SlideShare a Scribd company logo
Five Facts About Application
Usage on Enterprise Networks
 in Australia and New Zealand



     Application Usage and Risk Report
                        December 2011
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
Average number of social networking
     applications per organization?




A total of 34 different social networking applications were
 found in 86% of the 21 participating organizations with an
            average of 20 found on each network.
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
Which application is used more heavily?




  Based on the percentage of social networking bandwidth
consumed in the 21 participating ANZ organizations, Tumblr
         is used more heavily than Facebook.
Facebook takes a Tumblr. This NYC-based micro-blogging
     site is used more heavily in ANZ than any other social
   networking application. ANZ is the only geography where
Tumblr was used so heavily and it highlights the fact that where
  the application is developed has little bearing on where it is
                            popular.
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
Average number of browser-based
filesharing applications per organization?




   A total of 34 different browser-based filesharing
 applications were found in 81% of the 21 participating
      organizations with an average of 12 in each.
Browser-based filesharing use cases: work or
entertainment. Both uses have a common set of business
   and security risks that organizations must address.
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
The number of applications
          using Port 80 (tcp/80) only?




The number of applications that ONLY use Port 80 is 157 or
 28% of the 566 applications found in the participating ANZ
                       organizations.
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
Percentage of total bandwidth consumed
    by applications not using tcp/80?




67% of the total bandwidth is being consumed by 219 (39%
 of 566) applications that DO NOT USE port 80 at all. Ever.
Port 80 only security is shortsighted. The common
perception is that Port 80 (tcp/80) is where all the traffic and all
     the problems are. A port 80 emphasis is an absolute
       requirement; but too much focus is shortsighted.
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
Palo Alto Networks Application Usage
           and Risk Report

   www.paloaltonetworks.com/aur

More Related Content

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
PPTX
Application Usage and Risk Report - Key Findings for US
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
Application Usage and Risk Report - Key Findings for US
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux

What's hot (16)

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
PPTX
Application Usage on Enterprise Networks, December 2011.
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
PPTX
Data As Air
PPS
Nuevas tecnologías a nivel de hogares
PDF
Retail Industry Application Security Survey Insights
PDF
IRJET- Authentic News Summarization
PDF
Mobile Security: Apps are our digital lives.
PDF
In mobi state_of_app_downloads_q3_2014
PDF
Secure your network to secure your reputation and your income
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Application Usage on Enterprise Networks, December 2011.
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Data As Air
Nuevas tecnologías a nivel de hogares
Retail Industry Application Security Survey Insights
IRJET- Authentic News Summarization
Mobile Security: Apps are our digital lives.
In mobi state_of_app_downloads_q3_2014
Secure your network to secure your reputation and your income
Ad

Similar to Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ (20)

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
PDF
Application usage risk_report_2011-05-countries
PDF
Novell filr customer slides richard lindstedt
PDF
Web Servers - How They Work
PDF
Com Ed 8 Prelim
PPTX
Novell Filr Overview
PDF
Do you really want to be my friend? Abbreviated version, Helsinki 2008.
PDF
WEBSITE HOSTING FOR PNG ORGANISATIONS
PDF
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
PDF
Study_Paper_akamai_network.pdf
PDF
Internet Security
PDF
Web Hosting - What is it?
PPTX
Open Source Web Content Management Strategies
PDF
Rothke Using Kazaa To Test Your Security Posture
PPT
Make Web, Not War - Open Source Microsoft Event
KEY
Open pne3 with_symfony
PPTX
Social media
PDF
Inside Facebook Applications July2007
PDF
Joji ilagan career center foundation8pre2
PPTX
50freetools 090518131706-phpapp01
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Application usage risk_report_2011-05-countries
Novell filr customer slides richard lindstedt
Web Servers - How They Work
Com Ed 8 Prelim
Novell Filr Overview
Do you really want to be my friend? Abbreviated version, Helsinki 2008.
WEBSITE HOSTING FOR PNG ORGANISATIONS
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
Study_Paper_akamai_network.pdf
Internet Security
Web Hosting - What is it?
Open Source Web Content Management Strategies
Rothke Using Kazaa To Test Your Security Posture
Make Web, Not War - Open Source Microsoft Event
Open pne3 with_symfony
Social media
Inside Facebook Applications July2007
Joji ilagan career center foundation8pre2
50freetools 090518131706-phpapp01
Ad

Recently uploaded (20)

PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Tartificialntelligence_presentation.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
MYSQL Presentation for SQL database connectivity
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Machine Learning_overview_presentation.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Group 1 Presentation -Planning and Decision Making .pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Tartificialntelligence_presentation.pptx
Encapsulation_ Review paper, used for researhc scholars
MYSQL Presentation for SQL database connectivity
The Rise and Fall of 3GPP – Time for a Sabbatical?
A comparative analysis of optical character recognition models for extracting...
Machine Learning_overview_presentation.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Unlocking AI with Model Context Protocol (MCP)
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MIND Revenue Release Quarter 2 2025 Press Release
Accuracy of neural networks in brain wave diagnosis of schizophrenia
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Encapsulation theory and applications.pdf
Spectroscopy.pptx food analysis technology
Programs and apps: productivity, graphics, security and other tools
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ

  • 1. Five Facts About Application Usage on Enterprise Networks in Australia and New Zealand Application Usage and Risk Report December 2011
  • 3. Average number of social networking applications per organization? A total of 34 different social networking applications were found in 86% of the 21 participating organizations with an average of 20 found on each network.
  • 5. Which application is used more heavily? Based on the percentage of social networking bandwidth consumed in the 21 participating ANZ organizations, Tumblr is used more heavily than Facebook.
  • 6. Facebook takes a Tumblr. This NYC-based micro-blogging site is used more heavily in ANZ than any other social networking application. ANZ is the only geography where Tumblr was used so heavily and it highlights the fact that where the application is developed has little bearing on where it is popular.
  • 8. Average number of browser-based filesharing applications per organization? A total of 34 different browser-based filesharing applications were found in 81% of the 21 participating organizations with an average of 12 in each.
  • 9. Browser-based filesharing use cases: work or entertainment. Both uses have a common set of business and security risks that organizations must address.
  • 11. The number of applications using Port 80 (tcp/80) only? The number of applications that ONLY use Port 80 is 157 or 28% of the 566 applications found in the participating ANZ organizations.
  • 13. Percentage of total bandwidth consumed by applications not using tcp/80? 67% of the total bandwidth is being consumed by 219 (39% of 566) applications that DO NOT USE port 80 at all. Ever.
  • 14. Port 80 only security is shortsighted. The common perception is that Port 80 (tcp/80) is where all the traffic and all the problems are. A port 80 emphasis is an absolute requirement; but too much focus is shortsighted.
  • 16. Palo Alto Networks Application Usage and Risk Report www.paloaltonetworks.com/aur