SlideShare a Scribd company logo
Five Facts About Application
Usage on Enterprise Networks
                     in Spain



     Application Usage and Risk Report
                        December 2011
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Average number of social networking
      applications per organization?




A total of 63 different social networking applications were
 found in 99% of the 71 participating organizations with an
            average of 21 found on each network.
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Which application is used more heavily?




                         (Vkontakte)



  Based on the percentage of social networking bandwidth
 consumed, Vkontakte is used more heavily at 9% of the
bandwidth. Facebook and Twitter crush all others at 40% and
                    19% respectively.
Active social networking applications (games, posting,
plugins, apps) are used a more heavily when compared to
global usage patterns. Facebook is the clear leader with 40%
                     of BW consumed.
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Average number of browser-based
filesharing applications per organization?




   A total of 48 different browser-based filesharing
 applications were found in 96% of the 71 participating
      organizations with an average of 21 in each.
Browser-based filesharing use cases: work or
entertainment. Both uses have a common set of business
   and security risks that organizations must address.
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
The number of applications
          using Port 80 (tcp/80) only?




The number of applications that ONLY use Port 80 is 224 or
   24% of the 935 applications found in the participating
                       organizations.
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Percentage of total bandwidth consumed
    by applications not using tcp/80?




53% of the total bandwidth is being consumed by 344 (37%
 of 935) applications that DO NOT USE port 80 at all. Ever.
Port 80 only security is shortsighted. The common
perception is that Port 80 (tcp/80) is where all the traffic and all
     the problems are. A port 80 emphasis is an absolute
       requirement; but too much focus is shortsighted.
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage
           and Risk Report

   www.paloaltonetworks.com/aur

More Related Content

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics

What's hot (20)

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
PPTX
Application Usage and Risk Report - Key Findings for US
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
PPTX
Application Usage on Enterprise Networks, December 2011.
PDF
Detecting Malicious Facebook Applications
PDF
Retail Industry Application Security Survey Insights
PPTX
Mobile Threats, Made to Measure
PPTX
Data As Air
PDF
In mobi state_of_app_downloads_q3_2014
PDF
Mobile Security: Apps are our digital lives.
PDF
CPDone: Is the BPO Industry Ready for External Compliance Focus?
PDF
IRJET- Authentic News Summarization
PDF
In mobi insights the state of mobile app downloads
PDF
Digital Digest Q4 2014
PDF
February 2014 mobile analytics report
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
Application Usage and Risk Report - Key Findings for US
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
Application Usage on Enterprise Networks, December 2011.
Detecting Malicious Facebook Applications
Retail Industry Application Security Survey Insights
Mobile Threats, Made to Measure
Data As Air
In mobi state_of_app_downloads_q3_2014
Mobile Security: Apps are our digital lives.
CPDone: Is the BPO Industry Ready for External Compliance Focus?
IRJET- Authentic News Summarization
In mobi insights the state of mobile app downloads
Digital Digest Q4 2014
February 2014 mobile analytics report
Ad

Similar to Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain (20)

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
PDF
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
PDF
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
PDF
Application usage risk_report_2011-05-countries
PDF
Globalpiracy2008
PDF
Global Piracy
PPTX
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
PDF
Enhancing Cybersecurity Readiness Through International Cooperation
PPTX
State of endpoint risk v3
PPTX
State of endpoint risk v3
PPTX
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
PDF
2016 trustwave global security report
PDF
En msft-scrty-cntnt-e book-cybersecurity
PDF
2016 Trends in Security
PDF
50 Software Development Stats Market Trends and Insights for the Year 2024
PPT
Kjvg hit2008eng
 
PPTX
Intelligence on the Intractable Problem of Software Security
PPT
State of endpoint risk v3
PPT
State of endpoint risk v3
PPT
State of endpoint risk v3
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
Application usage risk_report_2011-05-countries
Globalpiracy2008
Global Piracy
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Enhancing Cybersecurity Readiness Through International Cooperation
State of endpoint risk v3
State of endpoint risk v3
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
2016 trustwave global security report
En msft-scrty-cntnt-e book-cybersecurity
2016 Trends in Security
50 Software Development Stats Market Trends and Insights for the Year 2024
Kjvg hit2008eng
 
Intelligence on the Intractable Problem of Software Security
State of endpoint risk v3
State of endpoint risk v3
State of endpoint risk v3
Ad

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Tartificialntelligence_presentation.pptx
PPTX
1. Introduction to Computer Programming.pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Electronic commerce courselecture one. Pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
20250228 LYD VKU AI Blended-Learning.pptx
MYSQL Presentation for SQL database connectivity
NewMind AI Weekly Chronicles - August'25-Week II
Diabetes mellitus diagnosis method based random forest with bat algorithm
Programs and apps: productivity, graphics, security and other tools
Network Security Unit 5.pdf for BCA BBA.
MIND Revenue Release Quarter 2 2025 Press Release
Spectral efficient network and resource selection model in 5G networks
Advanced methodologies resolving dimensionality complications for autism neur...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Tartificialntelligence_presentation.pptx
1. Introduction to Computer Programming.pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Building Integrated photovoltaic BIPV_UPV.pdf
Machine learning based COVID-19 study performance prediction
Electronic commerce courselecture one. Pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain

  • 1. Five Facts About Application Usage on Enterprise Networks in Spain Application Usage and Risk Report December 2011
  • 3. Average number of social networking applications per organization? A total of 63 different social networking applications were found in 99% of the 71 participating organizations with an average of 21 found on each network.
  • 5. Which application is used more heavily? (Vkontakte) Based on the percentage of social networking bandwidth consumed, Vkontakte is used more heavily at 9% of the bandwidth. Facebook and Twitter crush all others at 40% and 19% respectively.
  • 6. Active social networking applications (games, posting, plugins, apps) are used a more heavily when compared to global usage patterns. Facebook is the clear leader with 40% of BW consumed.
  • 8. Average number of browser-based filesharing applications per organization? A total of 48 different browser-based filesharing applications were found in 96% of the 71 participating organizations with an average of 21 in each.
  • 9. Browser-based filesharing use cases: work or entertainment. Both uses have a common set of business and security risks that organizations must address.
  • 11. The number of applications using Port 80 (tcp/80) only? The number of applications that ONLY use Port 80 is 224 or 24% of the 935 applications found in the participating organizations.
  • 13. Percentage of total bandwidth consumed by applications not using tcp/80? 53% of the total bandwidth is being consumed by 344 (37% of 935) applications that DO NOT USE port 80 at all. Ever.
  • 14. Port 80 only security is shortsighted. The common perception is that Port 80 (tcp/80) is where all the traffic and all the problems are. A port 80 emphasis is an absolute requirement; but too much focus is shortsighted.
  • 16. Palo Alto Networks Application Usage and Risk Report www.paloaltonetworks.com/aur