SlideShare a Scribd company logo
Five Facts About Application
Usage on Enterprise Networks
                   in the USA



     Application Usage and Risk Report
                        December 2011
Application Usage and Risk Report - Key Findings for US
Average number of social networking
      applications per organization?




A total of 69 different social networking applications were
 found in 96% of the 395 participating organizations with an
            average of 15 found on each network.
Application Usage and Risk Report - Key Findings for US
Which application is used more heavily?




 Based on the percentage of social networking bandwidth
  consumed, Zynga was used more heavily (7%) than
Linkedin (4%). Facebook and Twitter consumed 40% and
                   21% respectively.
Active social networking applications (games, plugins,
   posting) are used more heavily in the USA than they are
globally. Facebook is a clear dominant player with 40% of BW
                          consumed.
Application Usage and Risk Report - Key Findings for US
Average number of browser-based
filesharing applications per organization?




   A total of 55 different browser-based filesharing
 applications were found in 95% of the 395 participating
      organizations with an average of 11 in each.
Browser-based filesharing use cases: work or
entertainment. Both uses have a common set of business
   and security risks that organizations must address.
Application Usage and Risk Report - Key Findings for US
The number of applications
         using Port 80 (tcp/80) only?




The number of applications that ONLY use Port 80 is 270 or
  24% of the 1,121 applications found in the participating
                       organizations.
Application Usage and Risk Report - Key Findings for US
Percentage of total bandwidth consumed
    by applications not using tcp/80?




54% of the total bandwidth is being consumed by 534 (48%
of 1,121) applications that DO NOT USE port 80 at all. Ever.
Port 80 only security is shortsighted. The common
perception is that Port 80 (tcp/80) is where all the traffic and all
     the problems are. A port 80 emphasis is an absolute
       requirement; but too much focus is shortsighted.
Application Usage and Risk Report - Key Findings for US
Palo Alto Networks Application Usage
           and Risk Report

   www.paloaltonetworks.com/aur

More Related Content

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux

What's hot (20)

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
PPTX
Application Usage on Enterprise Networks, December 2011.
PDF
Symantec Internet Security Threat Report 2014 - Volume 19
PPTX
Data As Air
PDF
Better Security Through Big Data Analytics
PDF
Symantec Intelligence Report: May 2015
PPS
Nuevas tecnologías a nivel de hogares
PDF
Smartphone User Persona Report 2015 - Malaysia (Infograph)
PDF
Smartphone User Persona Report 2015 - Thailand (Infograph)
PDF
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
PDF
CPDone: Is the BPO Industry Ready for External Compliance Focus?
PDF
11 Reasons Why Your Company Could Be In Danger
PDF
Avast Q1 Security Report 2015
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Application Usage on Enterprise Networks, December 2011.
Symantec Internet Security Threat Report 2014 - Volume 19
Data As Air
Better Security Through Big Data Analytics
Symantec Intelligence Report: May 2015
Nuevas tecnologías a nivel de hogares
Smartphone User Persona Report 2015 - Malaysia (Infograph)
Smartphone User Persona Report 2015 - Thailand (Infograph)
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
CPDone: Is the BPO Industry Ready for External Compliance Focus?
11 Reasons Why Your Company Could Be In Danger
Avast Q1 Security Report 2015
Ad

Viewers also liked (17)

PPT
PPTX
ош № 2 отчет презентация о недели обж,нвп и мсп
PDF
Priority moments digital
PDF
Connected.
DOC
Apuntes
PPT
организация и методика выполнения проектов в физ ре
DOC
Apuntes
PPTX
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
DOC
في الفصل
PPTX
Future makers
PPTX
Future makers
PPT
PDF
Be the Hero
PDF
iPad Pilot Projects at Framingham State University: Three Use Cases
PDF
Aus cert event_2010
PPTX
Jamaica
PPTX
Bb w ppt_content_conferencesession-ittakesa_village_final
ош № 2 отчет презентация о недели обж,нвп и мсп
Priority moments digital
Connected.
Apuntes
организация и методика выполнения проектов в физ ре
Apuntes
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
في الفصل
Future makers
Future makers
Be the Hero
iPad Pilot Projects at Framingham State University: Three Use Cases
Aus cert event_2010
Jamaica
Bb w ppt_content_conferencesession-ittakesa_village_final
Ad

