SlideShare a Scribd company logo
Five Facts About Application
Usage on Enterprise Networks
                     in China



     Application Usage and Risk Report
                        December 2011
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Average number of social networking
     applications per organization?




A total of 48 different social networking applications were
 found in 94% of the 18 participating organizations with an
             average of 7 found on each network.
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Which application is used more heavily?




 Based on the percentage of social networking bandwidth
 consumed in the 18 participating organizations, Renren
consumed 34%. Facebook and Twitter consumed 1% and
                   0% respectively.
Local social networking applications dominate. Facebook,
   Twitter and their “active” uses struggle for their share of
                           bandwidth.
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Average number of browser-based
filesharing applications per organization?




   A total of 30 different browser-based filesharing
   applications were found in 89% of the participating
      organizations with an average of 8 in each.
Browser-based filesharing use cases: work or
entertainment. Both uses have a common set of business
   and security risks that organizations must address.
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
The number of applications
         using Port 80 (tcp/80) only?




The number of applications that ONLY use Port 80 is 135 or
   26% of the 535 applications found in the participating
                       organizations.
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Percentage of total bandwidth consumed
    by applications not using tcp/80?




49% of the total bandwidth is being consumed by 161 (30%
 of 535) applications that DO NOT USE port 80 at all. Ever.
Port 80 only security is shortsighted. The common
perception is that Port 80 (tcp/80) is where all the traffic and all
     the problems are. A port 80 emphasis is an absolute
       requirement; but too much focus is shortsighted.
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Palo Alto Networks Application Usage
           and Risk Report

   www.paloaltonetworks.com/aur

More Related Content

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...

What's hot (20)

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
PPTX
Application Usage and Risk Report - Key Findings for US
PPTX
Application Usage on Enterprise Networks, December 2011.
PDF
Detecting Malicious Facebook Applications
PPS
Nuevas tecnologías a nivel de hogares
PDF
Retail Industry Application Security Survey Insights
PDF
IRJET- Authentic News Summarization
PDF
In mobi state_of_app_downloads_q3_2014
PDF
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
PPTX
Data As Air
PDF
Mobile Security: Apps are our digital lives.
PDF
Avast Q1 Security Report 2015
PPTX
T.A.S.C - mobile device secuirty
PDF
Encrypting User Data in Local Government 2016
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Application Usage and Risk Report - Key Findings for US
Application Usage on Enterprise Networks, December 2011.
Detecting Malicious Facebook Applications
Nuevas tecnologías a nivel de hogares
Retail Industry Application Security Survey Insights
IRJET- Authentic News Summarization
In mobi state_of_app_downloads_q3_2014
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
Data As Air
Mobile Security: Apps are our digital lives.
Avast Q1 Security Report 2015
T.A.S.C - mobile device secuirty
Encrypting User Data in Local Government 2016
Ad

Similar to Palo Alto Networks Application Usage and Risk Report - Key Findings for China (20)

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
PDF
Application usage risk_report_2011-05-countries
PPT
Presentacion Palo Alto Networks
PDF
Network Flow Analysis
PDF
Network Flow Analysis
PPTX
Palo alto networks_customer_overview_november2011-short
PDF
Network traffic locality in a rural african village, ictd, 2012
PDF
Study_Paper_akamai_network.pdf
PDF
A Comparative Demonstration And Analysis Of File Sharing Applications On Andr...
PPTX
Avr_presentation
PPTX
PDF
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
PDF
Is the Web at Risk?
PDF
Aus cert event_2010
PDF
Novell filr customer slides richard lindstedt
PDF
Web Servers - How They Work
PPTX
Novell Filr Overview
PDF
Rothke Using Kazaa To Test Your Security Posture
PDF
Ra 011513-01-finalv3
PDF
Sophos social-media-wpna
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Application usage risk_report_2011-05-countries
Presentacion Palo Alto Networks
Network Flow Analysis
Network Flow Analysis
Palo alto networks_customer_overview_november2011-short
Network traffic locality in a rural african village, ictd, 2012
Study_Paper_akamai_network.pdf
A Comparative Demonstration And Analysis Of File Sharing Applications On Andr...
Avr_presentation
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
Is the Web at Risk?
Aus cert event_2010
Novell filr customer slides richard lindstedt
Web Servers - How They Work
Novell Filr Overview
Rothke Using Kazaa To Test Your Security Posture
Ra 011513-01-finalv3
Sophos social-media-wpna
Ad

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Approach and Philosophy of On baking technology
PPTX
Spectroscopy.pptx food analysis technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
1. Introduction to Computer Programming.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Electronic commerce courselecture one. Pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Tartificialntelligence_presentation.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Reach Out and Touch Someone: Haptics and Empathic Computing
Approach and Philosophy of On baking technology
Spectroscopy.pptx food analysis technology
Advanced methodologies resolving dimensionality complications for autism neur...
1. Introduction to Computer Programming.pptx
Spectral efficient network and resource selection model in 5G networks
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Weekly Chronicles - August'25-Week II
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Network Security Unit 5.pdf for BCA BBA.
Electronic commerce courselecture one. Pdf
A comparative analysis of optical character recognition models for extracting...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
gpt5_lecture_notes_comprehensive_20250812015547.pdf

Palo Alto Networks Application Usage and Risk Report - Key Findings for China

  • 1. Five Facts About Application Usage on Enterprise Networks in China Application Usage and Risk Report December 2011
  • 3. Average number of social networking applications per organization? A total of 48 different social networking applications were found in 94% of the 18 participating organizations with an average of 7 found on each network.
  • 5. Which application is used more heavily? Based on the percentage of social networking bandwidth consumed in the 18 participating organizations, Renren consumed 34%. Facebook and Twitter consumed 1% and 0% respectively.
  • 6. Local social networking applications dominate. Facebook, Twitter and their “active” uses struggle for their share of bandwidth.
  • 8. Average number of browser-based filesharing applications per organization? A total of 30 different browser-based filesharing applications were found in 89% of the participating organizations with an average of 8 in each.
  • 9. Browser-based filesharing use cases: work or entertainment. Both uses have a common set of business and security risks that organizations must address.
  • 11. The number of applications using Port 80 (tcp/80) only? The number of applications that ONLY use Port 80 is 135 or 26% of the 535 applications found in the participating organizations.
  • 13. Percentage of total bandwidth consumed by applications not using tcp/80? 49% of the total bandwidth is being consumed by 161 (30% of 535) applications that DO NOT USE port 80 at all. Ever.
  • 14. Port 80 only security is shortsighted. The common perception is that Port 80 (tcp/80) is where all the traffic and all the problems are. A port 80 emphasis is an absolute requirement; but too much focus is shortsighted.
  • 16. Palo Alto Networks Application Usage and Risk Report www.paloaltonetworks.com/aur