SlideShare a Scribd company logo
Five Facts About Application
Usage on Enterprise Networks
               in Hong Kong



     Application Usage and Risk Report
                        December 2011
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong Kong
Average number of social networking
     applications per organization?




A total of 63 different social networking applications were
 found in 98% of the 46 participating organizations with an
            average of 14 found on each network.
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong Kong
Which application is used more heavily?




 Based on the percentage of social networking bandwidth
consumed, Daum consumed 5% while Twitter consumed
 4%. Facebook consumed a staggering 62% of the social
                 networking bandwidth.
Facebook dominates. Active social networking application
(games, plugins, posting) usage is heavier in Hong Kong than it
                           is globally
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong Kong
Average number of browser-based
filesharing applications per organization?




   A total of 41 different browser-based filesharing
 applications were found in 100% of the 46 participating
      organizations with an average of 12 in each.
Browser-based filesharing use cases: work or
entertainment. Both uses have a common set of business
   and security risks that organizations must address.
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong Kong
The number of applications
         using Port 80 (tcp/80) only?




The number of applications that ONLY use Port 80 is 204 or
   28% of the 734 applications found in the participating
                       organizations.
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong Kong
Percentage of total bandwidth consumed
    by applications not using tcp/80?




Only 19% of the total bandwidth is being consumed by 195
 (27% of 734) applications that DO NOT USE port 80 at all.
                            Ever.
Port 80 only security is shortsighted. The common
perception is that Port 80 (tcp/80) is where all the traffic and all
     the problems are. A port 80 emphasis is an absolute
       requirement; but too much focus is shortsighted.
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong Kong
Palo Alto Networks Application Usage
           and Risk Report

   www.paloaltonetworks.com/aur

More Related Content

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand

What's hot (19)

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
PPTX
Application Usage and Risk Report - Key Findings for US
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
PPTX
Application Usage on Enterprise Networks, December 2011.
PPTX
Data As Air
PPS
Nuevas tecnologías a nivel de hogares
PDF
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
PDF
Secure your network to secure your reputation and your income
PDF
Detecting Malicious Facebook Applications
PDF
Retail Industry Application Security Survey Insights
PDF
Avast Q1 Security Report 2015
PDF
Mobile Security: Apps are our digital lives.
PDF
IRJET- Authentic News Summarization
PDF
In mobi state_of_app_downloads_q3_2014
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Application Usage and Risk Report - Key Findings for US
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
Application Usage on Enterprise Networks, December 2011.
Data As Air
Nuevas tecnologías a nivel de hogares
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
Secure your network to secure your reputation and your income
Detecting Malicious Facebook Applications
Retail Industry Application Security Survey Insights
Avast Q1 Security Report 2015
Mobile Security: Apps are our digital lives.
IRJET- Authentic News Summarization
In mobi state_of_app_downloads_q3_2014
Ad

Viewers also liked (6)

PDF
User id installation and configuration
PPT
Presentacion Palo Alto Networks
PPTX
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
PPTX
Palo Alto Networks authentication
PPT
Palo alto networks next generation firewalls
PDF
Palo alto networks NAT flow logic
User id installation and configuration
Presentacion Palo Alto Networks
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
Palo Alto Networks authentication
Palo alto networks next generation firewalls
Palo alto networks NAT flow logic
Ad

Similar to Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong Kong (20)

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
PDF
Application usage risk_report_2011-05-countries
PDF
Web Servers - How They Work
PDF
Com Ed 8 Prelim
PDF
Aus cert event_2010
PDF
Network traffic locality in a rural african village, ictd, 2012
PDF
Rothke Using Kazaa To Test Your Security Posture
PDF
Study_Paper_akamai_network.pdf
PDF
C gros-webscience-talk
PDF
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
PDF
WEBSITE HOSTING FOR PNG ORGANISATIONS
PPTX
Palo alto networks_customer_overview_november2011-short
PDF
Joji ilagan career center foundation8pre2
PPTX
Symantec SMB File Sharing Flash Poll
PDF
WEB SERVERS
PDF
Network Flow Analysis
PDF
Network Flow Analysis
PDF
Novell filr customer slides richard lindstedt
PDF
White paper Cisco Broadband
PDF
P118 gummadi
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Application usage risk_report_2011-05-countries
Web Servers - How They Work
Com Ed 8 Prelim
Aus cert event_2010
Network traffic locality in a rural african village, ictd, 2012
Rothke Using Kazaa To Test Your Security Posture
Study_Paper_akamai_network.pdf
C gros-webscience-talk
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
WEBSITE HOSTING FOR PNG ORGANISATIONS
Palo alto networks_customer_overview_november2011-short
Joji ilagan career center foundation8pre2
Symantec SMB File Sharing Flash Poll
WEB SERVERS
Network Flow Analysis
Network Flow Analysis
Novell filr customer slides richard lindstedt
White paper Cisco Broadband
P118 gummadi

Recently uploaded (20)

PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation theory and applications.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Network Security Unit 5.pdf for BCA BBA.
SOPHOS-XG Firewall Administrator PPT.pptx
Spectroscopy.pptx food analysis technology
Group 1 Presentation -Planning and Decision Making .pptx
Big Data Technologies - Introduction.pptx
Empathic Computing: Creating Shared Understanding
A comparative analysis of optical character recognition models for extracting...
MIND Revenue Release Quarter 2 2025 Press Release
Assigned Numbers - 2025 - Bluetooth® Document
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Machine learning based COVID-19 study performance prediction
Per capita expenditure prediction using model stacking based on satellite ima...
Unlocking AI with Model Context Protocol (MCP)
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation theory and applications.pdf
A Presentation on Artificial Intelligence
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Network Security Unit 5.pdf for BCA BBA.

Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong Kong

  • 1. Five Facts About Application Usage on Enterprise Networks in Hong Kong Application Usage and Risk Report December 2011
  • 3. Average number of social networking applications per organization? A total of 63 different social networking applications were found in 98% of the 46 participating organizations with an average of 14 found on each network.
  • 5. Which application is used more heavily? Based on the percentage of social networking bandwidth consumed, Daum consumed 5% while Twitter consumed 4%. Facebook consumed a staggering 62% of the social networking bandwidth.
  • 6. Facebook dominates. Active social networking application (games, plugins, posting) usage is heavier in Hong Kong than it is globally
  • 8. Average number of browser-based filesharing applications per organization? A total of 41 different browser-based filesharing applications were found in 100% of the 46 participating organizations with an average of 12 in each.
  • 9. Browser-based filesharing use cases: work or entertainment. Both uses have a common set of business and security risks that organizations must address.
  • 11. The number of applications using Port 80 (tcp/80) only? The number of applications that ONLY use Port 80 is 204 or 28% of the 734 applications found in the participating organizations.
  • 13. Percentage of total bandwidth consumed by applications not using tcp/80? Only 19% of the total bandwidth is being consumed by 195 (27% of 734) applications that DO NOT USE port 80 at all. Ever.
  • 14. Port 80 only security is shortsighted. The common perception is that Port 80 (tcp/80) is where all the traffic and all the problems are. A port 80 emphasis is an absolute requirement; but too much focus is shortsighted.
  • 16. Palo Alto Networks Application Usage and Risk Report www.paloaltonetworks.com/aur