SlideShare a Scribd company logo
Five Facts About Application
Usage on Enterprise Networks
                    in France



     Application Usage and Risk Report
                        December 2011
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
Average number of social networking
     applications per organization?




A total of 63 different social networking applications were
 found in 98% of the 85 participating organizations with an
            average of 16 found on each network.
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
Which application is used more heavily?




                       (Facebook Apps)



  Based on the percentage of social networking bandwidth
 consumed in the 85 participating organizations, Facebook
apps 28% of the bandwidth while Twitter consumed 12%.
        Facebook at 42% is the most heavily used.
Facebook dominates. Active social networking applications
such as games and plugins are used more heavily than they
                      are globally.
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
Average number of browser-based
filesharing applications per organization?




   A total of 54 different browser-based filesharing
 applications were found in 94% of the 85 participating
      organizations with an average of 15 in each.
Browser-based filesharing use cases: work or
entertainment. Both uses have a common set of business
   and security risks that organizations must address.
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
The number of applications
         using Port 80 (tcp/80) only?




The number of applications that ONLY use Port 80 is 228 or
   31% of the 867 applications found in the participating
                       organizations.
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
Percentage of total bandwidth consumed
    by applications not using tcp/80?




55% of the total bandwidth is being consumed by 256 (30%
 of 867) applications that DO NOT USE port 80 at all. Ever.
Port 80 only security is shortsighted. The common
perception is that Port 80 (tcp/80) is where all the traffic and all
     the problems are. A port 80 emphasis is an absolute
       requirement; but too much focus is shortsighted.
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
Palo Alto Networks Application Usage
           and Risk Report

   www.paloaltonetworks.com/aur

More Related Content

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea

What's hot (16)

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
PPTX
Application Usage and Risk Report - Key Findings for US
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
PPTX
Application Usage on Enterprise Networks, December 2011.
PPS
Nuevas tecnologías a nivel de hogares
PDF
Detecting Malicious Facebook Applications
PDF
Secure your network to secure your reputation and your income
PDF
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
PDF
Retail Industry Application Security Survey Insights
PDF
IRJET- Authentic News Summarization
PDF
In mobi state_of_app_downloads_q3_2014
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
Application Usage and Risk Report - Key Findings for US
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
Application Usage on Enterprise Networks, December 2011.
Nuevas tecnologías a nivel de hogares
Detecting Malicious Facebook Applications
Secure your network to secure your reputation and your income
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
Retail Industry Application Security Survey Insights
IRJET- Authentic News Summarization
In mobi state_of_app_downloads_q3_2014
Ad

Similar to Palo Alto Networks Application Usage and Risk Report - Key Findings for France (20)

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
PDF
Application usage risk_report_2011-05-countries
PPTX
Palo alto networks_customer_overview_november2011-short
PDF
Aus cert event_2010
PDF
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
PDF
Novell filr customer slides richard lindstedt
PDF
Inside Facebook Applications July2007
PDF
Sophos social-media-wpna
PPT
Presentacion Palo Alto Networks
ODP
Applications for the Masses by the Masses: Why Engineers Are An Endangered Sp...
PDF
Com Ed 8 Prelim
PDF
Network Flow Analysis
PDF
Network Flow Analysis
PDF
Performance and Creativity
PPTX
Novell Filr Overview
PDF
[B3]couchbase server for speed and scale with interactive applications sdec...
PDF
Google Devfest Bangkok - OpenSocial
PDF
Whitepaper the application network
PDF
Codecentric At Ajax World Conference San Jose
PDF
Is the Web at Risk?
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Application usage risk_report_2011-05-countries
Palo alto networks_customer_overview_november2011-short
Aus cert event_2010
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
Novell filr customer slides richard lindstedt
Inside Facebook Applications July2007
Sophos social-media-wpna
Presentacion Palo Alto Networks
Applications for the Masses by the Masses: Why Engineers Are An Endangered Sp...
Com Ed 8 Prelim
Network Flow Analysis
Network Flow Analysis
Performance and Creativity
Novell Filr Overview
[B3]couchbase server for speed and scale with interactive applications sdec...
Google Devfest Bangkok - OpenSocial
Whitepaper the application network
Codecentric At Ajax World Conference San Jose
Is the Web at Risk?
Ad

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
Teaching material agriculture food technology
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Mushroom cultivation and it's methods.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Approach and Philosophy of On baking technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Teaching material agriculture food technology
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Group 1 Presentation -Planning and Decision Making .pptx
Building Integrated photovoltaic BIPV_UPV.pdf
A Presentation on Artificial Intelligence
Spectral efficient network and resource selection model in 5G networks
Assigned Numbers - 2025 - Bluetooth® Document
Univ-Connecticut-ChatGPT-Presentaion.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
TLE Review Electricity (Electricity).pptx
Mushroom cultivation and it's methods.pdf
MIND Revenue Release Quarter 2 2025 Press Release
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
A comparative study of natural language inference in Swahili using monolingua...
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.
Approach and Philosophy of On baking technology

Palo Alto Networks Application Usage and Risk Report - Key Findings for France

  • 1. Five Facts About Application Usage on Enterprise Networks in France Application Usage and Risk Report December 2011
  • 3. Average number of social networking applications per organization? A total of 63 different social networking applications were found in 98% of the 85 participating organizations with an average of 16 found on each network.
  • 5. Which application is used more heavily? (Facebook Apps) Based on the percentage of social networking bandwidth consumed in the 85 participating organizations, Facebook apps 28% of the bandwidth while Twitter consumed 12%. Facebook at 42% is the most heavily used.
  • 6. Facebook dominates. Active social networking applications such as games and plugins are used more heavily than they are globally.
  • 8. Average number of browser-based filesharing applications per organization? A total of 54 different browser-based filesharing applications were found in 94% of the 85 participating organizations with an average of 15 in each.
  • 9. Browser-based filesharing use cases: work or entertainment. Both uses have a common set of business and security risks that organizations must address.
  • 11. The number of applications using Port 80 (tcp/80) only? The number of applications that ONLY use Port 80 is 228 or 31% of the 867 applications found in the participating organizations.
  • 13. Percentage of total bandwidth consumed by applications not using tcp/80? 55% of the total bandwidth is being consumed by 256 (30% of 867) applications that DO NOT USE port 80 at all. Ever.
  • 14. Port 80 only security is shortsighted. The common perception is that Port 80 (tcp/80) is where all the traffic and all the problems are. A port 80 emphasis is an absolute requirement; but too much focus is shortsighted.
  • 16. Palo Alto Networks Application Usage and Risk Report www.paloaltonetworks.com/aur