SlideShare a Scribd company logo
Five Facts About Application
Usage on Enterprise Networks
                    in the UK



     Application Usage and Risk Report
                        December 2011
Average number of social networking
      applications per organization?




A total of 68 different social networking applications were
 found in 100% of the 70 participating organizations with an
            average of 17 found on each network.
Which application is used more heavily?




  Based on the percentage of social networking bandwidth
consumed, Facebook consumed 60% of the bandwidth while
                 Twitter consumed 14%.
Active social networking application (games, posting,
 plugins, apps) usage patterns are similar to those observed
globally. Facebook is a clear dominant player with 60% of BW
                          consumed.
Average number of browser-based
filesharing applications per organization?




   A total of 42 different browser-based filesharing
 applications were found in 96% of the 70 participating
      organizations with an average of 13 in each.
Browser-based filesharing use cases: work or
entertainment. Both uses have a common set of business
   and security risks that organizations must address.
The number of applications
         using Port 80 (tcp/80) only?




The number of applications that ONLY use Port 80 is 214 or
   26% of the 812 applications found in the participating
                       organizations.
Percentage of total bandwidth consumed
    by applications not using tcp/80?




61% of the total bandwidth is being consumed by 240 (30%
 of 812) applications that DO NOT USE port 80 at all. Ever.
Port 80 only security is shortsighted. The common
perception is that Port 80 (tcp/80) is where all the traffic and all
     the problems are. A port 80 emphasis is an absolute
       requirement; but too much focus is shortsighted.
Palo Alto Networks Application Usage
           and Risk Report

   www.paloaltonetworks.com/aur

More Related Content

What's hot

Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
Palo Alto Networks Application Usage and Risk Report - Key Findings for CanadaPalo Alto Networks Application Usage and Risk Report - Key Findings for Canada
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
Palo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
Palo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for ThailandPalo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
Palo Alto Networks Application Usage and Risk Report - Key Findings for DachPalo Alto Networks Application Usage and Risk Report - Key Findings for Dach
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
Palo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for KoreaPalo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
Palo Alto Networks Application Usage and Risk Report - Key Findings for BeneluxPalo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
Palo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
Palo Alto Networks Application Usage and Risk Report - Key Findings for FrancePalo Alto Networks Application Usage and Risk Report - Key Findings for France
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
Palo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for NordicsPalo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks
 
Application Usage on Enterprise Networks, December 2011.
Application Usage on Enterprise Networks, December 2011.Application Usage on Enterprise Networks, December 2011.
Application Usage on Enterprise Networks, December 2011.
Palo Alto Networks
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
Lookout
 
Retail Industry Application Security Survey Insights
Retail Industry Application Security Survey InsightsRetail Industry Application Security Survey Insights
Retail Industry Application Security Survey Insights
Veracode
 
Nuevas tecnologías a nivel de hogares
Nuevas tecnologías a nivel de hogaresNuevas tecnologías a nivel de hogares
Nuevas tecnologías a nivel de hogares
Miriam Ortega
 
IRJET- Authentic News Summarization
IRJET-  	  Authentic News SummarizationIRJET-  	  Authentic News Summarization
IRJET- Authentic News Summarization
IRJET Journal
 
Better Security Through Big Data Analytics
Better Security Through Big Data AnalyticsBetter Security Through Big Data Analytics
Better Security Through Big Data Analytics
Symantec
 
Data As Air
Data As AirData As Air
Data As Air
Jonathan Reichental
 
In mobi state_of_app_downloads_q3_2014
In mobi state_of_app_downloads_q3_2014In mobi state_of_app_downloads_q3_2014
In mobi state_of_app_downloads_q3_2014
Sumit Roy
 
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
Veracode
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec
 
Encrypting User Data in Local Government 2016
Encrypting User Data in Local Government 2016Encrypting User Data in Local Government 2016
Encrypting User Data in Local Government 2016
Ben B
 
Avast Q1 Security Report 2015
Avast Q1 Security Report 2015Avast Q1 Security Report 2015
Avast Q1 Security Report 2015
Avast
 

What's hot (20)

Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
Palo Alto Networks Application Usage and Risk Report - Key Findings for CanadaPalo Alto Networks Application Usage and Risk Report - Key Findings for Canada
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for ThailandPalo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
Palo Alto Networks Application Usage and Risk Report - Key Findings for DachPalo Alto Networks Application Usage and Risk Report - Key Findings for Dach
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for KoreaPalo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
Palo Alto Networks Application Usage and Risk Report - Key Findings for BeneluxPalo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
Palo Alto Networks Application Usage and Risk Report - Key Findings for FrancePalo Alto Networks Application Usage and Risk Report - Key Findings for France
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for NordicsPalo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
 
Application Usage on Enterprise Networks, December 2011.
Application Usage on Enterprise Networks, December 2011.Application Usage on Enterprise Networks, December 2011.
Application Usage on Enterprise Networks, December 2011.
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Retail Industry Application Security Survey Insights
Retail Industry Application Security Survey InsightsRetail Industry Application Security Survey Insights
Retail Industry Application Security Survey Insights
 
Nuevas tecnologías a nivel de hogares
Nuevas tecnologías a nivel de hogaresNuevas tecnologías a nivel de hogares
Nuevas tecnologías a nivel de hogares
 
IRJET- Authentic News Summarization
IRJET-  	  Authentic News SummarizationIRJET-  	  Authentic News Summarization
IRJET- Authentic News Summarization
 
Better Security Through Big Data Analytics
Better Security Through Big Data AnalyticsBetter Security Through Big Data Analytics
Better Security Through Big Data Analytics
 
Data As Air
Data As AirData As Air
Data As Air
 
In mobi state_of_app_downloads_q3_2014
In mobi state_of_app_downloads_q3_2014In mobi state_of_app_downloads_q3_2014
In mobi state_of_app_downloads_q3_2014
 
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Encrypting User Data in Local Government 2016
Encrypting User Data in Local Government 2016Encrypting User Data in Local Government 2016
Encrypting User Data in Local Government 2016
 
Avast Q1 Security Report 2015
Avast Q1 Security Report 2015Avast Q1 Security Report 2015
Avast Q1 Security Report 2015
 

Viewers also liked

Priority moments digital
Priority moments digitalPriority moments digital
Priority moments digital
Giulia Christeen
 
Future makers
Future makersFuture makers
Future makers
Giulia Christeen
 
Bb w ppt_content_conferencesession-ittakesa_village_final
Bb w ppt_content_conferencesession-ittakesa_village_finalBb w ppt_content_conferencesession-ittakesa_village_final
Bb w ppt_content_conferencesession-ittakesa_village_final
FSU-ITS
 
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
FSU-ITS
 
здоров'я – найвища цінність життя людини
здоров'я – найвища цінність життя людиниздоров'я – найвища цінність життя людини
здоров'я – найвища цінність життя людиниАнна Денисенко
 
ззт ехнологии царинная зош№1г.Харцызск
ззт ехнологии  царинная зош№1г.Харцызскззт ехнологии  царинная зош№1г.Харцызск
ззт ехнологии царинная зош№1г.ХарцызскАнна Денисенко
 
iPad Pilot Projects at Framingham State University: Three Use Cases
iPad Pilot Projects at Framingham State University:  Three Use Cases iPad Pilot Projects at Framingham State University:  Three Use Cases
iPad Pilot Projects at Framingham State University: Three Use Cases
FSU-ITS
 
Be the Hero
Be the HeroBe the Hero
Be the Hero
Matthew Winner
 
Aus cert event_2010
Aus cert event_2010Aus cert event_2010
Aus cert event_2010
Palo Alto Networks
 
ош № 2 отчет презентация о недели обж,нвп и мсп
ош № 2 отчет презентация о недели обж,нвп и мспош № 2 отчет презентация о недели обж,нвп и мсп
ош № 2 отчет презентация о недели обж,нвп и мсп
Анна Денисенко
 
Jamaica
JamaicaJamaica
Jamaica
michaelanatal
 
Vida
VidaVida
организация и методика выполнения проектов в физ ре
организация и методика выполнения  проектов в  физ реорганизация и методика выполнения  проектов в  физ ре
организация и методика выполнения проектов в физ реАнна Денисенко
 
Future makers
Future makersFuture makers
Future makers
Giulia Christeen
 

Viewers also liked (17)

Priority moments digital
Priority moments digitalPriority moments digital
Priority moments digital
 
