SlideShare a Scribd company logo
Five Facts About Application
Usage on Enterprise Networks
                    in Taiwan



     Application Usage and Risk Report
                        December 2011
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Average number of social networking
      applications per organization?




A total of 61 different social networking applications were
 found in 99% of the 148 participating organizations with an
            average of 12 found on each network.
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Which application is used more heavily?




  Based on the percentage of social networking bandwidth
consumed, Zynga games consumed 10% of the bandwidth
             while Twitter consumed only 2%.
Taiwan social networking usage is active. Facebook
dominates but action oriented (apps, games, posting, and
  plugins) usage is greater in Taiwan than it is globally.
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Average number of browser-based
filesharing applications per organization?




   A total of 53 different browser-based filesharing
 applications were found in 97% of the 148 participating
      organizations with an average of 15 in each.
Browser-based filesharing use cases: work or
entertainment. Both uses have a common set of business
   and security risks that organizations must address.
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
The number of applications
         using Port 80 (tcp/80) only?




The number of applications that ONLY use Port 80 is 228 or
   25% of the 898 applications found in the participating
                       organizations.
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Percentage of total bandwidth consumed
    by applications not using tcp/80?




Only 18% of the total bandwidth is being consumed by 292
 (33% of 898) applications that DO NOT USE port 80 at all.
                            Ever.
Port 80 only security is shortsighted. The common
perception is that Port 80 (tcp/80) is where all the traffic and all
     the problems are. A port 80 emphasis is an absolute
       requirement; but too much focus is shortsighted.
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage
           and Risk Report

   www.paloaltonetworks.com/aur

More Related Content

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics

What's hot (20)

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
PPTX
Application Usage and Risk Report - Key Findings for US
PPTX
Application Usage on Enterprise Networks, December 2011.
PDF
Detecting Malicious Facebook Applications
PPS
Nuevas tecnologías a nivel de hogares
PDF
Retail Industry Application Security Survey Insights
PPTX
Data As Air
PDF
IRJET- Authentic News Summarization
PDF
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
PDF
Avast Q1 Security Report 2015
PDF
Mobile Security: Apps are our digital lives.
PDF
In mobi state_of_app_downloads_q3_2014
PPTX
T.A.S.C - mobile device secuirty
PDF
Secure your network to secure your reputation and your income
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
Application Usage and Risk Report - Key Findings for US
Application Usage on Enterprise Networks, December 2011.
Detecting Malicious Facebook Applications
Nuevas tecnologías a nivel de hogares
Retail Industry Application Security Survey Insights
Data As Air
IRJET- Authentic News Summarization
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
Avast Q1 Security Report 2015
Mobile Security: Apps are our digital lives.
In mobi state_of_app_downloads_q3_2014
T.A.S.C - mobile device secuirty
Secure your network to secure your reputation and your income
Ad

Similar to Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan (20)

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
PDF
Application usage risk_report_2011-05-countries
PPTX
Palo alto networks_customer_overview_november2011-short
PPT
Presentacion Palo Alto Networks
PPTX
Palo alto safe application enablement
PPT
Palo alto networks next generation firewalls
PDF
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
PDF
Rothke Using Kazaa To Test Your Security Posture
ODP
Applications for the Masses by the Masses: Why Engineers Are An Endangered Sp...
PPTX
Avr_presentation
PPTX
PDF
WEBSITE HOSTING FOR PNG ORGANISATIONS
PDF
Aus cert event_2010
PDF
Is the Web at Risk?
PDF
Plugging Network Security Holes Using NetFlow
PDF
Novell filr customer slides richard lindstedt
PDF
DeepNines Ds Bandwidth Manager 0909 Lr[1]
PDF
Business Peer Peer File Sharing Guide
PDF
Sophos social-media-wpna
PDF
Infotec 2010 Ben Rothke - social networks and information security
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Application usage risk_report_2011-05-countries
Palo alto networks_customer_overview_november2011-short
Presentacion Palo Alto Networks
Palo alto safe application enablement
Palo alto networks next generation firewalls
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
Rothke Using Kazaa To Test Your Security Posture
Applications for the Masses by the Masses: Why Engineers Are An Endangered Sp...
Avr_presentation
WEBSITE HOSTING FOR PNG ORGANISATIONS
Aus cert event_2010
Is the Web at Risk?
Plugging Network Security Holes Using NetFlow
Novell filr customer slides richard lindstedt
DeepNines Ds Bandwidth Manager 0909 Lr[1]
Business Peer Peer File Sharing Guide
Sophos social-media-wpna
Infotec 2010 Ben Rothke - social networks and information security
Ad

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPT
Teaching material agriculture food technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
1. Introduction to Computer Programming.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Getting Started with Data Integration: FME Form 101
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
August Patch Tuesday
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Encapsulation theory and applications.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
NewMind AI Weekly Chronicles - August'25-Week II
Teaching material agriculture food technology
Advanced methodologies resolving dimensionality complications for autism neur...
Machine learning based COVID-19 study performance prediction
Programs and apps: productivity, graphics, security and other tools
1. Introduction to Computer Programming.pptx
A Presentation on Artificial Intelligence
Getting Started with Data Integration: FME Form 101
cloud_computing_Infrastucture_as_cloud_p
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.
August Patch Tuesday
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
MIND Revenue Release Quarter 2 2025 Press Release
Heart disease approach using modified random forest and particle swarm optimi...
Group 1 Presentation -Planning and Decision Making .pptx
Encapsulation theory and applications.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectral efficient network and resource selection model in 5G networks

Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan

  • 1. Five Facts About Application Usage on Enterprise Networks in Taiwan Application Usage and Risk Report December 2011
  • 3. Average number of social networking applications per organization? A total of 61 different social networking applications were found in 99% of the 148 participating organizations with an average of 12 found on each network.
  • 5. Which application is used more heavily? Based on the percentage of social networking bandwidth consumed, Zynga games consumed 10% of the bandwidth while Twitter consumed only 2%.
  • 6. Taiwan social networking usage is active. Facebook dominates but action oriented (apps, games, posting, and plugins) usage is greater in Taiwan than it is globally.
  • 8. Average number of browser-based filesharing applications per organization? A total of 53 different browser-based filesharing applications were found in 97% of the 148 participating organizations with an average of 15 in each.
  • 9. Browser-based filesharing use cases: work or entertainment. Both uses have a common set of business and security risks that organizations must address.
  • 11. The number of applications using Port 80 (tcp/80) only? The number of applications that ONLY use Port 80 is 228 or 25% of the 898 applications found in the participating organizations.
  • 13. Percentage of total bandwidth consumed by applications not using tcp/80? Only 18% of the total bandwidth is being consumed by 292 (33% of 898) applications that DO NOT USE port 80 at all. Ever.
  • 14. Port 80 only security is shortsighted. The common perception is that Port 80 (tcp/80) is where all the traffic and all the problems are. A port 80 emphasis is an absolute requirement; but too much focus is shortsighted.
  • 16. Palo Alto Networks Application Usage and Risk Report www.paloaltonetworks.com/aur