Your SlideShare is downloading. ×
0
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain

396

Published on

Key findings from Palo Alto Networks Application Usage and Risk Report, December 2011 (Spain Only). …

Key findings from Palo Alto Networks Application Usage and Risk Report, December 2011 (Spain Only).

The slides provides insight into application activity that is based on network application assessments that show what is really happening on corporate networks.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
396
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Five Facts About ApplicationUsage on Enterprise Networks in Spain Application Usage and Risk Report December 2011
  • 2. Average number of social networking applications per organization?A total of 63 different social networking applications were found in 99% of the 71 participating organizations with an average of 21 found on each network.
  • 3. Which application is used more heavily? (Vkontakte) Based on the percentage of social networking bandwidth consumed, Vkontakte is used more heavily at 9% of thebandwidth. Facebook and Twitter crush all others at 40% and 19% respectively.
  • 4. Active social networking applications (games, posting,plugins, apps) are used a more heavily when compared toglobal usage patterns. Facebook is the clear leader with 40% of BW consumed.
  • 5. Average number of browser-basedfilesharing applications per organization? A total of 48 different browser-based filesharing applications were found in 96% of the 71 participating organizations with an average of 21 in each.
  • 6. Browser-based filesharing use cases: work orentertainment. Both uses have a common set of business and security risks that organizations must address.
  • 7. The number of applications using Port 80 (tcp/80) only?The number of applications that ONLY use Port 80 is 224 or 24% of the 935 applications found in the participating organizations.
  • 8. Percentage of total bandwidth consumed by applications not using tcp/80?53% of the total bandwidth is being consumed by 344 (37% of 935) applications that DO NOT USE port 80 at all. Ever.
  • 9. Port 80 only security is shortsighted. The commonperception is that Port 80 (tcp/80) is where all the traffic and all the problems are. A port 80 emphasis is an absolute requirement; but too much focus is shortsighted.
  • 10. Palo Alto Networks Application Usage and Risk Report www.paloaltonetworks.com/aur

×