Future makers
Future makersFuture makers
Future makers
 
Bb w ppt_content_conferencesession-ittakesa_village_final
Bb w ppt_content_conferencesession-ittakesa_village_finalBb w ppt_content_conferencesession-ittakesa_village_final
Bb w ppt_content_conferencesession-ittakesa_village_final
 
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
 
здоров'я – найвища цінність життя людини
здоров'я – найвища цінність життя людиниздоров'я – найвища цінність життя людини
здоров'я – найвища цінність життя людини
 
ззт ехнологии царинная зош№1г.Харцызск
ззт ехнологии  царинная зош№1г.Харцызскззт ехнологии  царинная зош№1г.Харцызск
ззт ехнологии царинная зош№1г.Харцызск
 
iPad Pilot Projects at Framingham State University: Three Use Cases
iPad Pilot Projects at Framingham State University:  Three Use Cases iPad Pilot Projects at Framingham State University:  Three Use Cases
iPad Pilot Projects at Framingham State University: Three Use Cases
 
Be the Hero
Be the HeroBe the Hero
Be the Hero
 
вич спид
вич спидвич спид
вич спид
 
Aus cert event_2010
Aus cert event_2010Aus cert event_2010
Aus cert event_2010
 
ош № 2 отчет презентация о недели обж,нвп и мсп
ош № 2 отчет презентация о недели обж,нвп и мспош № 2 отчет презентация о недели обж,нвп и мсп
ош № 2 отчет презентация о недели обж,нвп и мсп
 
Jamaica
JamaicaJamaica
Jamaica
 
Apuntes
ApuntesApuntes
Apuntes
 
Vida
VidaVida
Vida
 
Apuntes
ApuntesApuntes
Apuntes
 
организация и методика выполнения проектов в физ ре
организация и методика выполнения  проектов в  физ реорганизация и методика выполнения  проектов в  физ ре
организация и методика выполнения проектов в физ ре
 
Future makers
Future makersFuture makers
Future makers
 

Similar to Palo Alto Networks Application Usage and Risk Report - Key Findings for UK

Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks
 
Application usage risk_report_2011-05-countries
Application usage risk_report_2011-05-countriesApplication usage risk_report_2011-05-countries
Application usage risk_report_2011-05-countries
He Hariyadi
 
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
PALO ALTO -NETWORKS  Application Usage & Threat Report 2014PALO ALTO -NETWORKS  Application Usage & Threat Report 2014
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
Marcello Marchesini
 
Enhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International CooperationEnhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International Cooperation
Positive Hack Days
 
Kjvg hit2008eng
Kjvg hit2008engKjvg hit2008eng
Kjvg hit2008eng
sng
 
2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
Ioannis Aligizakis, M.Sc.
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurity
Online Business
 
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Black Duck by Synopsys
 
Latest Trends in the App Ecosystem
Latest Trends in the App EcosystemLatest Trends in the App Ecosystem
Latest Trends in the App Ecosystem
AppCoins
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
GDPR and Open Source: Security by the Numbers
GDPR and Open Source: Security by the NumbersGDPR and Open Source: Security by the Numbers
GDPR and Open Source: Security by the Numbers
Black Duck by Synopsys
 
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Black Duck by Synopsys
 
Open Source Enterprise
Open Source EnterpriseOpen Source Enterprise
Open Source Enterprise
Roberto Galoppini
 
What? Why? Who? How? Of Application Security Testing
What? Why? Who? How? Of Application Security Testing What? Why? Who? How? Of Application Security Testing
What? Why? Who? How? Of Application Security Testing
TEST Huddle
 
Software fails 2016
Software fails 2016Software fails 2016
Software fails 2016
ANURAJ VALLIYIL
 
Mobil Messaging Apps 2014: Digital Intimacy Attracts Users, Challenges Marketers
Mobil Messaging Apps 2014: Digital Intimacy Attracts Users, Challenges MarketersMobil Messaging Apps 2014: Digital Intimacy Attracts Users, Challenges Marketers
Mobil Messaging Apps 2014: Digital Intimacy Attracts Users, Challenges Marketers
Allan V. Braverman
 
Three main pain points from today’s smartphones
Three main pain points from today’s smartphonesThree main pain points from today’s smartphones
Three main pain points from today’s smartphones
Alexander Decker
 
