SlideShare a Scribd company logo
1 of 12
Where’s My Bandwidth?

Global Findings from the June 2012
Application Usage and Risk Report
Where’s My Bandwidth?

Key questions this report answers:

•   Which application categories consume the most bandwidth?

•   Exactly how much bandwidth does streaming video consume?

•   Which type of filesharing is most heavily used?

•   Is social networking truly a bandwidth hog?
Top 5 Categories = 76% of the Bandwidth




Peel away the corporate usage. Roughly a quarter of your bandwidth $$$
                       is video and filesharing…
Users Like to Watch Video




   13% of total bandwidth is video/photo traffic. 107 variants found; an
average of 34 in 97% of the organizations. A fraction of it is corporate use.
P2P Never Dies




It continues to be used despite control efforts. 7 variants found in 78% of
                           the organizations.
The Filesharing Traffic
                  Port-based Firewalls Miss




Nearly 15% of filesharing is invisible to firewalls. Application control means
                       all apps, all ports, all the time.
Browser-Based Filesharing
                   Use Cases Solidify…




Work vs. entertainment? Megaupload traffic went to Putlocker, Rapidshare,
            others. P2P crushes BBFS in total BW consumed.
Pinterest and Tumblr - New Ways to
               Express Yourself




Tumblr is the antithesis of Facebook; unfiltered, fully customizable.
   Pinterest is a new way to share your hobbies and interests.
Which Ports do Applications Really Use?




The common perception is that Port 80 (tcp/80) is where all the traffic and
all the problems are. Port 80 security is a requirement; but too much focus
                              is shortsighted.
Where’s My Bandwidth?




Interactively view where your bandwidth is going:
          www.paloaltonetworks.com/aur
Palo Alto Networks Application Usage
           and Risk Report

   www.paloaltonetworks.com/aur

More Related Content

More from Palo Alto Networks

Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
Palo Alto Networks Application Usage and Risk Report - Key Findings for ItalyPalo Alto Networks Application Usage and Risk Report - Key Findings for Italy
Palo Alto Networks Application Usage and Risk Report - Key Findings for ItalyPalo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for KoreaPalo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for KoreaPalo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
Palo Alto Networks Application Usage and Risk Report - Key Findings for  Midd...Palo Alto Networks Application Usage and Risk Report - Key Findings for  Midd...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...Palo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for NordicsPalo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for NordicsPalo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...Palo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for SpainPalo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for SpainPalo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for TaiwanPalo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for TaiwanPalo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for ThailandPalo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for ThailandPalo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
Palo Alto Networks Application Usage and Risk Report - Key Findings for UKPalo Alto Networks Application Usage and Risk Report - Key Findings for UK
Palo Alto Networks Application Usage and Risk Report - Key Findings for UKPalo Alto Networks
 
Application Usage and Risk Report - Key Findings for US
Application Usage and Risk Report - Key Findings for USApplication Usage and Risk Report - Key Findings for US
Application Usage and Risk Report - Key Findings for USPalo Alto Networks
 
Application Usage on Enterprise Networks, December 2011.
Application Usage on Enterprise Networks, December 2011.Application Usage on Enterprise Networks, December 2011.
Application Usage on Enterprise Networks, December 2011.Palo Alto Networks
 

More from Palo Alto Networks (12)

Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
Palo Alto Networks Application Usage and Risk Report - Key Findings for ItalyPalo Alto Networks Application Usage and Risk Report - Key Findings for Italy
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for KoreaPalo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
Palo Alto Networks Application Usage and Risk Report - Key Findings for  Midd...Palo Alto Networks Application Usage and Risk Report - Key Findings for  Midd...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for NordicsPalo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for SpainPalo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for TaiwanPalo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for ThailandPalo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
Palo Alto Networks Application Usage and Risk Report - Key Findings for UKPalo Alto Networks Application Usage and Risk Report - Key Findings for UK
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
 
Application Usage and Risk Report - Key Findings for US
Application Usage and Risk Report - Key Findings for USApplication Usage and Risk Report - Key Findings for US
Application Usage and Risk Report - Key Findings for US
 
Application Usage on Enterprise Networks, December 2011.
Application Usage on Enterprise Networks, December 2011.Application Usage on Enterprise Networks, December 2011.
Application Usage on Enterprise Networks, December 2011.
 
