palo alto networks application usage and risk report - key findings for china

16
Five Facts About Application Usage on Enterprise Networks in China Application Usage and Risk Report December 2011

Upload: palo-alto-networks

Post on 28-May-2015

1.140 views

Category:

Technology


0 download

DESCRIPTION

Key findings from Palo Alto Networks Application Usage and Risk Report, December 2011 (China Only). The slides provides insight into application activity that is based on network application assessments that show what is really happening on corporate networks.

TRANSCRIPT

Page 1: Palo Alto Networks Application Usage and Risk Report - Key Findings for China

Five Facts About ApplicationUsage on Enterprise Networks

in China

Application Usage and Risk Report December 2011

Page 2: Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Page 3: Palo Alto Networks Application Usage and Risk Report - Key Findings for China

Average number of social networking applications per organization?

A total of 48 different social networking applications were found in 94% of the 18 participating organizations with an

average of 7 found on each network.

7

Page 4: Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Page 5: Palo Alto Networks Application Usage and Risk Report - Key Findings for China

Which application is used more heavily?

Based on the percentage of social networking bandwidth consumed in the 18 participating organizations, Renren

consumed 34%. Facebook and Twitter consumed 1% and 0% respectively.

Page 6: Palo Alto Networks Application Usage and Risk Report - Key Findings for China

Local social networking applications dominate. Facebook, Twitter and their “active” uses struggle for their share of

bandwidth.

Page 7: Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Page 8: Palo Alto Networks Application Usage and Risk Report - Key Findings for China

Average number of browser-based filesharing applications per organization?

A total of 30 different browser-based filesharing applications were found in 89% of the participating

organizations with an average of 8 in each.

8

Page 9: Palo Alto Networks Application Usage and Risk Report - Key Findings for China

Browser-based filesharing use cases: work or entertainment. Both uses have a common set of business

and security risks that organizations must address.

Page 10: Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Page 11: Palo Alto Networks Application Usage and Risk Report - Key Findings for China

The number of applications using Port 80 (tcp/80) only?

The number of applications that ONLY use Port 80 is 135 or 26% of the 535 applications found in the participating

organizations.

135

Page 12: Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Page 13: Palo Alto Networks Application Usage and Risk Report - Key Findings for China

Percentage of total bandwidth consumed by applications not using tcp/80?

49% of the total bandwidth is being consumed by 161 (30% of 535) applications that DO NOT USE port 80 at all. Ever.

49%

Page 14: Palo Alto Networks Application Usage and Risk Report - Key Findings for China

Port 80 only security is shortsighted. The common perception is that Port 80 (tcp/80) is where all the traffic and all

the problems are. A port 80 emphasis is an absolute requirement; but too much focus is shortsighted.

Page 15: Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Page 16: Palo Alto Networks Application Usage and Risk Report - Key Findings for China

Palo Alto Networks Application Usage and Risk Report

www.paloaltonetworks.com/aur