The Appstore Opportunity by Gert Jan Spriensma
The Appstore Opportunity by Gert Jan Spriensma The Appstore Opportunity by Gert Jan Spriensma
The Appstore Opportunity by Gert Jan Spriensma
PhoneGap
 

Similar to Palo Alto Networks Application Usage and Risk Report - Key Findings for UK (20)

Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
 
Application usage risk_report_2011-05-countries
Application usage risk_report_2011-05-countriesApplication usage risk_report_2011-05-countries
Application usage risk_report_2011-05-countries
 
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
PALO ALTO -NETWORKS  Application Usage & Threat Report 2014PALO ALTO -NETWORKS  Application Usage & Threat Report 2014
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
 
Enhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International CooperationEnhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International Cooperation
 
Kjvg hit2008eng
Kjvg hit2008engKjvg hit2008eng
Kjvg hit2008eng
 
2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurity
 
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
 
Latest Trends in the App Ecosystem
Latest Trends in the App EcosystemLatest Trends in the App Ecosystem
Latest Trends in the App Ecosystem
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
GDPR and Open Source: Security by the Numbers
GDPR and Open Source: Security by the NumbersGDPR and Open Source: Security by the Numbers
GDPR and Open Source: Security by the Numbers
 
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
 
Open Source Enterprise
Open Source EnterpriseOpen Source Enterprise
Open Source Enterprise
 
What? Why? Who? How? Of Application Security Testing
What? Why? Who? How? Of Application Security Testing What? Why? Who? How? Of Application Security Testing
What? Why? Who? How? Of Application Security Testing
 
Software fails 2016
Software fails 2016Software fails 2016
Software fails 2016
 
Mobil Messaging Apps 2014: Digital Intimacy Attracts Users, Challenges Marketers
Mobil Messaging Apps 2014: Digital Intimacy Attracts Users, Challenges MarketersMobil Messaging Apps 2014: Digital Intimacy Attracts Users, Challenges Marketers
Mobil Messaging Apps 2014: Digital Intimacy Attracts Users, Challenges Marketers
 
Three main pain points from today’s smartphones
Three main pain points from today’s smartphonesThree main pain points from today’s smartphones
Three main pain points from today’s smartphones
 
The Appstore Opportunity by Gert Jan Spriensma
The Appstore Opportunity by Gert Jan Spriensma The Appstore Opportunity by Gert Jan Spriensma
The Appstore Opportunity by Gert Jan Spriensma
 

Recently uploaded

Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 

Recently uploaded (20)

Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 

Palo Alto Networks Application Usage and Risk Report - Key Findings for UK

  • 1. Five Facts About Application Usage on Enterprise Networks in the UK Application Usage and Risk Report December 2011
  • 2.
  • 3. Average number of social networking applications per organization? A total of 68 different social networking applications were found in 100% of the 70 participating organizations with an average of 17 found on each network.
  • 4.
  • 5. Which application is used more heavily? Based on the percentage of social networking bandwidth consumed, Facebook consumed 60% of the bandwidth while Twitter consumed 14%.
  • 6. Active social networking application (games, posting, plugins, apps) usage patterns are similar to those observed globally. Facebook is a clear dominant player with 60% of BW consumed.
  • 7.
  • 8. Average number of browser-based filesharing applications per organization? A total of 42 different browser-based filesharing applications were found in 96% of the 70 participating organizations with an average of 13 in each.
  • 9. Browser-based filesharing use cases: work or entertainment. Both uses have a common set of business and security risks that organizations must address.
  • 10.
  • 11. The number of applications using Port 80 (tcp/80) only? The number of applications that ONLY use Port 80 is 214 or 26% of the 812 applications found in the participating organizations.
  • 12.
  • 13. Percentage of total bandwidth consumed by applications not using tcp/80? 61% of the total bandwidth is being consumed by 240 (30% of 812) applications that DO NOT USE port 80 at all. Ever.
  • 14. Port 80 only security is shortsighted. The common perception is that Port 80 (tcp/80) is where all the traffic and all the problems are. A port 80 emphasis is an absolute requirement; but too much focus is shortsighted.
  • 15.
  • 16. Palo Alto Networks Application Usage and Risk Report www.paloaltonetworks.com/aur