Key findings from Palo Alto Networks Application Usage and Risk Report, December 2011 (China Only).
The slides provides insight into application activity that is based on network application assessments that show what is really happening on corporate networks.
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
1. Five Facts About Application
Usage on Enterprise Networks
in China
Application Usage and Risk Report
December 2011
2.
3. Average number of social networking
applications per organization?
A total of 48 different social networking applications were
found in 94% of the 18 participating organizations with an
average of 7 found on each network.
4.
5. Which application is used more heavily?
Based on the percentage of social networking bandwidth
consumed in the 18 participating organizations, Renren
consumed 34%. Facebook and Twitter consumed 1% and
0% respectively.
6. Local social networking applications dominate. Facebook,
Twitter and their “active” uses struggle for their share of
bandwidth.
7.
8. Average number of browser-based
filesharing applications per organization?
A total of 30 different browser-based filesharing
applications were found in 89% of the participating
organizations with an average of 8 in each.
9. Browser-based filesharing use cases: work or
entertainment. Both uses have a common set of business
and security risks that organizations must address.
10.
11. The number of applications
using Port 80 (tcp/80) only?
The number of applications that ONLY use Port 80 is 135 or
26% of the 535 applications found in the participating
organizations.
12.
13. Percentage of total bandwidth consumed
by applications not using tcp/80?
49% of the total bandwidth is being consumed by 161 (30%
of 535) applications that DO NOT USE port 80 at all. Ever.
14. Port 80 only security is shortsighted. The common
perception is that Port 80 (tcp/80) is where all the traffic and all
the problems are. A port 80 emphasis is an absolute
requirement; but too much focus is shortsighted.
15.
16. Palo Alto Networks Application Usage
and Risk Report
www.paloaltonetworks.com/aur