Similar to Application Usage and Risk Report - Key Findings for US (20)

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
PDF
Application usage risk_report_2011-05-countries
PDF
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
PPTX
Palo alto networks_customer_overview_november2011-short
PDF
Novell filr customer slides richard lindstedt
PPT
Presentacion Palo Alto Networks
PDF
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
ODP
Applications for the Masses by the Masses: Why Engineers Are An Endangered Sp...
PPTX
Novell Filr Overview
PDF
Sophos social-media-wpna
PDF
Network Flow Analysis
PDF
Network Flow Analysis
PDF
Decentralized Social Networks - WebVisions 2009
PDF
WEBSITE HOSTING FOR PNG ORGANISATIONS
PDF
Com Ed 8 Prelim
PDF
Iron speed appgeneration
PDF
Rothke Using Kazaa To Test Your Security Posture
PPT
Palo alto networks next generation firewalls
PDF
The DiSo Project
PDF
Is the Web at Risk?
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Application usage risk_report_2011-05-countries
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
Palo alto networks_customer_overview_november2011-short
Novell filr customer slides richard lindstedt
Presentacion Palo Alto Networks
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
Applications for the Masses by the Masses: Why Engineers Are An Endangered Sp...
Novell Filr Overview
Sophos social-media-wpna
Network Flow Analysis
Network Flow Analysis
Decentralized Social Networks - WebVisions 2009
WEBSITE HOSTING FOR PNG ORGANISATIONS
Com Ed 8 Prelim
Iron speed appgeneration
Rothke Using Kazaa To Test Your Security Posture
Palo alto networks next generation firewalls
The DiSo Project
Is the Web at Risk?

Recently uploaded (20)

PDF
August Patch Tuesday
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Tartificialntelligence_presentation.pptx
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Encapsulation theory and applications.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Machine learning based COVID-19 study performance prediction
August Patch Tuesday
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
SOPHOS-XG Firewall Administrator PPT.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Diabetes mellitus diagnosis method based random forest with bat algorithm
NewMind AI Weekly Chronicles - August'25-Week II
Tartificialntelligence_presentation.pptx
TLE Review Electricity (Electricity).pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
Group 1 Presentation -Planning and Decision Making .pptx
Encapsulation theory and applications.pdf
cloud_computing_Infrastucture_as_cloud_p
Reach Out and Touch Someone: Haptics and Empathic Computing
Building Integrated photovoltaic BIPV_UPV.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Machine learning based COVID-19 study performance prediction

Application Usage and Risk Report - Key Findings for US

  • 1. Five Facts About Application Usage on Enterprise Networks in the USA Application Usage and Risk Report December 2011
  • 3. Average number of social networking applications per organization? A total of 69 different social networking applications were found in 96% of the 395 participating organizations with an average of 15 found on each network.
  • 5. Which application is used more heavily? Based on the percentage of social networking bandwidth consumed, Zynga was used more heavily (7%) than Linkedin (4%). Facebook and Twitter consumed 40% and 21% respectively.
  • 6. Active social networking applications (games, plugins, posting) are used more heavily in the USA than they are globally. Facebook is a clear dominant player with 40% of BW consumed.
  • 8. Average number of browser-based filesharing applications per organization? A total of 55 different browser-based filesharing applications were found in 95% of the 395 participating organizations with an average of 11 in each.
  • 9. Browser-based filesharing use cases: work or entertainment. Both uses have a common set of business and security risks that organizations must address.
  • 11. The number of applications using Port 80 (tcp/80) only? The number of applications that ONLY use Port 80 is 270 or 24% of the 1,121 applications found in the participating organizations.
  • 13. Percentage of total bandwidth consumed by applications not using tcp/80? 54% of the total bandwidth is being consumed by 534 (48% of 1,121) applications that DO NOT USE port 80 at all. Ever.
  • 14. Port 80 only security is shortsighted. The common perception is that Port 80 (tcp/80) is where all the traffic and all the problems are. A port 80 emphasis is an absolute requirement; but too much focus is shortsighted.
  • 16. Palo Alto Networks Application Usage and Risk Report www.paloaltonetworks.com/aur