting appropriate enablement policies to allow “browsing” but limit posting to Marketing (for example).All and Scan all SN traffic for threats and EDUCATE users not to click so blindly and willingly.
  4. The average number of browser-based applications on each network observed is higher or lower than 13? Canada: The average number of browser-based filesharing applications found in each organization is lower – an AVERAGE of 10 per organization were found across the 94% of the 49 Canadian organizations observed. In total, 36 DIFFERENT browser-based filesharing applications were found in Canada. Globally: The average number is 13 BBFS applications were found in 92% of the 1,636 organizations. In total, 65 BBFS applications were found.
  5. The average number of browser-based applications on each network observed is higher or lower than 13? Canada: The average number of browser-based filesharing applications found in each organization is lower – an AVERAGE of 10 per organization were found across the 94% of the 49 Canadian organizations observed. In total, 36 DIFFERENT browser-based filesharing applications were found in Canada. Globally: The average number is 13 BBFS applications were found in 92% of the 1,636 organizations. In total, 65 BBFS applications were found.
  6. This slide shows the commonly used applications in terms of frequency of use and the percentage of browser-based file sharing bandwidth consumed. Business Risks include potential copyright violations and data loss/sharing – purposeful or otherwise. The same application that is useful to the user for sending large PowerPoint files is also potentially just as valuable for moving illegal music, movies or even large amounts of sensitive enterprise data. Several of the media focused browser-based filesharing applications discussed above have been found to be in violation of, or have been accused of, copyright violations. Some of the most highly publicized P2P-related data breaches were inadvertent, traced to either a misconfigured P2P client or other user error. Initially, browser-based filesharing applications dramatically reduced the risk of inadvertent sharing because the initial focus was a one-to-one distribution or a one-to-a few. As many of these offerings add clients and premium services, the risks increase. For example, the Dropbox client creates a folder on the Windows desktop that, by default, automatically synchronizes desktop folder to the cloud-based folder. If a proprietary file is dropped into the folder accidently, it is automatically shared with those who have folder permissions. The risks, while still lower than those associated with P2P, have increased in conjunction with the usage and should be addressed. Security Risks include being a common source for malware and providing cybercriminals with an ideal infrastructure for cybercriminals and their malware. File transfer applications have long been associated with malware. Peer-to-peer file transfer applications, for example, have been notorious in this respect for years (Mariposa most recently), and malware has been using FTP for communication for an even longer period of time. Put another way, whatever mechanism that is used to electronically transfer files, is also commonly used to move malware, and browser-based file transfer applications are the latest front in this evolution. Browser-based filesharing applications have unique characteristics that make them uniquely suited for cybercriminals: they are Free and anonymous. Since these applications are typically free (or at least offer free versions), a cybercriminal can easily upload malware anonymously. Most services only require an email address in order to use the service, so the cybercriminal can remain virtually untraceable simply by using a disposable email address and a network anonymizer, a proxy or circumventor. Furthermore, the ease with which attackers can upload files means that they can easily and continually update and refresh their malware in order to stay ahead of traditional antivirus signatures. They are simple to use and trusted. A key reason for the popularity of browser-based filesharing applications is the fact that they make file transfers very easy. They are easily built into the browser or even the application tray of the operating system. This means that file transfers are almost as simple as clicking on a link, which vastly increases the opportunities for a target user to be lured into a dangerous spear-phishing click. Several of the offerings provide that enables folders and shared files to be embedded into web site while other application offerings include a developer API. They can automatically synchronize yo9ur folders. A common, though not universal feature of browser-based filesharing applications is the ability to regularly sync files or entire directories. This sort of capability is already being marketed as a method for delivering and updating applications. This functionality could easily benefit malicious applications just as much as approved ones. A key requirement for modern malware is to establish a method of command and control for the malware in which the attacker can direct the malware, update the program and extract data. An attacker could use this syncing ability to perform all of these functions under the cover of an approved application.
  7. The number of applications that are traversing tcp/80 (HTTP/web browsing) is higher or lower than 200? Canada:The number is lower - 187 (27%) out of 793applications use port 80 only. Globally:The actual number is higher - 297 (25%) out of 1,195 applications use port 80 only.
  8. The number of applications that are traversing tcp/80 (HTTP/web browsing) is higher or lower than 200? Globally:The actual number is higher - 297 (25%) out of 1,195 applications use port 80 only.
  9. The percentage of total bandwidth consumed by applications that do NOT use port 80 at all is higher or lower than 50%? Canada: The actual number is higher - applications that DO NOT USE port 80 at all are consuming 65% of the total bandwidth. The number of applications in this category is 282 (40%) of the 703 applications found. Globally: The number is higher - applications that DO NOT USE port 80 at all are consuming 51% of the total bandwidth. The number of applications in this category is 413 (35%) of the 1,195 applications found
  10. The percentage of total bandwidth consumed by applications that do NOT use port 80 at all is higher or lower than 50%? Canada: The actual number is higher - applications that DO NOT USE port 80 at all are consuming 65% of the total bandwidth. The number of applications in this category is 282 (40%) of the 703 applications found. Globally: The number is higher - applications that DO NOT USE port 80 at all are consuming 51% of the total bandwidth. The number of applications in this category is 413 (35%) of the 1,195 applications found
  11. This set of applications include a wide range of common applications such as 51 different remote access / remote management applications, as well as database applications. Remote access applications are commonly used by cybercriminals as a penetration vector. This is well documented by Verizon in their databreach report and also more recently, remote access tools were how Subway customers were had $3M stolen. The common perception is that Port 80 (tcp/80) is where all the traffic and all the problems are. This is just not true. Focus on port 80 only is a requirement – without a doubt, but too much focus would not be considered best-practices. In fact, in the out of 703 applications found in the Canadian organizations observed, 40% of them do not use port 80 at all and those 282 applications are consuming 65% of the bandwidth. For comparison, Globally, 1,195 applications were found and 35% of them do not use port 80 at all and those 413 applications are chewing through 51% of the bandwidth.