Your SlideShare is downloading. ×
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics

343

Published on

Key findings from Palo Alto Networks Application Usage and Risk Report, December 2011 (Nordics). …

Key findings from Palo Alto Networks Application Usage and Risk Report, December 2011 (Nordics).

The slides provides insight into application activity that is based on network application assessments that show what is really happening on corporate networks.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
343
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Five Facts About ApplicationUsage on Enterprise Networks in the Nordics (Denmark, Finland, Norway, Sweden) Application Usage and Risk Report December 2011
  • 2. Average number of social networking applications per organization?A total of 63 different social networking applications were found in 87% of the 55 participating organizations with an average of 15 found on each network.
  • 3. Which application is used more heavily? (Vkontakte)Based on the percentage of social networking bandwidth consumed, vkontakte, originally a Russian only site consumed 20%. Twitter consumed a mere 8%.
  • 4. Nordics social networking usage is very international. Vkontakte (Russian), Tumblr (USA) and heavy plugin usagemakes Nordics social networking very international and active. Facebook still most heavily used.
  • 5. Average number of browser-basedfilesharing applications per organization? A total of 42 different browser-based filesharing applications were found in 78% of the 55 participating organizations with an average of 10 in each.
  • 6. Browser-based filesharing use cases: work orentertainment. Both uses have a common set of business and security risks that organizations must address.
  • 7. The number of applications using Port 80 (tcp/80) only?The number of applications that ONLY use Port 80 is 203 or 26% of the 785 applications found in the participating organizations.
  • 8. Percentage of total bandwidth consumed by applications not using tcp/80?42% of the total bandwidth is being consumed by 220 (28% of 785) applications that DO NOT USE port 80 at all. Ever.
  • 9. Port 80 only security is shortsighted. The commonperception is that Port 80 (tcp/80) is where all the traffic and all the problems are. A port 80 emphasis is an absolute requirement; but too much focus is shortsighted.
  • 10. Palo Alto Networks Application Usage and Risk Report www.paloaltonetworks.com/aur

×