Aus cert event_2010
Aus cert event_2010Aus cert event_2010
Aus cert event_2010
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Application Usage and Risk report, June 2012, Global Findings

  • 1. Where’s My Bandwidth? Global Findings from the June 2012 Application Usage and Risk Report
  • 2. Where’s My Bandwidth? Key questions this report answers: • Which application categories consume the most bandwidth? • Exactly how much bandwidth does streaming video consume? • Which type of filesharing is most heavily used? • Is social networking truly a bandwidth hog?
  • 3. Top 5 Categories = 76% of the Bandwidth Peel away the corporate usage. Roughly a quarter of your bandwidth $$$ is video and filesharing…
  • 4. Users Like to Watch Video 13% of total bandwidth is video/photo traffic. 107 variants found; an average of 34 in 97% of the organizations. A fraction of it is corporate use.
  • 5. P2P Never Dies It continues to be used despite control efforts. 7 variants found in 78% of the organizations.
  • 6. The Filesharing Traffic Port-based Firewalls Miss Nearly 15% of filesharing is invisible to firewalls. Application control means all apps, all ports, all the time.
  • 7. Browser-Based Filesharing Use Cases Solidify… Work vs. entertainment? Megaupload traffic went to Putlocker, Rapidshare, others. P2P crushes BBFS in total BW consumed.
  • 8. Pinterest and Tumblr - New Ways to Express Yourself Tumblr is the antithesis of Facebook; unfiltered, fully customizable. Pinterest is a new way to share your hobbies and interests.
  • 9. Which Ports do Applications Really Use? The common perception is that Port 80 (tcp/80) is where all the traffic and all the problems are. Port 80 security is a requirement; but too much focus is shortsighted.
  • 10. Where’s My Bandwidth? Interactively view where your bandwidth is going: www.paloaltonetworks.com/aur
  • 11.
  • 12. Palo Alto Networks Application Usage and Risk Report www.paloaltonetworks.com/aur

Editor's Notes

  1. 107 video/photo apps, 140 filesharing apps, 30% of the bandwidth. How do the business apps survive?
  2. Globally, users watch a significant amount of video. Youtube and PP Stream, a p2p based streaming video application are leading consumers. In total, 107 application variants were found globally. On average, 34 in every networkViewed from a cost of BW perspective, $0.13 of the bandwidth $$$ is spent on video.
  3. P2P filesharing, specifically bittorrent is off the charts. Jumping 4x to 13.4% of total bandwidth – despite ongoing efforts to control it. Viewed from a cost of BW perspective, $0.13 of the bandwidth $$$ is spent on bittorrent and other P2P filesharing apps.
  4. All applications within the Palo Alto Networks database include underlying technology (browser-based, peer-to-peer, etc) as well as which ports the applications use. The 140 filesharing and file transfer applications were broken down into four port groupings defined as: Applications that use tcp/80 only. As expected, the bulk of these applications are browser-based. Putlocker, Depositfiles and Docstoc are three examples of the applications found in this group. Applications that use tcp/443 ortcp/443 & 80. Applications within this group use tcp/443or tcp/443,80. RapidShare, 4Shared and YouSendIt! are three of the browser-based filesharing application examples while Sugarsync and Microsoft LiveMesh represent two of the client-server based examples. Applications that do not use tcp/80 at all. All of these applications are either client-server (FTP, TFTP) or peer-to-peer. The peer-to-peer applications in this group are using a range of ports and include Ares, DirectConnect and Kazaa. Applications that are dynamic (hop ports), or use a range of high numbered ports. As expected, this group of applications is primarily peer-to-peer and includes BitTorrent, eMule and Xunlei. The browser-based examples within this group include Fileserve, Filesonic, and Mediafire. As a user accessibility and firewall evasion feature, port hopping (aka, dynamic) has historically been used in either client-server or peer-to-peer applications. The use of port hopping in browser-based applications indicates how significantly applications have evolved.
  5. Usage patterns indicate a clear delineation between work and entertainment . 71 variants in this group – only 1% of total BW consumed. Compared to P2P at 13.4%. Control efforts should be directed at both P2P and browser-based filesharing
  6. Social networking applications are used universally. New variants (Pinterest and Tumblr) jump –tumblr a new comer, is rapidly growing in popularity. Its growth may be due to the differences between it and facebook. Tumblr: freeform, unstructured, unfiltered, customizable. Facebook: structured, filtered, minimal customization.Pinterest – a new variant added in march 2012 - found in only 15% of the orgs yet consumed 1% of SN BW G+ = jumped in frequecny from 25% to 86% and a 10X increase in BW Shows that the social networking space continues to define itself.
  7. Applications that use tcp/80 only. As expected, the bulk of the applications in this group are browser-based. Applications that use tcp/443 and/or tcp/80. Applications within this group use both tcp/443 exclusively or tcp/443 and tcp/80. Applications that do not use tcp/80 at all. All of these applications are either client-server (FTP, TFTP) or peer-to-peer. Applications that are dynamic (hop ports), or use a range of high numbered ports. As expected, this group of applications is primarily peer-to-peer with some browser-based and client server examples as well. Bottom line: Application visibility and control needs to be on all ports, across all apps, all the time.