Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy

1,012
-1

Published on

Key findings from Palo Alto Networks Application Usage and Risk Report, December 2011 (Italy Only).

The slides provides insight into application activity that is based on network application assessments that show what is really happening on corporate networks.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,012
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
3
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy

  1. 1. Five Facts About ApplicationUsage on Enterprise Networks in Italy Application Usage and Risk Report December 2011
  2. 2. Average number of social networking applications per organization?
  3. 3. Average number of social networking applications per organization?A total of 53 different social networking applications were found in 96% of the 51 participating organizations with an average of 13 found on each network.
  4. 4. Which application is used more heavily? (Facebook Social Plugins)
  5. 5. Which application is used more heavily? (Facebook Social Plugins) Based on the percentage of social networking bandwidthconsumed, social plugins consumed 25% - nearly as muchas Facebook itself (27%) while Twitter consumed a mere 6% of the overall social networking bandwidth.
  6. 6. Facebook social plugins are used more heavily than in rest of the world. Tumblr is also used heavily, when compared to the global use.
  7. 7. Average number of browser-basedfilesharing applications per organization?
  8. 8. Average number of browser-basedfilesharing applications per organization? A total of 44 different browser-based filesharing applications were found in 90% of the 51 participating organizations with an average of 13 in each.
  9. 9. Browser-based filesharing use cases: work orentertainment. Both uses have a common set of business and security risks that organizations must address.
  10. 10. The number of applicationsusing Port 80 (tcp/80) only?
  11. 11. The number of applications using Port 80 (tcp/80) only?The number of applications that ONLY use Port 80 is 194 or 27% of the 725 applications found in the participating organizations.
  12. 12. Percentage of total bandwidth consumed by applications not using tcp/80?
  13. 13. Percentage of total bandwidth consumed by applications not using tcp/80?34% of the total bandwidth is being consumed by 205 (28% of 725) applications that DO NOT USE port 80 at all. Ever.
  14. 14. Port 80 only security is shortsighted. The commonperception is that Port 80 (tcp/80) is where all the traffic and all the problems are. A port 80 emphasis is an absolute requirement; but too much focus is shortsighted.
  15. 15. Demographics and Methodology: The data in this presentation is based on actual network traffic. It is not a survey. Data is collected (withpermission) as part of the Palo Alto Networks customer evaluation processwhere a Palo Alto Networks next-generation firewall is deployed to monitor network application traffic. At the end of the evaluation, the customer receives a report that provides unprecedented insight into their network traffic, detailing the applications found, and their corresponding risks. The traffic patterns observed are then anonymously summarized in the Application Usage and Risk Report.
  16. 16. Palo Alto Networks Application Usage and Risk Report www.paloaltonetworks.com/aur

×